Question: Question 5: Following data is received from server and it is understood that server uses 2D ODD Parity check for error detection. Should the following

Question 5: Following data is received from server and it is understood that server uses 2D ODD Parity check for error detection. Should the following data be accepted or not? Justify. (6) Data = 101111111101000000110100010110110010010001110110001110 Answer: Question 6: Calculate and Verify Checksum of the following data given in Hexadecimal Notation. (10) Data = FF56,8956, 9087, FE34, B4E2, D4C8 Answer: Question 7: AES is the current standard in the Symmetric cryptography, Apply the following list of functions (by hand) on the given input state and key in the given order. (10) Add Round Key Substitute Bytes Shift Rows Mix Rows (first column only) 54 B3 Input State: F2 31 89 90 FE D6 C5 F4 42 75 A7 E9 23 01 Key : 23 67 01 45 ab ef 89 cd 98 fe dc 54 ba 32 10 76 Answer: Question 8: RSA is most widely used asymmetric key cipher. Let us suppose we captured 11 as cipher text over the internet. It is encrypted using public key (e, n) = (23, 221). Calculate the corresponding plaintxt. (8) Answer: Question 5: Following data is received from server and it is understood that server uses 2D ODD Parity check for error detection. Should the following data be accepted or not? Justify. (6) Data = 101111111101000000110100010110110010010001110110001110 Answer: Question 6: Calculate and Verify Checksum of the following data given in Hexadecimal Notation. (10) Data = FF56,8956, 9087, FE34, B4E2, D4C8 Answer: Question 7: AES is the current standard in the Symmetric cryptography, Apply the following list of functions (by hand) on the given input state and key in the given order. (10) Add Round Key Substitute Bytes Shift Rows Mix Rows (first column only) 54 B3 Input State: F2 31 89 90 FE D6 C5 F4 42 75 A7 E9 23 01 Key : 23 67 01 45 ab ef 89 cd 98 fe dc 54 ba 32 10 76 Answer: Question 8: RSA is most widely used asymmetric key cipher. Let us suppose we captured 11 as cipher text over the internet. It is encrypted using public key (e, n) = (23, 221). Calculate the corresponding plaintxt. (8)
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
