Question

In: Computer Science

AES128 encryption given by the following setting (Note: plaintext, Cipherkey and Ciphertext are Bytes) a. Plaintext:...

AES128 encryption given by the following setting (Note: plaintext, Cipherkey and Ciphertext are Bytes)

a. Plaintext: 00……00 Cipherkey: 00……00 Ciphertext: 66 E9 4B D4 EF 8A 2C 3B 88 4C FA 59 CA 34 2B 2E

b. Plaintext: 00……01 Cipherkey: 00……00 Ciphertext: 58 E2 FC CE FA 7E 30 61 36 7F 1D 57 A4 E7 45 5A

c. Plaintext: 00……00 Cipherkey: 00……01 Ciphertext: 05 45 AA D5 6D A2 A9 7C 36 63 D1 43 2A 3D 1C 84

Please compare the result of the ciphertext from the above questions, and explain what are the difference.

Solutions

Expert Solution

a. Plaintext: 00……00 Cipherkey: 00……00 Ciphertext: 66 E9 4B D4 EF 8A 2C 3B 88 4C FA 59 CA 34 2B 2E

b. Plaintext: 00……01 Cipherkey: 00……00 Ciphertext: 58 E2 FC CE FA 7E 30 61 36 7F 1D 57 A4 E7 45 5A

c. Plaintext: 00……00 Cipherkey: 00……01 Ciphertext: 05 45 AA D5 6D A2 A9 7C 36 63 D1 43 2A 3D 1C 84

From the given question that plaintext is the same for a and c but the cipher key is only changed by a single bit but the ciphertext is completely changed. It shows that a single bit doesn't affect a part of the resulted ciphertext but a complete change. Which shows how powerful is AES encryption.

And comparing a and b the cipher key is same but plain text is only changed by a bit. And as a result, the whole ciphertext is changed.

It shows a single bit change in plaintext or cipher key the resulted cipher text is complelty changed.  This is due to the working of AES 128 bit encryption.

In AES 128. Data is treated as plaintext block. In 128 AES 10 rounds are performed where in each round a new AES key is generated from original aes key.


Related Solutions

Please compute AES128 encryption given by the following setting: (Note: Plaintext, Cipherkey and Ciphertext are Bytes)...
Please compute AES128 encryption given by the following setting: (Note: Plaintext, Cipherkey and Ciphertext are Bytes) Plaintext: 00……00 Cipherkey: 00……01 What is the ciphertext?
Let’s say you have the ciphertext for the given plaintext. Plaintext: it was disclosed yesterday that...
Let’s say you have the ciphertext for the given plaintext. Plaintext: it was disclosed yesterday that several informal but direct contacts have been made with political representatives of the viet cong in Moscow Ciphertext: UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZVUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSXEPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ Can you determine the cipher used? If yes, name the cipher. Explain why. Can you determine all/part of the key. If yes, give the key or part of the key. Explain how you deduced it.
Given the prime factors p and​ q, the encryption exponent​ e, and the ciphertext​ C, apply...
Given the prime factors p and​ q, the encryption exponent​ e, and the ciphertext​ C, apply the RSA algorithm to find ​(a) the decryption exponent d and ​(b) the plaintext message M. p q e C 17 5 19 65 I have to get d and M
Question The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and...
Question The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java or Python code to implement either Monoalphabetic cipher or Hill cipher or Transposition Cipher (Encryption and Decryption) and test your code on given plaintext. User may enter value of key at the command prompt, if required.
The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”....
The given plaintext is “Feistel cipher structure uses the same algorithm for both encryption and decryption”. Write Java code to implement Shift cipher (Encryption and Decryption) and test your code on given plaintext. Your code must meet following conditions. 1. User must enter the value of key from command prompt and print it at command prompt. 2. Print the cipher text and the plaintext at the command prompt after encryption and decryption. 3. Test your algorithm for 5 different key...
For this question, you need to implement Java code for the following Modified Ciphertext encryption and...
For this question, you need to implement Java code for the following Modified Ciphertext encryption and attack for known patterns to find the code. Please read the modified Ciphertext carefully and examples before implementing them.   Modified Ciphertext is working as follows: If a plain text (only letters ignore uppercase or lowercase) and sequences of numbers are given, it encrypts the given plain text by shifting each letter in a message the characters based on the given numbers one forward direction...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep...
Cryptography: Using columnar cipher, find the plaintext and the key that generated this ciphertext: ykccjosaiawiekhriogrrlrni Keep in mind that only letter j was used for padding. (Show your detailed work)
A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes...
A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function. In the process of encrypting a message, a character in the plaintext, a capital X, is XORed with the pseudorandom byte 10110100. a. What is the ciphertext (in binary form) generated by the encryption of the character ‘M’? (Please show your work.) b. How is the plaintext for this encrypted J recovered? (Please...
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
What are the two modes of encryption that allow random access to the ciphertext blocks. Specifically,...
What are the two modes of encryption that allow random access to the ciphertext blocks. Specifically, if a hacker has the information about i-th cyphertext block Ci and it can find the plaintext Pi without having any other cyphertext blocks.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT