Question: Question 2: Answer the following questions: -[25 Marks] What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message

 Question 2: Answer the following questions: -[25 Marks] What is the

Question 2: Answer the following questions: -[25 Marks] What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message m before sending it: Protocol A: c=e_k1 [m h(k_2m)] where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), || indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver. Protocol B: c=e_k1 [m sigk_pr (h(m))] Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks]. Given the plaintext {000102030405 060708090A0B0C0D0E0F} and the key you will generate it from your network adaptors(wire or wireless) Mac address according to the following table [15 Marks]: 24bits 16 bits 24 bits 24 bits 16 bits 24 bits Put the 1st 6 digits of your MAC Put FFFE Put the 2nd 6 digits of your MAC Put again the 1st 6 digits of your MAC Put FFFE Put again the 2nd 6 digits of your MAC 128 Bits Print screen from your MAC address. Show the original contents of State, displayed as a 4 x 4 matrix. Show the value of State after initial AddRoundKey. Show the value of State after SubBytes. Show the value of State after ShiftRows. Show the value of State after MixColumns.

Question 2: Answer the following questions: -25 Marks a) What is the difference between diffusion and confusion? [2 marks] b) The sender do the following operations on message m before sending it: 1. Protocol A: c = exim || h(k2 || m) where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function (such as SHA-1), "II" indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver. 2. Protocol B: c = ex1 [m || sigkpr(h(m))] Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks]. c) Given the plaintext {000102030405 060708090AOBOCODOEOF} and the key you will generate it from your network adaptor's(wire or wireless) Mac address according to the following table (15 Marks]: 24bits 16 bits 24 bits 24 bits 16 bits 24 bits Put again the 2nd 6 Put the 1st 6 digits of your MAC Put FFFE Put the 2nd 6 Put again the digits of your 1st 6 digits of MAC 128 Bits Put FFFE your MAC digits of your MAC 1) Print screen from your MAC address. 2) Show the original contents of State, displayed as a 4 x 4 matrix. 3) Show the value of State after initial AddRoundKey. 4) Show the value of State after SubBytes. 5) Show the value of State after ShiftRows. 6) Show the value of State after MixColumns

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!