Question: 4 Task 4 : Error Propagation - Corrupted Cipher Text To understand the error propagation property of various encryption modes, we would like to do
Task : Error Propagation Corrupted Cipher Text
To understand the error propagation property of various encryption modes, we would like to do the
following exercise:
Create a text file that is at least bytes long.
Encrypt the file using the AES cipher.
Unfortunately, a single bit of the th byte in the encrypted file got corrupted. You can achieve this
corruption using the bless hex editor.
Decrypt the corrupted ciphertext file using the correct key and IV
Submission for Task points
Please answer the following question before you conduct this task: How much information can you
recover by decrypting the corrupted file, if the encryption mode is ECB, or OFB
respectively? points
Please find out whether your answer is correct or wrong after you finish this task. Please provide
justification. Specifically, please attach the screenshot of decrypted ciphertext in Step and calculate
how many bits are flipped compared with the plaintext. points
Task : Programming using the Crypto Library
In this task, you are given a plaintext and a ciphertext, and your job is to find the key that is used for the
encryption. You do know the following facts:
The aescbc cipher is used for the encryption.
The key used to encrypt this plaintext is an English word shorter than characters; the word can
be found from a typical English dictionary. Since the word has less than characters ie
bits pound signs #: hexadecimal value is are appended to the end of the word to form a
key of bits.
Your goal is to write a program to find out the encryption key. Please the English word list attached in this
lab assignment. The plaintext, ciphertext, and IV are listed in the following:
Plaintext total characters: This is a top secret.
Ciphertext in hex format: bfaadbbebadcfa
aafbecbdebfc
IV in hex format: aabbccddeeff
Submission for Task points
Please write a program to find out the encryption key. Please attach the screenshot of your program.
You can use any programming language that you are familiar with to conduct this task. points
What is the key used in this task? points
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
