Encrypt block in block cipher using key

Assignment Help Computer Network Security
Reference no: EM1370502

Assume that there is a block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. We know that ABC will be broken even using simple brute-force attacking by guessing the encryption key. To enhance the security level, assume that someone proposes to use XYZ by use of 2 encryptions of ABC with 2 different independent keys. Prove that XYZ does not provide a much stronger security than ABC. Prove in detail why this statement is true. (You have to analyze in detail a method attacking XYZ using time that is not much longer than the brute force attacking on ABC.)

Reference no: EM1370502

Questions Cloud

Determining costs and maximizing profits for monopoly : A monopolist has demand and cost curves given by: Find out the quantity that maximizes profit? What is the revenue and profit at that point?
Determine smallest value of x for which is safe state : System has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows: Determine the smallest value of x for which this safe state.
Determining monopoly price-profit-maximizing output : Assume that the monopoly faces the inverse market demand function: What should be the monopoly's profit-maximizing output?
Explain comprehensive disaster recovery plan for network : Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.
Encrypt block in block cipher using key : Suppose that there is block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. Prove that XYZ doesn't give much stronger security than ABC.
Characteristics of a statement of cash flow : Discuss and explain the reasons why net income for a particular period does not necessarily reflect a firm's cash flow during that same period.
Computing optimal output of competitive firm : It is supposed that the liquid soap market is perfectly competitive and current price of a case of liquid soap is $42.00. The firm has estimated it's marginal cost function to be as follows: MC=0.006Q.
Find the total current market value of firm debt : In order to accurately assess the capital structure of a company, it is necessary to convert its balance sheet figures to a market value basis. KJM Company's balance sheet as of today,
Determine the size for variables used in matlab program : If b=3, a=6 how many loops would the given program do? what will be the out put for z(4)? what would be size (in rows and columns) for variables z, i and b?

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Demonstrate that hash value collides with original value

Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash.

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  Explaining wan links for point-to-point home office address

Servers, administrative and support users 2 subnets with 50 hosts for faculty & student labs 10 or more WAN links for point-to-point home office address. Design the subnet?

  Describe diffie-hellman algorithm to exchange shared key

User A and B use Diffie-Hellman algorithm to exchange a shared key and generate public keys of their own. Consider a common prime number q=71If user A has private key=5, what is A's public key?

  Find time when station c hears the collision

The size of the frame is long enough to guarantee the detection of collision by both stations. Find: The time when station C hears the collision (t3).

  Comparison of voice and ear biometrics

Need assistance on how to write a good report on named "comparison of Voice and ear Biometrics as a measure to passport control"

  Describe options for improving the ftp environment

Write a 1-2 page document that describes the options for improving the FTP environment described. Make a recommendation for a single solution for the FTP environment.

  Implement encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Defects of gsm networks

Security mechanism, threat, GSM networks, DDoS attacks, IPv4, IPv6, IPsec integrity, authentication and privacy, IPsec AH,  ‘single sign-on' in the context of access control, Secure Electronic Transaction (SET) protoco,  Encryption

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Advantage and disadvantage of key diversi?cation

Sally generates key KA when required as KA = h(Alice,KS ),with keys KB and KC generated in similar manner. Explain one advantage and one disadvantage of key diversi?cation.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd