Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Exercises

You must type your answers in a word processing system, and create a PDF.

You can work on your own, or you can work in pairs. If you work in a pair, only one of you should submit the answers (of course, both will get the credit). Please note on your answers that you worked as a pair, and please mention both IDnumbers.

1. Assume a simple two round Feistel block cipher with an 8 bit key and 16 bit block size. We have two rounds, with i = 0 and i = 1, and two round keys.

Theround keys are defined as Ki = K + 75 → i (mod256). The Feistel function is f(Ki, Ri) = 127? (Ki + Ri) (mod256), where Ri id the decimal representation of the right 8 bit sof the in put block.

Encrypt the message block M = (V, S) with key K = Y. Use the ASCII encoding of capital letters where A is encoded as 65. It is sufficient to give your result as apair of decimalnumbers.

2. For each of the following block ciphers E1and E2, explain whether the cipher is a secure pseudorandom permutation. (In both cases, the key size and the block size are 128bits.)
(a) E1(k, m) = km.
(b) E2(k, m) = (m - k mod 2128) k.

3. Compute the following:
(a) 1234567890 ?5678901234 mod 7890123456.
(b) (x2+ 1)(x3+ x + 1) mod x4+ x+1.

4. Let E be a secure block cipher (say, AES). Consider each of the following modes of operation. For each one, say whether it is secure or not, and briefly explain youranswer.

(a) Theen cryption by kof m1||m2||...||mnisc0||c1||c2||...||cn,wherec0 is a randomly chosen "initialisation vector" of appropriate size, and
ci= E(k, mi) ci-1(i>0).

(b) Theen cryption by kofm1||m2||...||mnisN||c1||c2||...||cn,whereN is a randomly chosen nonce of appropriate size, and ci= E(k,N mi).

5. Find the first 20 bytes of the output of the RC4 algorithm when run with the key K = [1,2,3].

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92484523
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Your solution will entail writing a function called

Your solution will entail writing a function called TimeDifference and a test main that demonstrates that you can compute the time difference in minutes between the two times. TimeDifference is a function that receives a ...

A small library keeps a roster of who will be at the desk

A small library keeps a roster of who will be at the desk each day. They have a database table as shown below. Week Start___Mon___Tue____Wed_____Thur____Fri 17/10/2011 -- Jane -- Sue -- George -- Sue -- Jane 24/10/2011 - ...

Consider the following production function that is already

Consider the following production function that is already written in per worker terms: y = Akαh 1-α where h represents human capital per worker. Suppose we are given the following information: capital per worker in an e ...

Is smartart graphic and table slide important for

Is Smartart graphic and Table slide important for PowerPoint Presentation? How would it benefit?

Answer the following question where does the responsibility

Answer the following Question : Where does the responsibility of the software developer reside in considering the discrimination in techonology based on gender race and disability? How do you think it affects you as a pr ...

Rock paper scissors please make sure it compiles and

Rock, Paper, Scissors (Please make sure it compiles and include output in answer.) You will implement a rock-paper-scissors game. The player enters 1 for Rock, 2 for Paper, or 3 for Scissors. The computer randomly select ...

How to design a java program that reads a sentence say s

How to design a Java program that reads a sentence, say s, consisting of lower-case words with .nextLine() method, identifies the words using .indexOf() and .substring() methods and saves them in String variables. Then t ...

We can sort a given set of n numbers by first building a

We can sort a given set of n numbers by first building a BST containing these numbers (using insertion operations on each element one by one), and then printing the numbers by an inorder traversal. What are the worst cas ...

Question suppose a task consists of 40 cpu access 20 memory

Question : Suppose a task consists of 40% CPU access, 20% memory access and 40% disk access. A CPU with 8 cores provides an effective speedup of only 4 over a singlecore CPU. What is system speed up (as defined by Amdahl ...

Suppose that we want to convert the small computer into a

Suppose that we want to convert the small computer into a 16- bit RISC type of processor (address and data buses are both 16-bits wide and each instruction is supposed to occupy 16 bits in the instruction memory). If the ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As