Question

In: Computer Science

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes...

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes (eight-bit binary strings of 1s and 0s) using the XOR function. In the process of encrypting a message, a character in the plaintext, a capital X, is XORed with the pseudorandom byte 10110100.
a. What is the ciphertext (in binary form) generated by the encryption of the character ‘M’? (Please show your work.)
b. How is the plaintext for this encrypted J recovered? (Please show your work.)

Solutions

Expert Solution

ANSWER:

XOR Table

Input: 0,0 Output: 0

Input: 0,1 Output: 1

Input: 1,0 Output: 1

Input: 1,1 Output: 0

Pseudorandom byte: 10110100

ASCII of ‘X’: 01011000

Now performing XOR between X and pseudorandom, we get-

Cipher Text: 11101100

a) ASCII of ‘M’: 01001101

Pseudorandom byte: 10110100

Now performing XOR between M and pseudorandom, we get-

Cipher Text: 11111001

b) ASCII of ‘J’: 01001010

Pseudorandom byte: 10110100

Note that ASCII of J is encrypted text as given in question, so to get plain text we perform XOR-

Plain Text: 11111110

SUMMARY:

For every question we need to get the ASCII of the specified character. The pseudorandom byte is already given in the question. So to find cipher text we just need to XOR the ASCII of character and the pseudorandom byte. Similarly XOR to calculate the plain text.

Note: If you have any queries than let me know in the comments. If you find it helpful than a Like would be appreciated.


Related Solutions

Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Use Vigenère Cipher to decrypt the following plaintext with the given key key: deceptivedeceptivedeceptive plaintext: wearediscoveredsaveyourself
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Using playfair cipher, encrypt the plaintext “SUCCESS” using the keyword “MIDTERMEXAM”
Please compute AES128 encryption given by the following setting: (Note: Plaintext, Cipherkey and Ciphertext are Bytes)...
Please compute AES128 encryption given by the following setting: (Note: Plaintext, Cipherkey and Ciphertext are Bytes) Plaintext: 00……00 Cipherkey: 00……01 What is the ciphertext?
MARS: Use MASKING to convert ASCII characters to Integer Write and run a program that reads...
MARS: Use MASKING to convert ASCII characters to Integer Write and run a program that reads in a string of ASCII characters and converts them to Integer numbers stored in an array USING MASKING, not subtraction. Write a program that: 1. Inputs a 1x8 vector of single-digit integers 2. Stores them into an 8-entry 32-bit Integer array, “V”. After storing the integers in the array: 1. Read the same values using Read Integer and store them in a 32-bit integer...
In YASM Assembly language, how would you convert a hex byte into it's ascii representation?
In YASM Assembly language, how would you convert a hex byte into it's ascii representation?
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times...
1. Monoalphabetic substitution (using the Caesar Cipher tool right) Encipher (convert plaintext into ciphertext): meal times  Decipher (convert ciphertext in to plaintext):  JR PHDQ JUHHQ 2. Polyalphabetic substitution (using the Vigenere Square in the lecture slide) Encipher: fall  Decipher:  VPX TWOKM
Cindy transmitted a four-letter word to Donald.  After her computer took the ASCII representation for the word...
Cindy transmitted a four-letter word to Donald.  After her computer took the ASCII representation for the word and applied the Hamming(7,4) code, Bob received this:    1100011 0011001 1011010 1111111 0010010 0111110 1101010 Unfortunately, there were a number of errors in the transmission. Fortunately, however, there was never more than one bit error in any 7-bit block, and hence the Hamming(7,4) code was able to fix them all. Type in the four-letter word (using letters of the alphabet) that Cindy originally sent,...
Convert the following statement into the 8-bit unsigned binary ASCII representation: Bob’s laptop receives the frame...
Convert the following statement into the 8-bit unsigned binary ASCII representation: Bob’s laptop receives the frame containing the ARP reply message. First, convert each character into it's ASCII equivalents. Then, convert to a Binary number. For example: Bob's -> 066 111 098 039 115 -> 01000010 01101111 01100010 00100111 01110011 Remember, each Binary number has to be 8-bits.
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data...
Suppose that the security code for a particular automobile’s locks consists of 4 bytes of data transmitted via a low power radio. A byte is either sent correctly or is distorted by interference. The car locks are only opened if all 4 bytes are received correctly. Let C be the event that a byte is received correctly and F be the event that the byte is distorted in transmission. Then CCCC would mean that all four bytes were received correctly...
Java Implementation It uses adjacency list representation, and already has the loadAdjList() function implemented for reading...
Java Implementation It uses adjacency list representation, and already has the loadAdjList() function implemented for reading adjacency lists from standard input (make sure you understand the input format and how loadAdjList() works). You need to complete the function printAdjMatrix(). import java.util.LinkedList; import java.util.Scanner; import java.util.Iterator; class Graph { private int totalVertex; private LinkedList<LinkedList<Integer>> adjList; //adjacency list of edges public Graph() { totalVertex = 0; } public void loadAdjList() { Scanner in = new Scanner(System.in); totalVertex = in.nextInt(); adjList = new...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT