Question

In: Computer Science

When applying secured AES to a long message (multiples of 128 bits), it will have different...

When applying secured AES to a long message (multiples of 128 bits), it will have different modes of encryption. Show all the recommended AES modes of encryption with a 256-bit message m = m1m2. Include a diagram as well.

Solutions

Expert Solution

AES (Advanced Encryption Standard) is a block cipher that means the transformation performed on the amount of bits or bytes called a block. This transformation is called a keyed permutation as each plain text has a corresponding cipher text (and vice versa) for a specific key. AES supports key lengths of 128, 192 and 256 bit. Mostly AES will only encrypt 128 bit of data, but if we want to encrypt whole messages ,need to choose a block mode with which multiple blocks can be encrypted to a single cipher text. The simplest block mode is Electronic Codebook or ECB

The disadvantage of this method is a lack of diffusion. Because ECB encrypts identical plain text blocks into identical cipher text blocks, it does not hide data patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not recommended for use in cryptographic protocols at all.

One of the alternative solution is Code block Chaining in which XORs the current plain text block with the previous cipher text block.Here each cipher text block depends on all plain text blocks processed.

A random initialization vector (IV) is used to avoid the generation of same key and plain text for the same cipher text.Also if you reuse the same key for different plain texts it would make it easier to recover the key. IV is a public and random data that is about the size of one block (128 bit),only used one time. If you not knowing the IV will only making the difficulty to the decryption of the first block since the CBC XORs the cipher text not the plain text of the previous one.

Another solution is Counter Mode which restrict the padding and turn a block cipher into a stream cipher. All blocks are numbered from 0 to n and every block transform with the IV ,key and the counter value.

where c59bc35 - initialization vector

00000000 - Counter value


Related Solutions

Using randomized encryption, convert an AES and RSA message (m) with 128 bits into a secured...
Using randomized encryption, convert an AES and RSA message (m) with 128 bits into a secured version with an initialization vector (IV). Show how to encrypt (m) with secured AES.
When a message is sent electronically it is usually sent as a stream of bits, each...
When a message is sent electronically it is usually sent as a stream of bits, each of which can be either a 0 or a 1. If the digital channel is noisy then each bit has some probability of being flipped (ie changed from a 0 to a 1 or vice versa) resulting in a corrupted message. Assume that a message is being sent through a noisy channel where the probability that any individual bit will be flipped is 0.1....
Make sure you include a customized cover message when applying for a position. A cover message...
Make sure you include a customized cover message when applying for a position. A cover message should introduce your résumé, highlight your strengths in terms of benefits to the reader, and request an interview. Follow your judgment when deciding whether to write a brief or long cover message. Your message should include an opening that introduces your message and identifies the position, a body that sells you as a candidate and focuses on the employer’s needs, and a closing that...
Describe the different assumptions that are made when applying various queuing models? Which are the easiest...
Describe the different assumptions that are made when applying various queuing models? Which are the easiest models to derive? What type of problem does each help to solve?
I already have an alert message that pops up when the number is not filled in...
I already have an alert message that pops up when the number is not filled in correctly. How would I change that alert function to something similar to this function. <!doctype html> <html> <head> <meta charset="UTF-8"> <title>Untitled Document</title> <script>    function phonenumber(inputtxt){           var phoneno = (\(\d{3}\)|\d{3})[-\s]\d{3}-\d{4};       if(inputtxt.value.match(phoneno)){        document.getElementById("yourEntry").innerHTML = document.getElementById("myphone").value;    }    //if(!inputtxt.value.match(phoneno)){        // alert("Does not Work!")        //}    } </script> </head> <body> <form name="form1" action="#"> <input type="text"...
I have the following python code. I get the following message when running it using a...
I have the following python code. I get the following message when running it using a test script which I cannot send here: while textstring[iterator].isspace(): # loop until we get other than space character IndexError: string index out of range. Please find out why and correct the code. def createWords(textstrings): createdWords = [] # empty list for textstring in textstrings: # iterate through each string in trxtstrings iterator = 0 begin = iterator # new begin variable while (iterator <...
Applying what you have learned... When politicians make claims that we need to spend a large...
Applying what you have learned... When politicians make claims that we need to spend a large amount of money to achieve a goal, the claim is often made without legitimate evidence to support a claim that a given program will have a particular result. Let's say that a politician wants to implement a nation-wide education program. The politician gave four examples of schools that used the program: scores at the schools increased 0.5, 1, 2, and 2.5 points respectively (the...
“Changes in demand have different effects on profit over different time horizons (short run versus long...
“Changes in demand have different effects on profit over different time horizons (short run versus long run)”. Explain this phenomenon using an example of a demand increase or a demand decrease.
• When do firms have opportunity to charge different prices to different consumers? Example from a...
• When do firms have opportunity to charge different prices to different consumers? Example from a real world situation. There are four key types of market structures in the market economy: perfect competition, monopoly, oligopoly, and monopolistic competition. Each of the market structures has its own key distinguishing features. The marketing strategies of firms also differ from market structure to market structure. 1. Pick a specific industry from one of the market structures and explain how it would function and...
When your products and/or services require the use of different resources in different departments, you have...
When your products and/or services require the use of different resources in different departments, you have to use multiple POHRs...one for each department involved. Otherwise, a single, factory-wide POHR may not capture the correct information. For example, when one product requires more machine time and less labor, and another product requires less machine time and more labor, you have to charge the overhead cost in each department (machining, and hand-assembly) using the appropriate cost driver (machine time or labor time,...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT