Question: Network Security 1. Consider the simple substitution-permutation network discussed in class. Show how you get the ciphertext from the plaintext through XORing the round keys,

Network Security

1. Consider the simple substitution-permutation network discussed in class. Show

how you get the ciphertext from the plaintext through XORing the round keys,

performing the substitutions, and the permutations.

2. Factorize 96037 by brute force. You can find a list of prime numbers at

http://en.wikipedia.org/wiki/List_of_prime_numbers. Remember that you have

to try all prime numbers till 96037. You can write code to do this in Java, C, Swift,

Python, or another language of your choice.

3. Consider a simple (not secure) version of RSA. Here n = 711 = 77 and F(n) = 610

= 60. If the public key is b = 11, find the ciphertext y if the plaintext is x =10. If Bob

gets this ciphertext from Alice, what does he need to compute

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!