Plain-text using play-fair encryption, Computer Network Security

  1. What is one-time pad for encryption? 
    1. Describe how it offers both Confusion and Diffusion.
    2. Using the letter encoding discussed in class (along with one-time pad), the cipher text,  KITLKE was generated using one-time pad.  What is the one time pad used if the plain text is "thrill"?  What's the key if the plain text was "tiller"?
  2. Encrypt the following plain-text using play-fair encryption scheme. Use WEDNESDAY as the key. Plain Text:  "I DREAM OF RAIN"
  3. Suppose that you have a message consisting of 1024 bits.  Design method that will extend the key that is 64 bits long into a string of 1024 bits.  Encryption is performed by XORing the data bits with the extended key bits.  Discuss the security of this approach.
Posted Date: 3/19/2013 2:15:57 AM | Location : United States







Related Discussions:- Plain-text using play-fair encryption, Assignment Help, Ask Question on Plain-text using play-fair encryption, Get Answer, Expert's Help, Plain-text using play-fair encryption Discussions

Write discussion on Plain-text using play-fair encryption
Your posts are moderated
Related Questions
Develop a TCP-based client-server socket program for transferring a large message. The message transmitted from the client to server is read from a large file (size is about 30000

attacks on crytography

Question: (a) What is the use of digital certificate? (b) What is meant by a hierarchical trust model in a Public Key Infrastructure? How does the Pretty Good Privacy (PG

RISK ASSESSMENT Risk assessment is a step in a risk management technique. Risk assessment is the determination of quantitative or qualitative value of risk related to a concrete

Question: (a) Distinguish between Steganograhy and Cryptography. (b) "Playfair cipher is more secure than Monoalphabetic cipher." Justify this statement. (c) Various ap

Question: (a) Mention three limitations of a firewall. (b) Compare packet-filtering and proxy-base firewalls. Give advantages and drawbacks of both. (c) "Proxies eff

Risk Identification Risk management comprises of identifying, classifying and prioritizing organization’s information assets, threats and vulnerabilities also. Risk Identificati


Question: (a) Explain how the Diffie-Hellman key establishment protocol works. (b) Prove that the Diffie-Hellman key establishment protocol is vulnerable to a `man in the mi

MegaCorp INC. is a large manufacturing firm that operates 5 factories in Dallas, 4  factories in Los Angeles, and 5 factories in Albany, New York.  It operates a tightly  connected