The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | May 2017 |
| Last Sign in: | 398 Weeks Ago, 1 Day Ago |
| Questions Answered: | 66690 |
| Tutorials Posted: | 66688 |
MCS,PHD
Argosy University/ Phoniex University/
Nov-2005 - Oct-2011
Professor
Phoniex University
Oct-2001 - Nov-2016
1. For any block cipher, the fact that it is a nonlinear function is crucial to its security.Tosee this, suppose that we have a linear block cipher EL that encrypts 128-bit blocks ofplaintext into 128-bit blocks of ciphertext. Let EL (k, m) denote the encryption of a128-bit message M under a key (the actual bit length of is irrelevant).Thus,
EL(K,[m1?m2])=EL(k,m1)?EL(k,m2)for all 128-bit Patterns m1,m2
Describe how, with 128 chosen cipher texts, an adversary can decrypt any cipher text without knowledge of the secret key . (A “chosen cipher text” means that an adversary has the ability to choose a cipher text and then obtain its decryption. Here, you have 128 plaintext/cipher text pairs to work with and you have the ability to chose the value of the cipher texts.)
2. Create software that can encrypt and decrypt using S-DES. Test data: use plaintext, cipher text, and key of Problem 1.
Hel-----------lo -----------Sir-----------/Ma-----------dam-----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------and----------- ac-----------qui-----------sit-----------ion----------- of----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n.P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll