Question: What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message m before sending it: Protocol A: c= e

  1. What is the difference between diffusion and confusion?[2 Marks]
  2. The sender do the following operations on message m before sending it:
    1. Protocol A:

c=ek1[m h(k2m)]

where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), || indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver.

  1. Protocol B:

c=ek1[m sigkpr(hm)]

Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks].

  1. Given the plaintext {000102030405 060708090A0B0C0D0E0F} and the key you will generate it from your network adaptors(wire or wireless) Mac address according to the following table [15 Marks]:

24bits

16 bits

24 bits

24 bits

16 bits

24 bits

Put the 1st 6 digits of your MAC

Put FFFE

Put the 2nd 6 digits of your MAC

Put again the 1st 6 digits of your MAC

Put FFFE

Put again the 2nd 6 digits of your MAC

128 Bits

  1. Print screen from your MAC address.
  2. Show the original contents of State, displayed as a 4 x 4 matrix.
  3. Show the value of State after initial AddRoundKey.
  4. Show the value of State after SubBytes.
  5. Show the value of State after ShiftRows.
  6. Show the value of State after MixColumns.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!