Question

In: Advanced Math

Suppose Alice is using a block cipher to send the message THE ORDER IS KARL, ANDY,...

Suppose Alice is using a block cipher to send the message
THE ORDER IS KARL, ANDY, FRED AND IAN. IAN AND ANDY HAVE LEFT.

to Bob. Assume that

  • the block cipher is used in ECB mode,

  • the English is divided into plaintext blocks of 2 letters (ignore spaces and punctuation)

  • the ciphertext blocks are denoted C1,C2,...,C23

    (a) Write down the 23 plaintext blocks.
    (b) Will any of the ciphertext blocks be repeated? If so, which ones?
    (c) Suppose an attacker manipulates the ciphertext so that instead of receiving C1,C2,...,C23.

    Bob receives

C1, C2, C3, C4, C5, C10, C11, C6, C7, C8, C9, C12, C13, C14, C15, C16, C17, C6, C7, C20, C21, C22, C23

What does Bob think the message Alice sent is? (add spaces and punctuation)

(d) If Bob receives

C10, C8, C6, C17, C6, C7, C20, C21, C22, C23
what does he think the message is? (add spaces and punctuation)

(e) Find another sequence of ciphertext blocks that decrypts to a plausible plaintext sentence of at least five words (add spaces and punctuation to your sentence).

Solutions

Expert Solution


Related Solutions

Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the...
Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the look-up table of k different such m-to-m bits S-boxes? Give a formula in terms of k and m. Hint: A look-up table for one DES S-box requires 256 bits of storage.
Suppose that you decided to send a spacecraft to Neptune using a Hohmann transfer. The craft...
Suppose that you decided to send a spacecraft to Neptune using a Hohmann transfer. The craft starts in a circular orbit close to the Earth (1 AU) and is to end up in a circular orbit near   Neptune (about 30 AU).   (a) How long would the transfer take?   (b) How could you shorten this time, without increasing the amount of fuel required?   (c) What change in velocity is needed to enter the transfer orbit?   (d)   What is the change in...
Binary file IO Suppose a file has been encrypted using the Caesar cipher as described above,...
Binary file IO Suppose a file has been encrypted using the Caesar cipher as described above, and you know the secret key. Write a program to decrypt (or decode) the file. Your program will prompt the user to enter an input file name for the encrypted file, an output file name for the unencrypted version of the input file, and the secret key. Create a DataInputStream for the input file and a DataOutputStreams for the output file. Next, read the...
Suppose we want to transmit the message 0010 1101 and detect transmission errors using the CRC...
Suppose we want to transmit the message 0010 1101 and detect transmission errors using the CRC divisor polynomial (x3+x2+1). A.) [15 marks] Determine the bit string that should be transmitted. B.) [15 marks] If the leftmost 1-bit of the transmitted string is inverted due to noise on the link, what is the result of the receiver's CRC calculation?
Suppose we are using this data to attempt to pass a quality test in order to...
Suppose we are using this data to attempt to pass a quality test in order to market this material. 2.58     2.51     4.04     6.43     1.58     4.32     2.2       4.19     4.79     6.2       1.52     1.38     3.87     4.54     5.12     5.15 5.5       5.92     4.56     2.46     6.9       1.47     2.11     2.32 6.75 5.84     8.8       7.4       4.72     3.62     2.46     8.75 a....
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT