Task 5: Error Propagation Corrupted Cipher Text To understand the error propagation property of various encryption
Question:
Task 5: Error Propagation – Corrupted Cipher Text To understand the error propagation property of various encryption modes, we would like to do the following exercise: 1. Create a text file that is at least 1000 bytes long. 2. Encrypt the file using the AES-128 cipher. 3. Unfortunately, a single bit of the 55th byte in the encrypted file got corrupted. You can achieve this corruption using the bless hex editor. 4. Decrypt the corrupted ciphertext file using the correct key and IV. SEED Labs – Secret-Key Encryption Lab 5 Please answer the following question: How much information can you recover by decrypting the cor- rupted file, if the encryption mode is ECB, CBC, CFB, or OFB, respectively? Please answer this question before you conduct this task, and then find out whether your answer is correct or wrong after you finish this task. Please provide justification. With Hxd in windows with screen shots?
Income Tax Fundamentals 2013
ISBN: 9781285586618
31st Edition
Authors: Gerald E. Whittenburg, Martha Altus Buller, Steven L Gill