Write a program based on encryption scheme

Assignment Help Computer Engineering
Reference no: EM132497

Question

Two parties A and B try to communicate with following encryption scheme-both sides agree on same long random bit sequence (you could assume one of your own choices). When A wish for to send B an k-bit message, it takes k bits from long random sequence, XOR each bit of k bit message with them, and send result ("encrypted message"). While B receives the encrypted message, it takes k bits from her own copy of long random sequence, and XOR each bit of the k bit encrypted message to get back original message.

The two parties are concerned with possibility that a middleman which perform the message transfer will take encrypted message sent by A and change it, previous to forwarding the message to B; and B will get the message without knowing that it is modified. So they add the following "protection".

Append CRC to the original message, before encrypting whole message (original message + CRC) using the above method (n-bit XOR). While B gets the encrypted message, it is decrypted, and then CRC is checked.

If CRC is incorrect, B concludes that the communication is modified, and ignores it.

Reference no: EM132497

Questions Cloud

Write down program using c language programming : Write down program using C language programming.
Evaluate the amount of translation adjustment : Evaluate whether the companys foreign operations have a predominant functional currency
Write general journal entries to record the transactions : Write general journal entries to record the transactions and Write a stockholders' equity section as of the close of business on December 31, 2012.
What is social rehabilitation : What is social rehabilitation How is it different from medical and vocational rehabilitation
Write a program based on encryption scheme : Write a program based on encryption scheme.
Example on balance sheet : What amount can be reported as the noncontrolling interest in the consolidated balance sheet on January 1, 20X9?
Execute a recursive directory traversal : Execute a recursive directory traversal.
What are dangerous goods : What are dangerous goods What is the difference between hazardous materials, dangerous goods and hazardous substances?
Prepare visual basic application : Prepare visual basic application.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What devices use to get efficient network communication

CNT Books has expanded considerably as you first got network up and running three years ago. It at the present occupies an entire floor in building, and its LAN has full-grown to contain several servers and more than 60 workstations.

  How to plan a payroll class

How to plan a PayRoll class.

  How to write basic structure of an exception handler

How to write basic structure of an Exception handler a. generate an abstract class Furniture b. Declare an abstract process Discount the returns no value but accepts the cost of item

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  What will do to get deadline to receive a passing grade

What will do to get deadline to receive a passing grade? You have to complete and submit course project previous to the deadline to receive a passing grade for this course.

  Risk assessment of ict system

Risk Assessment of ICT System and Developing Computer Incident Response System on WAMP platform

  Determine technology which has changed cafe,coffee shop

Determine technology which has changed cafe,coffee shop? Think things such as marketing, food preparation, inventory ordering or re-ordering, customer tracking, and more.

  What is the specialization of Dottie's Tax facility

What is the specialization of Dottie's Tax facility At least 6 returns? (Round z-score computation to 2 decimal places and your final answer to 4 decimal places.)

  How can sophie use applocker

How can Sophie use AppLocker.

  How to illustrate decision table to represent treatment

How to illustrate decision table to represent treatment? Create a structured English version based on the following dialogue obtained by the Systems Analyst from the client interview below.

  How many cars in every team called chevy and ford

How many cars in every team called Chevy and Ford There are eight cars in every team called Chevy and Ford. One car from each team races its opponent on drag strip.

  Classify the use and location of firewalls

Classify the use and location of Firewalls Categorize the use and location of IPS or IDS where necessary.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd