Plain-text using play-fair encryption, Computer Network Security

  1. What is one-time pad for encryption? 
    1. Describe how it offers both Confusion and Diffusion.
    2. Using the letter encoding discussed in class (along with one-time pad), the cipher text,  KITLKE was generated using one-time pad.  What is the one time pad used if the plain text is "thrill"?  What's the key if the plain text was "tiller"?
  2. Encrypt the following plain-text using play-fair encryption scheme. Use WEDNESDAY as the key. Plain Text:  "I DREAM OF RAIN"
  3. Suppose that you have a message consisting of 1024 bits.  Design method that will extend the key that is 64 bits long into a string of 1024 bits.  Encryption is performed by XORing the data bits with the extended key bits.  Discuss the security of this approach.
Posted Date: 3/19/2013 2:15:57 AM | Location : United States







Related Discussions:- Plain-text using play-fair encryption, Assignment Help, Ask Question on Plain-text using play-fair encryption, Get Answer, Expert's Help, Plain-text using play-fair encryption Discussions

Write discussion on Plain-text using play-fair encryption
Your posts are moderated
Related Questions
Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

on LAN,where are IP datagrams transported?

B a s i c functions of e-mail system are given as follows: C o mp o sition refers to the procedure of creating messages and the answers. Though any text editor can be

An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio

Hypothetical reliable data transfer protocol: A jumping window based Go-back-N  ARQ protocol for file transfer using UDP as the transport protocol: In this protocol, a window o

Problem: (a) What is a firewall and which are its most important tasks? (b) What is the difference between default deny and default permit? Which advantages and disadvanta

implementing password policy in organisation

KASONet Pinging System: Project Title:                                                           "KASONet Pinging System"   Brief Overview of Project: The o

Improving domain blacklisting: Current domain blacklisting techniques are not very effective as spammers keep replacing blacklisted domains with newly registered domains. Also