Question

In: Advanced Math

Suppose Alice is using a block cipher to send the message THE ORDER IS KARL, ANDY,...

Suppose Alice is using a block cipher to send the message
THE ORDER IS KARL, ANDY, FRED AND IAN. IAN AND ANDY HAVE LEFT.

to Bob. Assume that

  • the block cipher is used in ECB mode,

  • the English is divided into plaintext blocks of 2 letters (ignore spaces and punctuation)

  • the ciphertext blocks are denoted C1,C2,...,C23

    (a) Write down the 23 plaintext blocks.
    (b) Will any of the ciphertext blocks be repeated? If so, which ones?
    (c) Suppose an attacker manipulates the ciphertext so that instead of receiving C1,C2,...,C23.

    Bob receives

C1, C2, C3, C4, C5, C10, C11, C6, C7, C8, C9, C12, C13, C14, C15, C16, C17, C6, C7, C20, C21, C22, C23

What does Bob think the message Alice sent is? (add spaces and punctuation)

(d) If Bob receives

C10, C8, C6, C17, C6, C7, C20, C21, C22, C23
what does he think the message is? (add spaces and punctuation)

(e) Find another sequence of ciphertext blocks that decrypts to a plausible plaintext sentence of at least five words (add spaces and punctuation to your sentence).

Solutions

Expert Solution


Related Solutions

Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011...
Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011 Cx=x3+x2+1 Q2) Explain how the ‘Stop and Wait’ flow control method is working? Q3) Explain the differences between Go-Back-N and Selective Repeat sliding window flow control methods? Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011 Cx=x3+x2+1 Q2) Explain how the ‘Stop and Wait’ flow control method is working? Q3) Explain the differences between Go-Back-N and Selective...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Write a Java program that uses the RC4 cipher algorithm to encrypt the following message using...
Write a Java program that uses the RC4 cipher algorithm to encrypt the following message using the word CODES as the key:   Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25. Ignore spaces and punctuations and put the message...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the following information: parameters p=11,q=5, e=7 Present all the information that you will need to encrypt and decrypt only the first letter from text
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the...
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the look-up table of k different such m-to-m bits S-boxes? Give a formula in terms of k and m. Hint: A look-up table for one DES S-box requires 256 bits of storage.
Suppose that you decided to send a spacecraft to Neptune using a Hohmann transfer. The craft...
Suppose that you decided to send a spacecraft to Neptune using a Hohmann transfer. The craft starts in a circular orbit close to the Earth (1 AU) and is to end up in a circular orbit near   Neptune (about 30 AU).   (a) How long would the transfer take?   (b) How could you shorten this time, without increasing the amount of fuel required?   (c) What change in velocity is needed to enter the transfer orbit?   (d)   What is the change in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT