1 give an example to show that the group of permutations s5

Assignment Help Computer Networking
Reference no: EM13379911

1. Give an example to show that the group of permutations S5 is not commutative.

2. Use ECB mode with block length 3 and the permutation cipher for the following operation:

(a)  Encrypt the plaintext 101100101111; key k =  2129_Computer algebra system Maple.png

(b) Do the corresponding decryption.

To help with the next two questions, here are examples of block cipher encryption in CFB mode and in OFB mode. In both examples the block cipher, plaintext, and key are the same as in the examples for ECB and CBC modes that were presented in class.

Choose block length r = 3. The plaintext blocks are therefore m1 = 101, m2 = 100, m3 = 010, rn4 = 100, m5 = 101. As initialization vector, use IV = 1010. The CFB encryption is then shown in the left-hand table, and OFB encryption in the right-hand table:

2437_Computer algebra system Maple1.png

3. Encrypt the plaintext 100101110001 using (a) CFB mode and (b) OFB mode. Use the permutation cipher with block length 3, r = 2, and

key k = 2129_Computer algebra system Maple.png. Use initialization vectors 000 in (a) and 010 in (b).

4. Do the decryptions corresponding to 4(a) and 4(b).

5. Use the stream cipher discused in class, with n = 7 and c0 = c1 = 1, c2 = c3 = 0, c4 = c5 = c6 = 1. Encrypt w = 1110011 1110001 1010001 using the key k = 1010011.

6. (Nothing to be handed in). This may be the right time to familiarize yourself with the computer algebra system Maple. About how to download Maple. Our textbook (Trappe & Washington) has a very nice introduction in Appendix B, with instructions on how to download a special cryptography "notebook" for Maple. Do a few easy examples on the shift cipher and the affine cipher (pp. 498-499). Let me know of any problems you may have.

When we start using Maple in earnest in a few weeks, I will have to assume that everybody is familiar with the system.

Reference no: EM13379911

Questions Cloud

Consider any of the supercomputing examples we discussed in : consider any of the supercomputing examples we discussed in class and find a scientific paper describing it. you must
In this assignment you are to write a program that analyzes : in this assignment you are to write a program that analyzes a selection of text counting the number of times each word
In this assignment you will write a program that does : in this assignment you will write a program that does simple packet routing. your program will take three command-line
1 write an algorithm that converts a linear measurement in : 1. write an algorithm that converts a linear measurement in feet and inches into meters. one inch is equivalent to 2.54
1 give an example to show that the group of permutations s5 : 1. give an example to show that the group of permutations s5 is not commutative.2. use ecb mode with block length 3 and
1 write a c program to display the following sum4 812162024 : 1. write a c program to display the following sum4 812162024 ...4042. write a program that will convert us dollar
Perform the tasks below by using the correct sql statements : perform the tasks below by using the correct sql statements. you must create the statements in oracle by using the
Modify oracle table data using the correct sql statements : modify oracle table data using the correct sql statements. you must create the statements in oracle by using the
Taskanswer the question below in an academically rigorous : taskanswer the question below in an academically rigorous manner using business report style with claims supported by

Reviews

Write a Review

Computer Networking Questions & Answers

  Does rule list any particular oddities-protocol makes unique

Does rule list any particular oddities or protocol(s) or anything which makes it unique (such as messages)? If so, list these. If not, what must be included?

  Intercept message and generates alternative message

Computed hash value for the message. Alice is able to intercept message, and generates alternative message that has a hash value that collides with Bob's original hash value. Show.

  What type of wan solution would you recommend and why

An organization called Ranbaxy Inc. has currently 3 divisions in 3 different locations within Sydney city. One of the divisions serves as the company headquarters.

  Explain why it is recommended to secure windows

You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO has asked you to explain why you recommend it is so important to secure your Windows.

  Multiplexing signals directly onto sonet sts-1 channel

Suppose you could multiplex these signals directly onto SONET STS-1 channel how many MP3 songs could be trasmitted simultaneously?

  Recognize roi and npv of wireless order-taking system

Recognize ROI and NPV of wireless order-taking system. Explain some of intangibles Lisa requires to consider and make recommendation as to whether Lisa must order such a system.

  Comparing the cache blocks

A computer using direct mapped cache has 2^24 words of main memory and a cache of 256 blocks. Every cache block contains sixty-four words.

  Storage systems increasingly rely on the internet

Storage systems increasingly rely on the Internet infrastructure as a transport medium. What are the advantages of this approach? What problems are present in terms of security and reliability?

  Determine different subnets exist in ip network-subnet mask

Write all IP addresses on same subnet as this one. Determine maximum number of hosts in this subnet? How many different subnets exist in IP network by using this subnet mask.

  Use ios to properly deny icmp in your acl list

You want deny any ICMP traffic to the subnet 192.168.12.0/24 by adding an entry to existing access list 105. This existing ACL ends with a "permit all" entry, so you will add the new entry before that last entry. Use IOS to properly deny icmp in y..

  Designing new datacenter for existing complement of servers

You have been hired as independent contractor to support company in designing a new datacenter for its existing complement of 16 Unix servers, 32 Windows servers, and 10 racks of network

  Significant means for assessing health of existing network

Explain some of the most significant means for assessing health of existing network. Which do you believe is most significant, and explain why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd