Question: What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message m before sending it: Protocol A: c= e
- What is the difference between diffusion and confusion?[2 Marks]
- The sender do the following operations on message m before sending it:
- Protocol A:
c=ek1[m h(k2m)]
where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), || indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver.
- Protocol B:
c=ek1[m sigkpr(hm)]
Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks].
- Given the plaintext {000102030405 060708090A0B0C0D0E0F} and the key you will generate it from your network adaptors(wire or wireless) Mac address according to the following table [15 Marks]:
| 24bits | 16 bits | 24 bits | 24 bits | 16 bits | 24 bits |
| Put the 1st 6 digits of your MAC | Put FFFE | Put the 2nd 6 digits of your MAC | Put again the 1st 6 digits of your MAC | Put FFFE | Put again the 2nd 6 digits of your MAC |
| 128 Bits | |||||
- Print screen from your MAC address.
- Show the original contents of State, displayed as a 4 x 4 matrix.
- Show the value of State after initial AddRoundKey.
- Show the value of State after SubBytes.
- Show the value of State after ShiftRows.
- Show the value of State after MixColumns.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
