Question

In: Computer Science

Using randomized encryption, convert an AES and RSA message (m) with 128 bits into a secured...

Using randomized encryption, convert an AES and RSA message (m) with 128 bits into a secured version with an initialization vector (IV). Show how to encrypt (m) with secured AES.

Solutions

Expert Solution

Initialization Vector:

Initialization vector is a arbitrary number, can be used along with a secret key for encryption of data.This vector is a number which is added to a secret key. It generates only once in a session. It is a 24 bit key. It is added along with Wep (Wired equivalent privacy) key which size is 40 bit making a sum of 64 bit key.

ASE Encryption:

RSA Encryption:


Related Solutions

Using a technique called randomized encryption, convert textbook AES and RSA to a secured version with...
Using a technique called randomized encryption, convert textbook AES and RSA to a secured version with an initialization vector (IV). Assume we have a message (m) with 128 bits, show how to encrypt (m) with secured AES. Explain why IEEE 802.11 (i.e., WEP) is not secure due to the inappropriate usage of an IV.
When applying secured AES to a long message (multiples of 128 bits), it will have different...
When applying secured AES to a long message (multiples of 128 bits), it will have different modes of encryption. Show all the recommended AES modes of encryption with a 256-bit message m = m1m2. Include a diagram as well.
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the following information: parameters p=11,q=5, e=7 Present all the information that you will need to encrypt and decrypt only the first letter from text
Suppose an attacker obtained 128 bits of ciphertext that were encrypted using an encryption algorithm whose...
Suppose an attacker obtained 128 bits of ciphertext that were encrypted using an encryption algorithm whose keys are known to be 128 bits long. How effective is an exhaustive key search if the attacker does not know the encryption algorithm used? Provide an example of when data integrity is more important than data confidentiality? Suppose you have been asked at your new job to recommend the strength of encryption needed to protect the contents of a database. Draw up a...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
Given two prime numbers 17 and 19. Compute the encryption and the decryption keys using RSA...
Given two prime numbers 17 and 19. Compute the encryption and the decryption keys using RSA algorithm.
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e...
Part 1: Encrypt the message CINEMA using RSA with n = 17 * 11 and e = 13, use A =10...Z = 35, work in blocks of one letter each. Part 2: Decrypt the message 088-164-051-164-021-074 using the same parameters from part 1.
Using the provided dictionary, develop an encryption algorithm that will convert a user-entered string into an...
Using the provided dictionary, develop an encryption algorithm that will convert a user-entered string into an encrypted string. Print the user inputted text and the corresponding encrypted text. cipher = {"A": "T", "B": "D", "C": "L","D": "O", "E": "F","F": "A", \ "G": "G","H": "J", "I": "K", "J": "R", "K": "I","L": "C", "M": "V", \ "N": "P", "O": "W","P": "U", "Q": "X", "R": "Y", "S": "B","T": "E", \ "U": "Z", "V": "Q", "W": "S","X": "N", "Y": "M", "Z": "H"} b) Create...
(ElGamal encryption): show how, given an encrypted message C1=E(m), it is possible to create a different...
(ElGamal encryption): show how, given an encrypted message C1=E(m), it is possible to create a different encrypted copy that will be decrypted to the same message without knowing the key that was used for the encryption. meaning, create C2 so that D(C2)=m
Given the data-bits m = 11010110, determine the number of k (parity-bits) by using Hamming Code...
Given the data-bits m = 11010110, determine the number of k (parity-bits) by using Hamming Code requirements. Illustrate the error detection and correction scheme using Hamming code method, for both the sender and receiver to detect an error at the following positions: a.6thbit position. b.11thbit position.Assume an odd-parity scheme for this problem.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT