Question: Design Specifications: | Design a digital system, using Logisim, for encrvption - decryption using a 7 bit toy - key with the following functionalitys Use
Design Specifications:
Design a digital system, using Logisim, for encrvptiondecryption using a bit toykey with the following functionalitys
Use the Logisim Keyboard which interfaces with your laptop keyboard to write text. Text will be displayed in four TTV Logisim d'splays.
In the first display you will dlisplay the text as it is typed in the keyboard.
In the second display you will display the encrypted text delivered by the Encryption Subsystem using a bit toykey. The encryption method using the bit key is your decision. The bits in your key will be used, somehow, to change the original bits of each character. The change should be reversible at the decoding stage Hint There are only possible combinations of bits, therefore is very easy to crack the encyption resulting from a single bit toykey if you know the encryption method.
In the third display you will display the text decrypted by your client, using the dient deayption subsystem, at the other end of the channel. You cilent knows the encrption method and also luows the enciptionksy.
In the fouth display vou will display the text decnypted by the Hacker, using the Hacker Key Search and Hacker Decrption subsystems. The hacker luows the encyption method butnot the fit encyption CSTo
Constraints; Spaces are not encrpted. Vou should check the bit representation of apace and somehow vou should leave lit unchanged when it appears in the channel. When there are no characters in the channel the decuption displays are also frozen. Use typeD filp filops if nesded.
T Youmayuse builtin Logisim Blocks if desired Such as Counters and Registers
Hacker applies each possible bitsky and until text becomes intelligibly.
Each key that the Hacker applies should be tried on two to three words or about characters enoughto see a pattern of intelligibly text Hints therefore the clock for the circult that produces each Ker for the Macker shovld be slower than the system clock bookf for information regarding clock division
When text becomes intelligibly hacker stops the search and retains the working ker.
Sesdemonstration videos provided forthe profect
Oplional YHDL Bonus; A working VHDL realization, in addition to Logisim implementation, is worth up to bonus points.
A possible architecture of vour system, using difierent encrptiondecription subsystems, is depicted in the next page
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
