Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Network & Security Expert

Task 1

a. Consider the table showing the relative frequencies of letters in English.

Arrange the frequencies from largest to smallest, and make a cumulative plot, using Excel for example. Which smallest group of letters accounts for at least 50% of all letters used in English?

Requirements:

Include all steps to reach the solution as a clear, well-labelled graph and correct answer to letter set

b. An affine cipher scheme can be mathematically expressed in the following form

c (x) = (ax +β) mod 26.

Here α and β are numbers selected in the range 1 ≤ α , β < 26, and x represents a letter converted to a number using the rule α = 0, b = 1,..., y = 24 and z = 25.

i. What are the α and β values for the Caesar cipher?

Answer:

Show the steps and solution

ii. Encrypt the plaintext "MOUNTPANORAMA" using α = 11 and β = 7.

Answer:

Show the solution plus the transformed alphabet

iii. Why is α = 2 and β = 0 not a good choice of affine cipher parameters when there are 26 letters in the alphabet?

Answer:

Provide a convincing argument supported by worked example

c. An affine cipher does not alter the letter frequencies of the plaintext, but merely rearranges them. Describe a general method for recovering α and β from the two most frequent letters observed in a large amount of ciphertext.

Answer:

Presentation of the argument or proof, using equations, to recover the affine cipher parameters and the use of a supporting example

Task 2

a. The keyspace for a cipher is the set all of possible keys that can be used for the cipher. A

DES key consists of 56 (independent) bits.

i. Express the size of the DES keyspace to the nearest power of 10, and find three examples of physical quantities, or other known values, that are approximately the same size.

Answer:

Correct power of 10, and 3 examples with evidence of correctness

ii. Consider the collection of passwords defined by combinations of digits and letters (both upper and lower case). What password length would be required so that the number of possible passwords is at least the size of the DES keyspace?

Answer:

Correct password length with working solution

b. Encryption is only useful if there is a matching reversible operation called decryption. In a

Feistel cipher, the F-function or round function need not be reversible.

i. Show that F-function of DES is not reversible

Answer:

Provide an example showing that part of all of the DES round function cannot be reversible

ii. Explain how a Feistel cipher whose main component is not reversible can actually support decryption.

Answer:

Provide a correct written description supported by diagram

Task 3

a. Let DESK (P) denote the DES encryption of the plaintext P by the key K.

i. If we set K to be the key consisting of all zeroes, explain why encrypting twice with this key for DES has the same effect as encrypting then decrypting.

Equivalently, account for the following property when using the all-zero key:

DESK (DESK (P) )= P

Answer:

Provide correct argument involving interaction of key schedule, encryption and decryption of DES

ii. Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

Answer:

Provide the correct identification of the additional key and a convincing explanation of the DES key schedule property that produces equivalent keys for encryption and decryption

b. Let b¯ denote the complement of a sequence of bits, so that for example 0100 = 1011. Then considering the round structure of DES, show that

DESK (P) = DESK (P)

In other words, complementing the key, plaintext and ciphertext produces the same

ciphertext as when none of these values is complemented. Hint: Use the following property of

the XOR function X ⊕ X = 0.

Answer:

Provide a correct argument for explaining the reason for the complementation in DES, using diagrams involving the round function

Task 4

a. The basis of differential cryptanalysis is finding a pair of differences (? P,? C) such that plaintext pairs whose XOR difference is ? P lead to a corresponding ciphertext difference ?C after a certain number of rounds. The pair (? P,? C) is called a differential.

The figure below shows a 64-bit differential for DES, which can be written in hexadecimal as

? P = ? C = 40 08 00 00 04 00 00 00

This differential predicts the difference of ciphertexts after 3 rounds with a probability of

1/4x1x1/4 =1/22

i. How many plaintext pairs of difference ? P need to be considered by an attacker on average before ? C is observed as the difference between the ciphertexts after 3 rounds? Hint: How many times on average must you flip a coin before seeing a head?

Answer:

Correct answer with working shown

ii. The differential in the figure above has the property that ? P = ? C after three rounds, and is called iterative since it can be joined to itself to create a differential for a larger number of rounds. What is the probability of this differential if it is extended out to 15 rounds?

Answer:

Correct answer with working shown

iii. The data complexity of a differential attack is the number of pairs needed to recover information about the key. Show that if the attack is using a differential with probability " then the data complexity must be at least 1/" pairs.

Answer:

Correct answer with working shown

iv. Consider a version of DES extended out to 64 rounds, using the same Ffunction, and consider an attack using the iterative differential described in this task. At what round would the data complexity of the attack exceed the amount of available plaintext?

Hint: You may use the data complexity bound from iii.

Answer:

Correct answer with working shown

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M9526275

Have any Question?


Related Questions in Computer Network & Security

Overviewthis assignment has three major aims- to help

Overview This assignment has three major aims: - To help students gain good understanding of theoretical and practical material. - To encourage students to use content analysis summaries to prepare for tests, examination ...

Question for the remaining questions consider a 4-bit block

Question : For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 ...

Question explain the meaning of computer networkingexplain

Question: Explain the meaning of computer networking. Explain the meaning of Information and give at least three examples of it. The response must be typed, single spaced, must be in times new roman font (size 12) and mu ...

What are three ways that even every forecast model should

What are three ways that even every forecast model should be evaluated to obtain the best forecast result.

Suppose there is no inflation and an insurance company

Suppose there is no inflation and an insurance company offers a contract that would pay $500,000 with certainty 50 years from now. What is the most that this contract would be worth today if: 1. The rate of interest is 7 ...

How would you explain the concept of a quality adjusted

How would you explain the concept of a quality adjusted life year? When is it appropriate to use "QALYs" instead of simply improved life expectancy as the outcome measure in an economic evaluation?

You need to prepare packet tracer fileattached pdf contains

You need to prepare packet tracer file attached pdf contains topology and required configurations and assigned ip address. In packet tacer file you need to include banner, router and switches. 1. VLSM Design a) As first ...

Suppose that serendipity bank has excess reserves of 12000

Suppose that Serendipity Bank has excess reserves of $12,000 and check able deposits of $150,000. If the reserve ratio is 20 percent, what is the size of the bank's actual reserves?

Income effects depend on the income elasticity of demand

Income effects depend on the income elasticity of demand for each good that you buy. If one of the goods you buy has a negative income elasticity, that is, it is an inferior good, what must be true of the income elastici ...

Advanced wireless networks assignment -wlan design project

Advanced Wireless Networks Assignment - WLAN Design Project - Description: You need to form a group of at most four students, and select one of the case studies provided in Assessment module on VU Collaborate. In this pr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As