Modify the algorithm to rectify the above problem

Assignment Help Basic Computer Science
Reference no: EM13298031

3. Consider a simple symmetric encryption algorithm as follows:   
1- Input text T and 64 bit key K
2- Divide T into 64 bit size blocks B1...Bn
3- Get first block B1 and perform bit-wise XOR with K to
produce encrypted block E1
4- Repeat
a. Get next block Bi and perform bit-wise XOR with Ei-1
to produce encrypted block Ei
5- Until End of Text
Page 3 of 4
The algorithm is very simple, and naturally, we do not expect the ciphertext to be
cryptographically strong. Given the above algorithm answer the following:
a. Is it a problem if the first block of input happens to be the same as the key?
Explain why?  
b. Modify the algorithm to rectify the above problem.

Reference no: EM13298031

Questions Cloud

Needs to manage its telecommunications costs more effective : The retail store knows that it needs to manage its telecommunications costs more effectively. Based on the owner's goals to maximize the Internet for this purpose, provide a solution that will support the telecommunications (phone and fax) nee..
What is the moment of inertia of the merry-go-round : The radius of a park merry-go-round is 2.4 m. To start it rotating, you wrap a rope around it and pull with a force of 260 N for 11 s. What is the moment of inertia of the merry-go-round
What caused your perception to change : What is a perception you have had of another culture that has changed? What caused your perception to change? How might values of different peoples become more alike the more they interact with one another?
How to calculate the concentration of h3o+ of the solution : A 0.010 M HCN solution is .020% ionized. Calculate the concentration of H3O+ of this solution. Please show work and solution.
Modify the algorithm to rectify the above problem : Modify the algorithm to rectify the above problem.
What is global income in 2010 : Suppose that they have no other income, interest expenses are unchanged, and taxes are the same percentage of pretax income as in 2009.
Define flow at a hydraulic jump in terms of flow : Define flow at a hydraulic jump (upstream and downstream) in terms of the types of flow and corresponding Froude number. What is the depth of water at each section (upstream and downstream) compared to critical depth
How large a check could be written without it bouncing : At the present time, how large a check could be written without it bouncing? Round your answer to the nearest hundredth of million, if necessary.
Explain single carbon-carbon bonds represent potential : The polyyne molecules CkH2 with alternating triple and single carbon-carbon bonds represent potential nanowires for molecular electronics. They can be modelled as linear 1D-boxes with 2k

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Which structure best for the storyboard created

Case 2-3 Michael wants to create a Website based on his famous cooking show. He would like to provide instructions on how to create some of his favorite dishes. He would like his recipes to be displayed in very simple, step by step pages. Which st..

  Which two technological factors limit the realism

Remixing songs has become popular as a result of the emergence of digital audio technology. Explain why these two trends are related.

  What is the expected total number of tickets receive

What is the expected total number of tickets you receive?

  How the data block information is managed using fat

File X has 15 data blocks. The block addresses of the 15 blocks are 8, 9, 10, 11, 12, 13, 5, 4, 21, 22, 23, 24, 25, 26 and 27.

  Discuss why the user needs are important or stood out

Cite specific examples from readings. Include personal experience with the topic if appropriate

  Probability and set theory questions

COMP 2804 Assignment 3,  The Fibonacci numbers are defined as follows,  Assume we roll each of D1, D2, and D3 once, independently of each other. Let R 1 , R2, and R3 be the numbers on the top face of D1, D2, and D3, respectively.

  What is the order of the public key?

the weaknesses that arise in Elgamal encryption if a public key of small order is used. We look at the following example. Assume Bob uses the group Z ? 29 with the primitive element ?= 2. His public key is ?= 28.

  Creating the walburg energy alternatives database

Complete In The Lab 2 - Creating the Walburg Energy Alternatives Database - on page AC 68 - AC 69 at the end of Access Chapter 1. Perform all steps. Submit the entire database file for grading.

  Design an application to take and process a pizza order

Design an application to take and process a pizza order. The user should be able to make pizza order choices from listboxes, and the application should display the order price.

  Create and conducting an online questionnaire

Create a free SurveyMonkey or QuestionPro online questionnaire account. If you did not create one, revisit the Week 5 e-Activity to create an account before attempting this assignment.

  Mechanism that one app uses

What is the mechanism that one app uses to signal to another app that its cooperation is requested to accomplish something.

  Describe happening of water lubrication film under ice skate

Similar reasoning is utilized to describe occurrence of water lubrication film beneath ice skates. Describe your opinion of this explanation?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd