Question: Question 2: Answer the following questions: -[25 Marks] What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message
![Question 2: Answer the following questions: -[25 Marks] What is the](https://dsd5zvtm8ll6.cloudfront.net/si.experts.images/questions/2024/09/66f3d90aa5f92_84266f3d90a2ec34.jpg)
Question 2: Answer the following questions: -[25 Marks] What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message m before sending it: Protocol A: c=e_k1 [m h(k_2m)] where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), || indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver. Protocol B: c=e_k1 [m sigk_pr (h(m))] Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks]. Given the plaintext {000102030405 060708090A0B0C0D0E0F} and the key you will generate it from your network adaptors(wire or wireless) Mac address according to the following table [15 Marks]: 24bits 16 bits 24 bits 24 bits 16 bits 24 bits Put the 1st 6 digits of your MAC Put FFFE Put the 2nd 6 digits of your MAC Put again the 1st 6 digits of your MAC Put FFFE Put again the 2nd 6 digits of your MAC 128 Bits Print screen from your MAC address. Show the original contents of State, displayed as a 4 x 4 matrix. Show the value of State after initial AddRoundKey. Show the value of State after SubBytes. Show the value of State after ShiftRows. Show the value of State after MixColumns.
Question 2: Answer the following questions: -25 Marks a) What is the difference between diffusion and confusion? [2 marks] b) The sender do the following operations on message m before sending it: 1. Protocol A: c = exim || h(k2 || m) where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function (such as SHA-1), "II" indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver. 2. Protocol B: c = ex1 [m || sigkpr(h(m))] Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks]. c) Given the plaintext {000102030405 060708090AOBOCODOEOF} and the key you will generate it from your network adaptor's(wire or wireless) Mac address according to the following table (15 Marks]: 24bits 16 bits 24 bits 24 bits 16 bits 24 bits Put again the 2nd 6 Put the 1st 6 digits of your MAC Put FFFE Put the 2nd 6 Put again the digits of your 1st 6 digits of MAC 128 Bits Put FFFE your MAC digits of your MAC 1) Print screen from your MAC address. 2) Show the original contents of State, displayed as a 4 x 4 matrix. 3) Show the value of State after initial AddRoundKey. 4) Show the value of State after SubBytes. 5) Show the value of State after ShiftRows. 6) Show the value of State after MixColumns
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
