Encrypt block in block cipher using key

Assignment Help Computer Network Security
Reference no: EM1370502

Assume that there is a block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. We know that ABC will be broken even using simple brute-force attacking by guessing the encryption key. To enhance the security level, assume that someone proposes to use XYZ by use of 2 encryptions of ABC with 2 different independent keys. Prove that XYZ does not provide a much stronger security than ABC. Prove in detail why this statement is true. (You have to analyze in detail a method attacking XYZ using time that is not much longer than the brute force attacking on ABC.)

Reference no: EM1370502

Questions Cloud

Determining costs and maximizing profits for monopoly : A monopolist has demand and cost curves given by: Find out the quantity that maximizes profit? What is the revenue and profit at that point?
Determine smallest value of x for which is safe state : System has 4 processes and 5 allocatable resources. The current allocation and maximum needs are as follows: Determine the smallest value of x for which this safe state.
Determining monopoly price-profit-maximizing output : Assume that the monopoly faces the inverse market demand function: What should be the monopoly's profit-maximizing output?
Explain comprehensive disaster recovery plan for network : Explain a comprehensive disaster recovery plan for hypothetical network consisting of 20 desktop computers in domain network with 2 network servers and 2 application servers.
Encrypt block in block cipher using key : Suppose that there is block cipher ABC that always encrypts block of b=72 bits using key of k= 60 bits. Prove that XYZ doesn't give much stronger security than ABC.
Characteristics of a statement of cash flow : Discuss and explain the reasons why net income for a particular period does not necessarily reflect a firm's cash flow during that same period.
Computing optimal output of competitive firm : It is supposed that the liquid soap market is perfectly competitive and current price of a case of liquid soap is $42.00. The firm has estimated it's marginal cost function to be as follows: MC=0.006Q.
Find the total current market value of firm debt : In order to accurately assess the capital structure of a company, it is necessary to convert its balance sheet figures to a market value basis. KJM Company's balance sheet as of today,
Determine the size for variables used in matlab program : If b=3, a=6 how many loops would the given program do? what will be the out put for z(4)? what would be size (in rows and columns) for variables z, i and b?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Security measures currently in place give adequate security

Explain in scholarly detail on whether you believe security measures currently in place give adequate security as well as privacy, or do you believe these issues being emphasized are at the expense of the other?

  Constructing the parameters of the rsa cryptosystem

The general method for constructing the parameters of the RSA cryptosystem

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Passive eavesdropper observes single execution of protocol

Show that a passive eavesdropper that observes a single execution of the protocol can recover key s and impersonate the tag.

  Explain rsa public-key encryption scheme

Consider the plain (i.e., non-padded) RSA public-key encryption scheme. Encrypt the message m = 12 using the public key pk = (N,e), where N = 35 and e = 3.

  Chunks of code to give secure-reliable computing environment

How are many chunks of code from many organizations really going to work together to provide a secure and reliable computing environment?

  Methods to combat technical-nontechnical attacks in wan

Explain a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks.

  Discuss two drawbacks of steganography

Discuss two drawbacks of steganography Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Cyber-terrorist crime and security breach

Large Commercial Corporation has witnessed a terrorist security breach of network, and has discovered one laptop on the scene belonging to victim.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd