Let the encrypt function of standard DES be C = E(P, K) where C is the...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Let the encrypt function of standard DES be C = E(P, K) where C is the ciphertext, P is the plaintext, and K is the key. Accordingly, let the decrypt function of DES be P = D(C, K). Suppose that Alice uses a customized cipher C" = D(E(P, K₁), K₂) where K₁ and K₂ are two keys, and Alice then sends C" to Bob. Suppose an attacker happens to know the plaintext P, but he does not know the two keys that was used in the cipher. (a) (2pt) What are the sizes of K₁ and K₂? (b) (6pt) Suppose an attacker knows the cipher text C'. Show that the attacker can figure out the two keys. Please elaborate your attack with diagrams. (c) (2pt) How could you modify the customized cipher and improve its security with- out adding another key? Why it becomes more secure? Please explain your answer. Let the encrypt function of standard DES be C = E(P, K) where C is the ciphertext, P is the plaintext, and K is the key. Accordingly, let the decrypt function of DES be P = D(C, K). Suppose that Alice uses a customized cipher C" = D(E(P, K₁), K₂) where K₁ and K₂ are two keys, and Alice then sends C" to Bob. Suppose an attacker happens to know the plaintext P, but he does not know the two keys that was used in the cipher. (a) (2pt) What are the sizes of K₁ and K₂? (b) (6pt) Suppose an attacker knows the cipher text C'. Show that the attacker can figure out the two keys. Please elaborate your attack with diagrams. (c) (2pt) How could you modify the customized cipher and improve its security with- out adding another key? Why it becomes more secure? Please explain your answer.
Expert Answer:
Answer rating: 100% (QA)
a Sizes of K and K The sizes of K and K are both the same as the block size of the DES algorithm DES ... View the full answer
Related Book For
Discrete and Combinatorial Mathematics An Applied Introduction
ISBN: 978-0201726343
5th edition
Authors: Ralph P. Grimaldi
Posted Date:
Students also viewed these programming questions
-
sin x / x type 0/0 a) { lim_{x -> 0} [ (sin 4x) / (3x)] b) { lim_{x -> 0} [ (tan 2x) / (sin 3x) ] } 2.
-
Planning is one of the most important management functions in any business. A front office managers first step in planning should involve determine the departments goals. Planning also includes...
-
Write a SET client SpellChecker that takes as a commandline argument the name of a file containing a dictionary of words, and then reads strings from standard input and prints any string that is not...
-
Import the salary data for the Baltimore Ravens NFL team from the website http://www.sportscity.com/nfl/salaries/baltimore-ravens-salaries/. Can you import data from other NFL teams from similar...
-
Toys ?R? Us sells a variety of children?s toys, games, books, and accessories. Assume that a local store has the following amounts for the month of March 2021. Required: 1. Prepare a multiple-step...
-
What are the differences between sales management and marketing management?
-
Nandita Summers works at Modus, a store that caters to fashion for young adults. Nandita is responsible for the store?s online advertising and promotion budget. For the past year, she has studied...
-
For this assignment will have two tasks using the links provided : DOWNLOAD AND RUN THE WHOLE PROCESS IN MAC OS 1. Download and Install MSSQL following the process in this resource: How to...
-
The data in Table 6E.3 represent the results of inspecting all units of a personal computer produced for the past 10 days. Does the process appear to be in control? Inspected Nonconforming Fraction...
-
Develop a Python program to sort a list of strings based on the length of each string, from shortest to longest. If two strings have the same length, maintain their original order.
-
2. For the following recurrences, use the recursion tree method to find a good guess of what they solve to asymptotically (i.e. in big-Oh notation). Assume T(1) = 1. (a) T(n) = 3T(n/3) + n for n > 1....
-
Your company uses Azure Virtual Desktop ( AVD ) and Microsoft Entra Domain Services for authentication. You create an Azure storage account named Storage 1 and a new File share named FileShare 1 ....
-
1. Debug the following code by compiling it for debugging and executing it within a debugger. At which line of code does the program crash? Why does it crash there? #include #include main(int argc,...
-
What is the parenthesis notation for this cons cell structure? BOWS ARROWS NIL FLOWERS NIL NIL CHOCOLATES
-
b a $po8.08 91 92 a 90 a b b a, b 93 94 Describe (in English) the kinds of strings accepted by this Finite State Machine. (b) Write the formal mathematical definition of this DFA (5-tuple), including...
-
Write a definite integral that represents the area of the region. (Do not evaluate the integral.) Y = 5(x - x) y2 = 0 40 dx WebAssign Plot -1.5 -1.0 -0.5 Need Help? Read It y Watch It 2
-
Express these numbers in standard notation. a. 2.87 10-8 b. 1.78 1011 c. 1.381 10-23
-
In how many ways can one arrange all of the letters in the word INFORMATION so that no pair of consecutive letters occurs more than once? [Here we want to count arrangements such as IINNOOFRMTA and...
-
(a) Compute M2, M3, and M4. (b) Conjecture a general formula for Mn, n Z+, and establish your conjecture by the Principle of Mathematical Induction. Let 2 M=
-
Find all real numbers x such that (a) 7[x] = [7x] (b) [7x] = 7 (c) [x + 7 ] = x + 7 d) [x + 7] = [x] + 7
-
What is a computer service center? Are the auditors of a client that uses a service center concerned about the controls applied at the organization? Explain.
-
What is a dual-purpose test?
-
If you were preparing a credit sales system flowchart, what document would you show as: a. The source for posting debits to a customers account in the accounts receivable ledger? b. Authorization to...
Study smarter with the SolutionInn App