### Write a program based on encryption scheme

Assignment Help Computer Engineering
##### Reference no: EM132497

Question

Two parties A and B try to communicate with following encryption scheme-both sides agree on same long random bit sequence (you could assume one of your own choices). When A wish for to send B an k-bit message, it takes k bits from long random sequence, XOR each bit of k bit message with them, and send result ("encrypted message"). While B receives the encrypted message, it takes k bits from her own copy of long random sequence, and XOR each bit of the k bit encrypted message to get back original message.

The two parties are concerned with possibility that a middleman which perform the message transfer will take encrypted message sent by A and change it, previous to forwarding the message to B; and B will get the message without knowing that it is modified. So they add the following "protection".

Append CRC to the original message, before encrypting whole message (original message + CRC) using the above method (n-bit XOR). While B gets the encrypted message, it is decrypted, and then CRC is checked.

If CRC is incorrect, B concludes that the communication is modified, and ignores it.

#### Questions Cloud

 Write down program using c language programming : Write down program using C language programming. Evaluate the amount of translation adjustment : Evaluate whether the companys foreign operations have a predominant functional currency Write general journal entries to record the transactions : Write general journal entries to record the transactions and Write a stockholders' equity section as of the close of business on December 31, 2012. What is social rehabilitation : What is social rehabilitation How is it different from medical and vocational rehabilitation Write a program based on encryption scheme : Write a program based on encryption scheme. Example on balance sheet : What amount can be reported as the noncontrolling interest in the consolidated balance sheet on January 1, 20X9? Execute a recursive directory traversal : Execute a recursive directory traversal. What are dangerous goods : What are dangerous goods What is the difference between hazardous materials, dangerous goods and hazardous substances? Prepare visual basic application : Prepare visual basic application.

### Write a Review

#### Describe how left explanation is useful while formatting

Describe how left explanation is useful while formatting

#### Write an essay on wifi performance

Write an essay on WiFi performance

#### Classify and discuss compensation potentially

Classify and discuss compensation potentially.

#### Develop a checkout lane simulation

Develop a checkout lane simulation that can be used to determine the optimal number of lanes that Cougar Mart should have open.

#### Produce two random integer numbers between 1 and 200

Produce two random integer numbers between 1 and 200.

#### How to produce a wired and wireless network plan

How to produce a wired and wireless network plan

#### Utilize server manager to install dns role

Utilize Server Manager to install DNS role

#### What are pros and cons of society''s increasing reliance data

What are pros and cons of society's increasing reliance data

#### Why didn''t the vendor just bid fewer disks

Why didn't the vendor just bid fewer disks

#### Describe the mechanics of Buffer overflows

Prepare a complete tutorial, including an analogy to describe the mechanics and a graphic to support your analogy, on one of the subsequent areas

#### Write program to calculate pay of different types of employe

Write program to calculate pay of different types of employe

#### How can sophie use applocker

How can Sophie use AppLocker.