Question

Problem 1 Consider the 3-bit block cipher in slide 8-18. Suppose the plaintext is 101101101. If...

Problem 1

Consider the 3-bit block cipher in slide 8-18. Suppose the plaintext is 101101101. If CBC is used with initial vector 110, what will be the resulting ciphertext? Show work, not just the final answer.

Problem 2

Consider RSA with public key (n, e) and private key (n, d) where n = 35, e = 5, and d = 29. What is the encryption of m = 34? What is the decryption of c = 34? Show calculations, not just final answers.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

-----------------------------------------------------------------------------------------------------------------------------------------

Problem 1:

-------------------------------------------------------------------------------------------------------------------------------------------------

Problem 2 RSA

Add a comment
Know the answer?
Add Answer to:
Problem 1 Consider the 3-bit block cipher in slide 8-18. Suppose the plaintext is 101101101. If...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 2. Use the 3-bit block cipher in the table below to answer the following. Suppose the...

    2. Use the 3-bit block cipher in the table below to answer the following. Suppose the (a) Use the block cipher without cipher-block chaining (CBC) to encrypt the message (b) Suppose Trudy intercepts the ciphertext. Further suppose she knows that the text was plaintext is m 011011011. What is the resulting ciphertext? encrypted with a 3-bit block cipher without CBC, but she does not know the specific cipher. What can she determine about the original message? (c) Now use the...

  • Computer science encryption please refer to the chart to help For the remaining questions, consider a...

    Computer science encryption please refer to the chart to help For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 4 You can think of this as a simple substitution cipher for hexadecimal digits. The table itself serves as the "key" s (6 pts) For this question, you will perform encryption and 5. decryption using the same cipher described above, but in CBC mode. Recall that you can convert hexadecimal...

  • Perform encryption and decryption using the RSA algorithm, for the following p = 3, 9 =...

    Perform encryption and decryption using the RSA algorithm, for the following p = 3, 9 = 11, e = 7 M = 5 What is the public key PU? What is the private key PR? What is the cipertext C? How does the decryption to covert the ciphertext back to the plaintext M?

  • Final Project-1 A Modified XTS-AES Encryption and Decryption Input File: input. and key txt Time Limit:...

    Final Project-1 A Modified XTS-AES Encryption and Decryption Input File: input. and key txt Time Limit: No Problem Description Advanced Encryption Standard (AES) is a well-known symmetric block cipher in modern cryptography. It was published by NIST in 2001. Here, we design a modified XTS-AES as shown in Fig. 1. Please write two programs for encryption and decryption (e.g., encrypt.cpp and decrypt.cpp). To test the correctness of your encryption and decryption, two samples (one 256-bit plaintext and one 192-bit plaintext...

  • O-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-...

    o-8. (15 points) Bob's simple toy RSA eryptosystem has public key kyub(n, e) (65,5), where n =p,-5x13-65 and e-5. I. Describe the key pair generation procedure for Bob to generate his private key kor- d. With the above given parameters, use EEA to calculate d 2. Describe RSA encryption procedure that Alice uses to encrypt her plaintext message x to its above given parameters, what will be y? ciphertext y before sending the message to Bob. Suppose Alice's message x-...

  • Computer science encryption Problem. Please answer A and B. ) Consider any block cipher (such as...

    Computer science encryption Problem. Please answer A and B. ) Consider any block cipher (such as S-DES, but not specifically) that operates on a block size of 8 bits, producing a ciphertext that is also 8 bits long. In this scenario, how many different ciphertexts are possible? b. How many different 8-bit block ciphers can there be in total?

  • 3) Out of the following, name which kind of attack you carried out in part 1...

    3) Out of the following, name which kind of attack you carried out in part 1 and part2: a. ciphertext only, b. known plaintext, c. chosen plaintext, d. chosen ciphertext. Explain your answer Problem 3 10 points] A 4-bit long message was encrypted using one-time pad to yield a cipher-text “1010” Assuming the message space consists of all 4-bit long messages, what is the probability that the corresponding plaintext was “1001”? Explain your answer. Problem 4 Assume we perform a...

  • Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more...

    Decrypting the APCO cipher without the key. Decryption without the key is obviously a much more difficult process. Indeed, the purpose of encryption is to make it as difficult as possible for anyone who does not know the key to read the plain text. We will be using an unsophisticated password cracking technique called a brute force attack. A brute force attack on the APCO cipher works by trying every possible four digit key (from 0000 to 9999) and keeping...

  • the w 2. This problem explores the use of a one-time pad version of t In...

    the w 2. This problem explores the use of a one-time pad version of t In this scheme, the key is a stream of random numbers between 0 and example, if the key is 3 19 5..., then the first letter of plaintext is encrypted with a shift of 3 letters, the second with a shift of 19 letters, the third with a shift of 5 letters, and so on. a. Encrypt the plaintext sendmoremoney with the key stream 9...

  • 5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice...

    5. Consider the RSA encryption scheme, Alice wants to send a message to Bob. Both Alice and Bob have p= 17,9 = 19. Alice has e=31 and Bob has e=29. a. What is the public key pair used in the transmission? 2 marks b. What is the secret key pair used in the transmission? 4 marks c. Encrypt the message m=111. 4 marks d. Decrypt the resulting ciphertext. 4 marks e. What's the security problem between Alice and Bob? How...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT