Question

In: Advanced Math

Suppose Alice is using a block cipher to send the message THE ORDER IS KARL, ANDY,...

Suppose Alice is using a block cipher to send the message
THE ORDER IS KARL, ANDY, FRED AND IAN. IAN AND ANDY HAVE LEFT.

to Bob. Assume that

  • the block cipher is used in ECB mode,

  • the English is divided into plaintext blocks of 2 letters (ignore spaces and punctuation)

  • the ciphertext blocks are denoted C1,C2,...,C23

    (a) Write down the 23 plaintext blocks.
    (b) Will any of the ciphertext blocks be repeated? If so, which ones?
    (c) Suppose an attacker manipulates the ciphertext so that instead of receiving C1,C2,...,C23.

    Bob receives

C1, C2, C3, C4, C5, C10, C11, C6, C7, C8, C9, C12, C13, C14, C15, C16, C17, C6, C7, C20, C21, C22, C23

What does Bob think the message Alice sent is? (add spaces and punctuation)

(d) If Bob receives

C10, C8, C6, C17, C6, C7, C20, C21, C22, C23
what does he think the message is? (add spaces and punctuation)

(e) Find another sequence of ciphertext blocks that decrypts to a plausible plaintext sentence of at least five words (add spaces and punctuation to your sentence).

Solutions

Expert Solution


Related Solutions

Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public...
Alice wants to send a plaintext message m = 10 to Bob secretly using RSA public key cryptosystem. Bob selects p = 7, and q = 13 with e = 5. You have to perform following tasks: a. Compute and list Bob’s public and private keys. b. Compute the ciphertext that Alice will send to Bob using plaintext message m = 10. c. Recover the actual plaintext from the ciphertext sent by Alice
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q...
RSA: Alice wishes to send Bob the message POET. Suppose Bob chooses P = 29, Q = 31, E = 47, and D = 143. Show the steps that Alice uses to encrypt the message POET (use the ascii values of the letters P, O, E, and T), and how Bob decrypts the message he receives from Alice. You will be generating very large numbers, and will find the following calculator helpful: https://www.calculator.net/big-number-calculator.html
Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011...
Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011 Cx=x3+x2+1 Q2) Explain how the ‘Stop and Wait’ flow control method is working? Q3) Explain the differences between Go-Back-N and Selective Repeat sliding window flow control methods? Using CRC method, calculate the Checksummed message to send throw the medium if: Message = 101011 Cx=x3+x2+1 Q2) Explain how the ‘Stop and Wait’ flow control method is working? Q3) Explain the differences between Go-Back-N and Selective...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES:...
Write a Java program to encrypt the following message using the RC4 cipher using key CODES: Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25 (hence CODES = [2 14 3 4 18]). Ignore spaces and punctuations and put...
Q4: Suppose you want to send a 5000 character message, using 7-bit ASCII encoding. How many...
Q4: Suppose you want to send a 5000 character message, using 7-bit ASCII encoding. How many TOTAL bits would need to be transmitted using an asynchronous connection? How many of those bits are overhead? How many TOTAL bits would need to be transmitted using a synchronous connection? How many of those bits are overhead? For the synchronous connection, each frame can hold 1000 characters, and has a start byte flag, a stop byte flag, a control byte, a 2 byte...
Write a Java program that uses the RC4 cipher algorithm to encrypt the following message using...
Write a Java program that uses the RC4 cipher algorithm to encrypt the following message using the word CODES as the key:   Cryptography is a method of protecting information and communications through the use of codes so that only those for whom the information is intended can read and process it. Instead of using stream length 256, we will use length 26. When encrypting, let A = 0 to Z = 25. Ignore spaces and punctuations and put the message...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the...
Alice is sending message “HIDE” to Bob. Perform encryption and decryption using RSA algorithm, with the following information: parameters p=11,q=5, e=7 Present all the information that you will need to encrypt and decrypt only the first letter from text
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given...
(a) Use Vigenere cipher to encrypt the message “United States Constitution” using the keyword      “covid” Given that the Vigenere cipher of part (a) with the same keyword was used to produce the ciphertext: VFPUSVSNBVRCNQW Find the plaintext message.        
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext:...
A message has been encrypted by Bob using row transposition cipher to give the following ciphertext: TTNA APTM TSUO AODW COIX KNLY PETZ However when Bob shared the key with Alice, it got copied multiple times and looks like: …. 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 5 6 7 4 3 1 2 …… You see a series of...
Q2.1 [RSA Signature Scheme] (Marks: 2) Suppose Bob (the sender) wants to send a message m=123456...
Q2.1 [RSA Signature Scheme] (Marks: 2) Suppose Bob (the sender) wants to send a message m=123456 to Alice (the receiver). However, before sending the message he would like to sign the message. When Alice receives the signed message, she would like to verify that the message is indeed from Bob. To facilitate signing and verification Bob generates public and private keys using RSA encryption algorithm and sends the public key to Alice. Bob uses parameter p = 5563 and q...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT