Question: Module 0 2 Discussion: Stream Ciphers Introduction Suppose Alice needs to securely send one textual message to Bob each day, and that they settle on
Module Discussion: Stream Ciphers
Introduction
Suppose Alice needs to securely send one textual message to Bob each day, and that they settle on the following method of encryption: As the key Alice uses the string of decimal digits formed by the six winning numbers from that day's Irish National Lottery Daily Million drawing to illustrate, if the winning numbers were and she would form the string
In this example she would encrypt her textual message by shifting the first character places ahead in the alphabet, the second place ahead, the third ahead, the fourth ahead, and so on until shifting the eleventh character if there is one ahead.
Finally, if there are more characters to encrypt she would go back to the beginning of her key and shift the next character places ahead, the one following place ahead, and so on
Initial Post
Assuming that Alice and Bob are able to keep their encryption method secret, discuss the security attributes of this cipher. For example, you could use one or more of the following approaches:
Describe the difficulties that Oscar would encounter in trying to decrypt encrypted messages he intercepts.
Compare the security of this cipher to some of the others encountered in our class eg shiftn
Evaluate how effective some of the attacks you have seen in our class would be in this situation.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
