ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 103 Weeks Ago, 3 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 04 May 2017 My Price 8.00

symmetric key cryptography

Hi,

Can anyone help me finding these answers, am so confused with these questions.

Please help me finding.

Thanks&Regards

 

 

 

1. Discussion board
i. Why symmetric key cryptography alone cannot resolve Internet security
issue?
ii. Why is it important to study the Feistel cipher?
iii. List ways in which symmetric keys can be distributed to two
communicating parties.
iv. Which of the following security services are provided by using
symmetric key to encrypt and decrypt messages
o Authentication
o Confidentiality
o Integrity
v. What is the key size for Caesar cipher whose legimate characters are
abcdefghijklmnopqrstuvwxyz vi. What is the key size for Caesar cipher whose legimate characters are
abcdefghijklmnopqrstuvwxyz1234567890 2. If the key of a Transposition Ciphers is MATRIX, what is the ciphertext for
the plaintext
bruceleeisareallycoolguy
3. Review Questions
a. What are the essential ingredients of a symmetric cipher?
b. What are the two basic functions used in encryption algorithms?
c. How many keys are required for two people to communicate via a
symmetric cipher?
d. What is the difference between a block cipher and a stream cipher?
e. What are the two general approaches to attacking a cipher?
f. Why do some block cipher modes of operation only use encryption
while others use both encryption and decryption?
g. What is triple encryption?
h. Why is the middle portion of 3DES a decryption rather than an
encryption?
i. What is the difference between link and end-to-end encryption? j. List ways in which secret keys can be distributed to two communicating
parties.
k. What is the difference between a session key and a master key?
l. What is a key distribution center? 4. Please use Feistel cipher to manually encrypt and decrypt the
plaintext BRUCELEE.
Note: The cipher has these parameters:
o
o o
o Two rounds
Function F() is a Caesar Cipher. Instead of using only 26 characters, the
characters used in the Caesar Cipher are all the characters defined in
an ASCII Table. Thus, if a character NUL in a plaintext will be
encrypted as the character STX in a ciphertext if the key is 2.
K1 is 2
K2 is 3

Attachments:

Answers

(11)
Status NEW Posted 04 May 2017 12:05 AM My Price 8.00

-----------

Attachments

file 1493858512-Solutions file 2.docx preview (51 words )
H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly -----------onl-----------ine----------- an-----------d g-----------ive----------- yo-----------u e-----------xac-----------t f-----------ile----------- an-----------d t-----------he -----------sam-----------e f-----------ile----------- is----------- al-----------so -----------sen-----------t t-----------o y-----------our----------- em-----------ail----------- th-----------at -----------is -----------reg-----------ist-----------ere-----------d o-----------n -----------THI-----------S W-----------EBS-----------ITE-----------. ----------- Th-----------ank----------- yo-----------u -----------
Not Rated(0)