Difference between a block cipher and a stream cipher

Assignment Help Computer Networking
Reference no: EM131940581

Review Questions

Anwers the following questions on a separate sheet during lectue and submit. Students should perform this task individually.

1. What are the essential ingredients of a symmetric cipher?

2. What are the two basic functions used in encryption algorithms?

3. How many keys are required for two people to communicate via a symmetric cipher?

4. What is the difference between a block cipher and a stream cipher?

5. What are the two general approaches to attacking a cipher?

6. Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?

7. What is triple encryption?

8. Why is the middle portion of 3DES a decryption rather than an encryption?

Task 2: Problems

Anwers the following questions on a separate sheet during lectue and submit. Students should perform the steps in this task individually.

1. This problem uses a real-world example of a symmetric cipher, from an old U.S. Special Forces manual (public domain).
a) Using the two keys (memory words) cryptographic and network security, encrypt the following message:
Be at the third pillar from the left outside the lyceum theatre tonight at seven. If you are distrustful bring two friends.
Make reasonable assumptions about how to treat redundant letters and excess letters in the memory words and how to treat spaces and punctuation. Indicate what your assumptions are. Note: The message is from the Sherlock Holmes novel, The Sign of Four.
b) Decrypt the ciphertext. Show your work.
c) Comment on when it would be appropriate to use this technique and what its advantages are.

2. Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of attack is Eve employing?

3. Eve has an antenna that can pick up Alice's encrypted cell phone conversations. What type of attack is Eve employing?

4. Eve has given a bunch of messages to Alice for her to sign using the RSA signature scheme, which Alice does without looking at the messages and without using a one-way hash func-tion. In fact, these messages are ciphertexts that Eve constructed to help her _gure out Alice's RSA private key. What kind of attack is Eve using here?

5. Eve has bet Bob that she can _gure out the AES secret key he shares with Alice if he will simply encrypt 20 messages for Eve using that key. For some unknown reason, Bob agrees. Eve gives him 20 messages, which he then encrypts and emails back to Eve. What kind of attack is Eve using here?

Verified Expert

The solution file is prepared in ms word and it has two task. In task 1 some of the basic questions are answered and task 2 problem given and solutions. The required questions are answered here.

Reference no: EM131940581

Questions Cloud

Increase of which molecule will lead to vasodilation : During exercise, blood flow is maintained relatively constant to the brain and heart, but is rapidly increased to active skeletal muscles.
What is net after tax profit : What is Net after tax profit?
Interview someone who works in some area of marketing : For this assignment, you will find and interview someone who works in some area of marketing, advertising, or public relations.
The expected average annual rate of return on investment : Investment X pays an average annual rate of return of 8%, What is the expected average annual rate of return on investment (ignore taxes).
Difference between a block cipher and a stream cipher : IT NE 2002 Symmetric Encryption and Confidentiality - What are the essential ingredients of a symmetric cipher and What are the two basic functions used
How to distribute the confirmation and refutation : The most important decision you have to make is how to distribute the confirmation (arguments for) and refutation (arguments against).
Relationship in regards to the hb-o2 saturation curves : The reaction of hemoglobin and oxygen is complicated. Explain some of this relationship in regards to the Hb-O2 saturation curves and why breathing at altitude
Small stocks and big company stocks or mutual funds : If I want a better return on my investment in the next 10 years, should I invest in small stocks, big company stocks or mutual funds?
Competition preparation and to support : You as a trainer are working together with his regular coach to guide Mike through the competition preparation and to support him to implement

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd