Discuss about the pseudo-random generation algorithm

Assignment Help Computer Engineering
Reference no: EM132103859

Problem : Lem E. Tweakit is an aspiring embedded systems developer. Recall that RC4's internal state consists of an "S-Box" (S[]) and two pointers (i and j).

Lem, constrained by hardware, wants to implement the swap(S[i], S[j]) operation from RC4's Pseudo-Random Generation Algorithm (PRGA) without using a temporary variable. To perform the swap, Lem's PRGA uses the following algorithm:

Algorithm 1 LEM-SWAP(x, y)

1: x = x ? y

2: y = x ? y

3: y = x ? y

4: x = x ? y

Alyssa P. Hacker, who studied the RC4 stream cipher in CS4538, is concerned. In particular, Alyssa argues that his implementation exhibits a weakness that will compromise the privacy of data encrypted using his implementation of the RC4 PRGA.

(a) Alyssa is correct. Why? Explain your answer, providing a proof if necessary.

(b) Fix Lem's PRGA implementation by fixing LEM-SWAP(). Without using a temporary variable, provide the corrected LEM-SWAP() and show its correctness.

Having fixed LEM-SWAP(), Alyssa digs deeper into Lem's implementation. She notices another oddity: to save state space, his S-Box is an identity permutation of 128 elements (half the size of traditional RC4)! All KSA and PRGA operations are otherwise the same, but modulo 128.

(c) How will Lem's use of a 128 element S-Box affect the security of the resulting ciphertext? Explain your answer.

Reference no: EM132103859

Questions Cloud

What is the protein sequence encoded by the gene : Which region of the mRNA do you think can be translated into a protein (hint: Can you identify the start codon and stop codon from the mRNA sequence?)
How many cycles does this code take to complete : Show a pipeline execution diagram for the program by inserting nop instructions to eliminate the data hazard.
Print the keys as encountered in a preorder traversal : Consider a binary (min)heap. We have a method that prints the keys as encountered in a preorder traversal.
Identify a superkey for the book entity set : Consider the entity set 'Book' with the attributes 'title', 'author', 'publisher', 'pubDate', 'numberPages', 'condition', 'cost', and 'datePurchased'.
Discuss about the pseudo-random generation algorithm : Fix Lem's PRGA implementation by fixing LEM-SWAP(). Without using a temporary variable, provide the corrected LEM-SWAP() and show its correctness.
How social capital enhance well-being : How Social Capital enhance well-being in high density community?
List all files in the current directory in order of used : Give a single command (any commands separated by pipes are considered to be a single command) for each of the following.
What are the key planning and preparation tasks : To accomplish this task, what are the key planning and preparation (analysis/design) tasks that must be completed to successfully meet this challenge?
Write a java method is primenum that takes the number n : Write a java method is PrimeNum that takes the number n, and checks whether the number is prime or composite.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find out and display the total owed for all taxpayers

A taxpayer's federal tax due is calculated as follow. First, the taxpayer gets a dependency exemption deduction of $2,000 for each child. So, if a taxpayer has two children, he or she would get a dependency exemption deduction of $4,000. A taxpaye..

  What happens with increasing amounts of random noise

What is returned when the new column is perfectly correlated with the original? What happens with increasing amounts of random noise?

  Discuss what hardware components should be considered

Discuss what hardware components should be considered when deciding what applications to install.

  Create a lan for a very successful cpa firm

You have been asked to design a LAN for a very successful CPA firm with five departments in one building and a total of 560 employees.recently , the firm has no networked computers, and it is open to any suggestions your team can offer.

  What hohimer argue about difficulties of picking up trail

What Frank, Greitzer & Hohimer argue about difficulties of picking up the trail before the fact, in order to provide time to intervene and prevent an insider cy

  Define in brief the meaning of virtue gratian

Define in brief the meaning of virtue Gratian and explain why this concept is closely related to hardware support for multi-threading.

  Write a research report on design of a cisco router

Systems research and investigate novel ideas and applications.

  Discuss the significance of the independence axiom as used

Discuss the significance of the independence axiom as used in the axiomatic design methodology. Explain the importance and rationale for adopting industry standards as part of systems design endeavors.

  Disadvantages of using multiple models

offer two common failures in moving a system from development into production status.

  In the skills assignment consider ways you utilize the

in the skills assignment consider ways you utilize the internet and how it impacts your daily routine. now think

  Describe the compare database backup and disaster planning

This research paper will describe, compare and contrast Database Backup & Disaster Planning. This research paper must be submitted using SafeAssign.

  Define what is e-commerce and mobile technology

Your company is experiencing decline in business because of competition. Your manager thinks they may be able to turn the company around if they can get help.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd