Question: b) A simple crypto algorithm is used to protect data from unauthorised users. The plain text (the unprotected data) of 8-bit size is fed

b) A simple crypto algorithm is used to protect data from unauthorised  


b) A simple crypto algorithm is used to protect data from unauthorised users. The plain text (the unprotected data) of 8-bit size is fed to the avr32 microcontroller that runs the algorithm. The algorithm uses an 8-bit secret key known only to both the sender and the recipent. The output is an 8-bit size ciphertext (protected data). The crypto algorithm will process the data according to the following steps: i. Exor the plaintext with key. ii. Shift left the data 2 times iii. EX-OR with key iv. Shift right the data 3 times v. EX-OR with key Write the C program to perform the processes. Produce the ciphertext for Plaintext=0x24 and Key=0x28. Use the appropriate registers to store the data and the key. (11 Marks)

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock

Here is a C program that performs the described crypto algorithm to produce the ciphertex... View full answer

blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!