How a text can be encoded by manchester encoding technique

Assignment Help Computer Engineering
Reference no: EM132309160

Assignment: 1. Consider the Manchester Encoding technique.

a) Explain how a text (or a message) can be encoded by the Manchester encoding technique.

b) Pick the first character of your last name in uppercase and convert it to a binary code in 8 bits. For example, James Smith takes "S" to convert into a binary. What is the binary code of your last name initial?

c) Assume the clock bits are 10101010.... In this pattern. What is the encoded bits by applying the Manchester Encoding technique?

d) How can you decode it? Explain briefly.

2. Suppose that your laptop connects an access point (AP).

a) List the steps that take place at a laptop when it needs to connect an AP.

b) RC4 algorithm is a foundation of WPA2. Explain the concept (not the algorithm itself) of RC4 briefly.

c) How a streaming key is used to encode a text in WPA2? Explain it briefly.

d) Consider the key = 1234 and the text = 7788. Apply RC4 illustrated (simplified) in class. What is the first key? Show the computation step:

HW5 A5/1 Encryption

This assignment is to practice A5/1 encryption. Refer to the feedback polynomials with the same clocking bits as the one discussed in class. Consider the following three registers to generate a key stream.

Message to send: K

Key: 342312

LFSR:

R1 = [1, 1, 0, 0, 0, 1, 0, 0, 0, 0, 1, 1, 1, 1, 1, 1, 0, 0, 0]

R2 = [1, 1, 1, 1, 1, 1, 0, 0, 1, 1, 0, 0, 1, 0, 0, 0, 1, 0, 1, 0, 1, 0]

R3 = [1, 0, 1, 1, 1, 1, 1, 1, 0, 0, 1, 1, 0, 0, 0, 0, 1, 1, 0, 0, 0, 0, 1]

Please note that

- the LFSR represented in a list is opposite to that explained in the class slides. It means that R1 above the first bit is on the left, and the last 19th bit is on the right end.

- the clock bits of LFSR are 9th, 11th and 11th of R1, R2 and R3.

- The tapped bits for XOR from R1: 14th, 17th, 18th and 19th bit

- The tapped bits for XOR from R2: 21st and 22nd bit

- The tapped bits for XOR from R3: 8th, 21st, 22nd and 23rd bit

1 What is the operation to generate the first bit of the stream key?

2 What is the first bit of the key?

3 According to the clocking bits, which registers are picked for feedback?

4 What are the the first bit (indexed by 0) of each register, after feedback and shifting bit at the first key generation?

5 What is the first bit of the key?

6 What is the second bit of the key generation?

HW4 rc4 streaming encryption

Review the class slides of wifi streaming crypto algorithm, rc4.

Consider the following to apply to rc4 algorithm using an array of 8 bytes (You may want to rewatch the video lecture!).

Key T: 7136

S: 01234567

Now consider the message P to send. Let P = [ 5 5 5 3 ].

Step 1: Apply the Initialization Algorithm, discussed in class. By applying the first three iterations,

1) give the list S at each step of those three iterations.

Answer the following:

a. Show S for i=0

b. Show S for i=1

c. Show S for i=2

2) What is the first two keys?

3) What is the cipher for that first message 5?

4) What is the key to be generated for the second 5? What is its cipher?

Submit: Answer all in plaintext

Consider Steganography.

a) Explain the concept of steganography.

b) Show the steps of hiding a text message into an image according to the steganography concept described above.

c) Show the steps of extracting the text message from the stegano image stepped above.

d) Apply the method discussed in class to extract a character from the following RGB code. The method that you should apply is to take the least insignificant bit of each R, G and B color.

R G B

254 125 99

255 124 98

255 125 99

255 125 99

255 125 99

HW4 Network Forensic (5pts)

Network Forensic

Raspberry Pi is one of the most poswerful microcontrollers, on which Raspbian can run. Raspbian is one of the debian Linux distributions, and install a wifi access point (AP) and wireshark.

Wireshark is one of free and open-source packet analyzers. Using pcap (), there are tools capturing packets in GUI (Wireshark) and non-GUI (command-based TShark) running on cross-platform, released under the terms of the GNU.

1. Let your cell phone access the AP. Extract packets of your cell phone accesses and let given packets be contained in the file Packet.txt

2. Extract the IP assigned to your cell phone.

3. After that, filter wireshark packets to collect all activities of your cell phones (text, phone calls, internet through wifi).

Submission: 1) screenshot of wireshark showing your cell phone IP

2) screenshot of wireshark packets about your cell phone accesses

HW3 Image Forensic (5pts)

Image Forensic

One of the widely-used images formats used by most smartphones and digital cameras is JPEG. JPEG image format has two types of compression: JFIF and EXIF.

Consider the two photo images

1) Extract the following metadata from the photos

a. time

b. latitude

c. longitude

d. altitude

2) Plot the physical locations of those photos on the google map (manually or by using plotter).

3) Describe a possible (fiction) criminal story which may be used as evidence.

Submission: 1) a. Time; b. Latitude; c. longitude; d. Altitude, in plaintext

2) A google map image, or your camera photo

3) Description in plaintext

Reference no: EM132309160

Questions Cloud

Making the jump to international business operations : If you were the manager of a family business, what do you think your biggest hurdle would be in making the jump to international business operations?
Define what steps companies take to protect trade secrets : For this Assignment, submit a 3 to 4 page response to the following in your paper: What steps can companies take to protect trade secrets?
Analyze three economic factors that could lead the CIO : Reflect upon the economic factors that would lead a CIO to consider outsourcing or offshoring critical IT segments (i.e., help desk support, software).
Calculate mean weight loss for those on the Exercise Plan : Using a weighted average across both obesity categories, calculate the mean weight loss for those on the Exercise Plan
How a text can be encoded by manchester encoding technique : Explain how a text (or a message) can be encoded by the Manchester encoding technique. Pick the first character of your last name in uppercase and convert it.
Legal status and size of the company : Explain how the internal source of finance and the external source of finance (from the random draw), are both fitting to your context
What the report is about the company background : ACC706 ACCOUNTING THEORY AND ISSUES-KING’S OWN INSTITUTE, Australia: From the analysis, what comments can you give to our existing financial reporting framework
Write about the payment systems in brief : Write about the payment systems discussed in the textbook chapter and the advantages and disadvantages of each. What is the motivation for each payment system?
Managing the risk of value chain outage : Describe what would happen to a company's value chain if all electronic devices and systems suddenly were unavailable and an expected time for resolution time

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd