Write a program based on encryption scheme

Assignment Help Computer Engineering
Reference no: EM132497

Question

Two parties A and B try to communicate with following encryption scheme-both sides agree on same long random bit sequence (you could assume one of your own choices). When A wish for to send B an k-bit message, it takes k bits from long random sequence, XOR each bit of k bit message with them, and send result ("encrypted message"). While B receives the encrypted message, it takes k bits from her own copy of long random sequence, and XOR each bit of the k bit encrypted message to get back original message.

The two parties are concerned with possibility that a middleman which perform the message transfer will take encrypted message sent by A and change it, previous to forwarding the message to B; and B will get the message without knowing that it is modified. So they add the following "protection".

Append CRC to the original message, before encrypting whole message (original message + CRC) using the above method (n-bit XOR). While B gets the encrypted message, it is decrypted, and then CRC is checked.

If CRC is incorrect, B concludes that the communication is modified, and ignores it.

Reference no: EM132497

Questions Cloud

Write down program using c language programming : Write down program using C language programming.
Evaluate the amount of translation adjustment : Evaluate whether the companys foreign operations have a predominant functional currency
Write general journal entries to record the transactions : Write general journal entries to record the transactions and Write a stockholders' equity section as of the close of business on December 31, 2012.
What is social rehabilitation : What is social rehabilitation How is it different from medical and vocational rehabilitation
Write a program based on encryption scheme : Write a program based on encryption scheme.
Example on balance sheet : What amount can be reported as the noncontrolling interest in the consolidated balance sheet on January 1, 20X9?
Execute a recursive directory traversal : Execute a recursive directory traversal.
What are dangerous goods : What are dangerous goods What is the difference between hazardous materials, dangerous goods and hazardous substances?
Prepare visual basic application : Prepare visual basic application.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Describe how left explanation is useful while formatting

Describe how left explanation is useful while formatting

  Write an essay on wifi performance

Write an essay on WiFi performance

  Classify and discuss compensation potentially

Classify and discuss compensation potentially.

  Develop a checkout lane simulation

Develop a checkout lane simulation that can be used to determine the optimal number of lanes that Cougar Mart should have open.

  Produce two random integer numbers between 1 and 200

Produce two random integer numbers between 1 and 200.

  How to produce a wired and wireless network plan

How to produce a wired and wireless network plan

  Utilize server manager to install dns role

Utilize Server Manager to install DNS role

  What are pros and cons of society''s increasing reliance data

What are pros and cons of society's increasing reliance data

  Why didn''t the vendor just bid fewer disks

Why didn't the vendor just bid fewer disks

  Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

  Write program to calculate pay of different types of employe

Write program to calculate pay of different types of employe

  How can sophie use applocker

How can Sophie use AppLocker.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd