Plain-text using play-fair encryption, Computer Network Security

  1. What is one-time pad for encryption? 
    1. Describe how it offers both Confusion and Diffusion.
    2. Using the letter encoding discussed in class (along with one-time pad), the cipher text,  KITLKE was generated using one-time pad.  What is the one time pad used if the plain text is "thrill"?  What's the key if the plain text was "tiller"?
  2. Encrypt the following plain-text using play-fair encryption scheme. Use WEDNESDAY as the key. Plain Text:  "I DREAM OF RAIN"
  3. Suppose that you have a message consisting of 1024 bits.  Design method that will extend the key that is 64 bits long into a string of 1024 bits.  Encryption is performed by XORing the data bits with the extended key bits.  Discuss the security of this approach.
Posted Date: 3/19/2013 2:15:57 AM | Location : United States







Related Discussions:- Plain-text using play-fair encryption, Assignment Help, Ask Question on Plain-text using play-fair encryption, Get Answer, Expert's Help, Plain-text using play-fair encryption Discussions

Write discussion on Plain-text using play-fair encryption
Your posts are moderated
Related Questions
GROWTH OF LAN TECHNOLOGY The production of shared communication channels (LANs) started in 1960s and early 1970. The basic idea behind was to reduce the number of connectio

Your rules should ensure that Internet access will be restricted to the following: Only the following services will be permitted as OUTBOUND traffic (to the Internet from the DM

COLLISION DETECTION The signals from two devices will interfere with each other and the overlapping of frames is known a collision. It does not cause to the hardware but data

VIRTUAL PACKETS These data packets serve same reason in Internet as frames on LAN. Every packet has a header. Routers, which are normally gateways, transfer packets between ph

Consider a computer system with three users: Alice, Bob and Cindy. Alice owns the file alicerc, and Bob and Cindy can read it. Cindy can read and write the file bobrc, which Bob ow

Question: a) There are two basic approaches to dealing with errors in the presence of pipelining. One way is Go-Back-N and the other strategy is Selective Repeat. i. Explain

Belady's Anomaly Also known FIFO anomaly. Generally, on raising the number of frames given to a process' virtual storage, the program execution is faster, because lesser page

Question: (a) What is the major problem with public key encryption when compared to symmetric key encryption? (b) Consider the following protocol for communication between t

#Under what circumstances would the use of a SecSDLC be more appropriate than an SDLC?

Get a copy of Metasploitable at Make">http://sourceforge.net/projects/metasploitable/files/Metasploitable2/ Make sure to follow these directions very carefully. You will get po