Question: Design Specifications: | Design a digital system, using Logisim, for encrvption - decryption using a 7 bit toy - key with the following functionalitys Use

Design Specifications:|
Design a digital system, using Logisim, for encrvption-decryption using a 7 bit toy-key with the following functionalitys
Use the Logisim Keyboard (which interfaces with your laptop keyboard) to write text. Text will be displayed in four TTV Logisim d'splays.
In the first display you will dlisplay the text as it is typed in the keyboard.
In the second display you will display the encrypted text delivered by the Encryption Sub-system using a7 bit toy-key. The encryption method using the 7 bit key is your decision. The 7 bits in your key will be used, somehow, to change the original 7 bits of each character. The change should be reversible at the decoding stage Hint There are only 128 possible combinations of 7 bits, therefore is very easy to crack the encyption resulting from a single 7 bit toy-key if you know the encryption method.
In the third display you will display the text decrypted by your client, using the dient deayption subsystem, at the other end of the channel. You cilent knows the encrption method and also luows the enciptionksy.
In the fouth display vou will display the text decnypted by the Hacker, using the Hacker Key Search and Hacker Decrption sub-systems. The hacker luows the encyption method butnot the r fit encyption CSTo
Constraints; Spaces are not encrpted. Vou should check the 7 bit representation of apace and somehow vou should leave lit unchanged when it appears in the channel. When there are no characters in the channel the decuption displays are also frozen. Use type-D filp filops if nesded.
T. Youmayuse builtin Logisim Blocks if desired (Such as Counters and Registers).
Hacker applies each possible 7-bitsky and until text becomes intelligibly.
Each key that the Hacker applies should be tried on two to three words or about 20 characters (enoughto see a pattern of intelligibly text). Hints therefore the clock for the circult that produces each Ker for the Macker shovld be slower than the system clock (bookf for information regarding clock division).
When text becomes intelligibly hacker stops the search and retains the working ker.
Sesdemonstration videos provided forthe profect
Oplional YHDL Bonus; A working VHDL realization, in addition to Logisim implementation, is worth up to 6 bonus points.
A possible architecture of vour system, using difierent encrption-decription subsystems, is depicted in the next page
 Design Specifications:| Design a digital system, using Logisim, for encrvption-decryption using

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!