Plain-text using play-fair encryption, Computer Network Security

  1. What is one-time pad for encryption? 
    1. Describe how it offers both Confusion and Diffusion.
    2. Using the letter encoding discussed in class (along with one-time pad), the cipher text,  KITLKE was generated using one-time pad.  What is the one time pad used if the plain text is "thrill"?  What's the key if the plain text was "tiller"?
  2. Encrypt the following plain-text using play-fair encryption scheme. Use WEDNESDAY as the key. Plain Text:  "I DREAM OF RAIN"
  3. Suppose that you have a message consisting of 1024 bits.  Design method that will extend the key that is 64 bits long into a string of 1024 bits.  Encryption is performed by XORing the data bits with the extended key bits.  Discuss the security of this approach.
Posted Date: 3/19/2013 2:15:57 AM | Location : United States

Related Discussions:- Plain-text using play-fair encryption, Assignment Help, Ask Question on Plain-text using play-fair encryption, Get Answer, Expert's Help, Plain-text using play-fair encryption Discussions

Write discussion on Plain-text using play-fair encryption
Your posts are moderated
Related Questions
SDES encryption and decryption

INTRODUCTION TO SECURITY AND PERSONNEL When implementing information security, there are several human resource issues that should be addressed. They are •    Positioning and n

Question 1: (a) (i) Radio waves are subject to several propagation problems. Name any three of them. (ii) A Wi-Fi receiver requires a signal power of 50mW to operate correc

QUESTION a) Below is a capture of an Ethernet II frame which contains an IPv4 packet and a segment. Give the source MAC address in hexadecimal; the source IP address, the uppe

Question: The Wired Equivalent Privacy (WEP) standard was created in order to give wireless networks safety and security features similar to that of wired networks. (a) L

DEPLOYMENT AND IMPLEMENTING OF AN IDS The strategy for deploying IDS should consider various factors. These factors will determine the number of administrators required to insta

QUESTION (a) Discuss why it is considered more secure to use the SET (Secure Electronic Transaction) for e-commerce instead of using SSL (b) Describe how the dual signature

Question 1 a) Explain how CSMA/CD works. b) Describe the term "exponential back-off". c) Describe the differences between "circuit switching" and "packet switching". d) Th

QUESTION: (a) Suppose the graph below, use the Flow Decomposition method to list the cycles and paths produced. (b) Describe how Lower Bounds on Arc Flows are eliminated

Who are the individuals who cause these security problems? Many unauthorized people who cause network security problems for obtaining information about the other users and causi