Plain-text using play-fair encryption, Computer Network Security

  1. What is one-time pad for encryption? 
    1. Describe how it offers both Confusion and Diffusion.
    2. Using the letter encoding discussed in class (along with one-time pad), the cipher text,  KITLKE was generated using one-time pad.  What is the one time pad used if the plain text is "thrill"?  What's the key if the plain text was "tiller"?
  2. Encrypt the following plain-text using play-fair encryption scheme. Use WEDNESDAY as the key. Plain Text:  "I DREAM OF RAIN"
  3. Suppose that you have a message consisting of 1024 bits.  Design method that will extend the key that is 64 bits long into a string of 1024 bits.  Encryption is performed by XORing the data bits with the extended key bits.  Discuss the security of this approach.
Posted Date: 3/19/2013 2:15:57 AM | Location : United States







Related Discussions:- Plain-text using play-fair encryption, Assignment Help, Ask Question on Plain-text using play-fair encryption, Get Answer, Expert's Help, Plain-text using play-fair encryption Discussions

Write discussion on Plain-text using play-fair encryption
Your posts are moderated
Related Questions
IP DATAGRAM SIZE:  Datagrams may have different sizes i.e. Header area is generally fixed (20 octets) but can have various options. Data area may contain between 1 octet and 6

BUS TOPOLOGY In a bus topology all devices are attached to a single long cable and any device can send data to any other device. For this function, coordination is needed to d

how to form the trojan integrated cirucit and what are the tools are used to simulate the ciruit to our system and how to pass it as input to the clustering algorithm to get the ou

Question a) From the capture below: Give the datagram source IP address, upper layer protocol, Total length in decimal and header checksum in hexadecimal; the segment source po

Question: (a) What is Network Address Translation (NAT)? Why is it used? (b) Given a following information by your ISP about your newly acquired Frame Relay connection:

Illustrate about TinySec Protocol TinySec is implemented on the link layer and addresses security requirements of the resource staffed nodes in the WSN based on the link layer

Topic -Spam is an ever-growing problem, with some network administrators reporting that 90% or moreof the email delivered to their mail servers is spam. Identify and briefly evalua

Data units at different layers of the TCP/ IP protocol suite The data unit prepared at the application layer is known a message, at the transport layer the data unit build is

Question (a) For the bit stream 010011, show the waveforms for each of the code indicated. Consider that the signal level for NRZ-L for mark is positive; the signal level for t

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t