Question

In: Computer Science

What is the weakness about using the same key stream multiple times for encryption in a...

What is the weakness about using the same key stream multiple times for encryption in a stream cipher? How can it be solved in practice?

Solutions

Expert Solution

ANSWER:-

Encrypting again can't make the cipher weaker , as long as the keys you decided to encrypt a second time are independent of the keys you use the first time . The logic behind this is straight-forward; the attacker is expected to have a deep understanding of the cipher aside from the keys. If he has some ciphertext that he wants to attack, there's nothing preventing him from picking his own "second time key", and then encrypting the ciphertext to form a doubly-encrypted ciphertext. If double-encrypting was inherently weaker, at that point he could attack that (and thus single-encryption would be equally weak). Then again, if the two keys you use during the first and the second use are the same, this logic doesn't apply. Also, actually, there are ciphers where this encrypting twice with the same key is a Bad Idea. For example, some ciphers will, if you run the ciphertext through a second time with the same key, will generate a 'doubly-encrypted ciphertext' that is exactly the same as the plaintext; this is obviously weaker than the 'singly-encrypted ciphertext'.

                                 please rate


Related Solutions

What was the key control weakness in this case?
  Question: Levon Helm was a kind of one-man mortgage broker. He would drive around Tennessee looking for homes that had second mortgages, and if the criteria were favorable, he would offer to buy the second mortgage for “cash on the barrelhead.” Helm bought low and sold high, making sizable profits. Being a small operation, he employed one person, Cindy Patterson, who did all his bookkeeping. Patterson was an old family friend, and he trusted her so implicitly that he...
What is the name of the revolutionary key exchange that creates an encryption key, but only...
What is the name of the revolutionary key exchange that creates an encryption key, but only transmits enough information across the wire to encrypt and decrypt messages, without ever sharing the key itself across the wire? Group of answer choices Alice and Bob key exchange Sarbanes-Oxley key exchange Diffle-Hellman key exchange Whitfield-Martin key exchange
talk about database encryption and what type of encryption for database
talk about database encryption and what type of encryption for database
You are building a safe messaging system by using an Encryption such as private key (symmetric)...
You are building a safe messaging system by using an Encryption such as private key (symmetric) and public key (Asymmetric) that would prevent the utility company from knowing the content of the communications being exchanged. The receiver can be disconnected and cannot receive messages, how can this situation be managed by your system?
This question was about quantum nubers. It isn't multiple questions. just multiple parts of the same...
This question was about quantum nubers. It isn't multiple questions. just multiple parts of the same question with very short answers according to my teacher. I am confused about how to solve them please help. Thanks. Question 2 (A) List the allowed quantum numbers ml for the 2p subshell. (B) List the allowed quantum numbers ms for each of the ml values for the 2p subshell. (C) List the allowed quantum numers ml for the 3d subshell. (D) List the...
Briefly compare the Exist Multiple Method vs. the Perpetuity Growth Method. What is the weakness of...
Briefly compare the Exist Multiple Method vs. the Perpetuity Growth Method. What is the weakness of both methods? Would you use one of these methods for a "quick" analysis of the target's value?
(a) What is Gross National Product (GNP)? What is one weakness of using GNP as a...
(a) What is Gross National Product (GNP)? What is one weakness of using GNP as a measure of economic activity? b) Using a well-labeled graph, illustrate the concept of a binding price ceiling OR a price floor (but NOT both).
What are three examples of key words at key times? Why do they improve service culture?
What are three examples of key words at key times? Why do they improve service culture?
Answer the following question(s): What might be the effects of not using encryption on network or...
Answer the following question(s): What might be the effects of not using encryption on network or Internet traffic? Why might vendors propose proprietary encryption methods rather than using standard encryption technologies? Make sure you provide a substantive and thorough post.
what are the major strengths and weakness of using ratios to identify a company's financial condition?...
what are the major strengths and weakness of using ratios to identify a company's financial condition? explain with examples
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT