Compute the 16 bit hash for the 32 bit message

Assignment Help Computer Network Security
Reference no: EM131225485

Exercise Sheet

1. Let L be a 9 bit LFSR with connection polynomial c(x) = x8 + x4 + x + 1 and seed s = [1, 0, 1, 1, 1, 0, 0, 1, 0] (i.e. the last bit of s, 0, is the next keystream bit). Compute 10 bits of the keystream, the feedback bits and show the intermediate states of the register.

2. Consider a modified version of the Cipher block chaining mode, where the initialisation vector is not chosen at random, but chosen randomly once (like the key) and then increased by one for each encryption. Show that this modified version is not IND-CPA-secure. Note that the initialisaton vector is always part of the ciphertext.

3. Perform hashing, with the second round of the MD4 hash function adapted as follows:

(H1, H2, H3, H4) := (A, B, C, D)

for i := 0 to 3 do

t := A + G(B, C, D) + Mi

(A, B, C, D) := (D, t << i, B, C)

end

(A, B, C, D) := (H1 + A, H2 + B, H3 + C, H4 + D)

Assume that we compute a 16 bit hash, i.e., A, B, C, D are 4 bit words, G takes three 4 bit arguments and the message blocks are 16 bits partitoned into 4 bit chunks. Addition is modulo 24. Initially let (A, B, C, D) = (0x2, 0x5, 0x9, 0xD).

Compute the 16 bit hash for the 32 bit message given as hexadecimal number 0xFAB1756E.

4. Compute a simplified PMAC as follows: Let n = 4 and use the field F2[x]/(x4 + x + 1). Define the encryption function E by E(K, M ) = K  ⊕ M . Choose K to be 0110 and L to be 1010 and form the hash of the message 11000011. Show the calculations.

Reference no: EM131225485

Questions Cloud

Determine the transresistance transfer function : Find (i) the quiescent drain current IDQ and (ii) the small-signal transistor parameters. - Determine the transresistance transfer function Az f = vo/is.
Write a query or queries to print the table description : Write a query or queries to print the table description and the contents of each table, and copy and paste the results to a file called sales. Write a 1- to 2-page paper describing each constraint you created and why it is necessary.
Firm-wide weighted average cost of capital : Suppose a firm has several divisions, each with a unique area of business. What role does the firm-wide weighted average cost of capital play when determining a project's cost of capital in a given division?
Discuss the special considerations for pitching a blogger : Describe your follow-up plan. Discuss the special considerations for pitching a blogger.
Compute the 16 bit hash for the 32 bit message : 06-20008 Cryptography - Compute the 16 bit hash for the 32 bit message given as hexadecimal number 0xFAB1756E and Show that this modified version is not IND-CPA-secure.
Create preventative control for sungrafix video game company : Create Preventative Controls for SunGrafix, a video game design company. In some cases, the outage impacts identified in the BIA may be mitigated or eliminated through preventive measures that deter, detect, and/or reduce impacts to the system.
Find the transresistance transfer function : Determine the quiescent values ICQ and VECQ. - Find the transresistance transfer function Azf = vo/is. - Determine the input resistance Rif.
Accommodating a client forward transaction : Banks find it necessary to accommodate their clients needs to buy or sell FX forward, in many instances for hedging purposes. How can the bank eliminate the currency exposure it has created for itself by accommodating a client's forward transacti..
Write a research paper on a wide area network : Assessing and securing systems on a wide area network (WAN). Research paper; Ten pages, however no more than fifteen pages, 12 point font, Times New Roman and double spaced.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Discuss the description of the code and its purpose

Create a PowerPoint slide for each code. Each slide should discuss the description of the code, its purpose, and how it will impact the completion of the cable plant within the new building.

  Explain the major steps needed to preserve the integrity

Analyze the overall procedures for First Responder and Incident Handling, and ascertain the fundamental way in which such procedures relate to the scenario in this specific case.

  Characteristics of information security

Select one of the three characteristics of information security (CIA) and explain its importance as related to the development of policy, education, OR technology

  What ethical issues surround using honeypot to trick attacks

Although honeypots are common, some security professionals believe they should not be used because they encourage attackers. What do you think?

  Explore traffic behavior when designing a network

Why is it important to explore traffic behavior when designing a network? What problems could arise if you do not understand traffic behavior when you build a new network or upgrade a network?

  Difference between packet-filter firewalls and proxy filters

Explain at least two differences between packet-filter firewalls and proxy filters. Provide one example of a situation where you might need to use each type (two examples total).

  Fms attack and chopchop attack

[Wireless LAN Security-WEP] What is the main difference between the FMS attack and Chopchop attack? Clearly explain your answer

  How would an organization like anonymous

How would an organization like "Anonymous" be able to carry out phishing attacks against major organizations with relative ease

  Analyze three specific potential malicious attacks

Analyze three (3) specific potential malicious attacks and / or threats that could be carried out against the network and organization.

  List and in brief describe at least five key steps in the

question 1 list and briefly describe at least five key steps in the process of designing a good security strategy.

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd