
Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN: 9780133594140
Author: James Kurose, Keith Ross
Publisher: PEARSON
expand_more
expand_more
format_list_bulleted
Question

Transcribed Image Text:This question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows.
char cipherfunsigned char block, char key)
return (key+11'block)%256;
The inverse of this cipher is shown below.
char inv_cipherfunsigned char block, char key)
{/ 163 is the inverse of 11 mod 256
return (163 block-key+256)%256;
Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key Ox08.
We now decrypt various ciphertexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be OXAA. In the case of CTR
mode, we use a (nonce || counter) arrangement in which the nonce is the left 5 bits of OKAA and the counter is a 3 bit counter that begins at 0. In all of the
problems given below, one character is one block. Each character of the plaintext should be regarded as its corresponding ASCII code. The ciphertext is
n hexadecimal.
a) Decrypt the ciphertext "212C330F184EBB* using CTR mode. Please enter your answer in ASCII characters (aka words).
b) Decrypt the ciphertext "ACCDF904' using ECB mode. Please enter your answer in ASCIl characters (aka words).
c) Decrypt the ciphertext *324 F1 F363623' using CFB mode. Please enter your answer in ASCil characters (aka words).
d) Decrypt the ciphertext '5BSA91C9274170* using CBC mode. Piease enter your answer in ASCII charactors (aka words).
e) Decrypt the ciphertext "3EDF673842* using OF B mode. Please enter your answer in ASCII characters (aka words).
Note: You can earn partial credit on this pmhiem
Expert Solution

This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
This is a popular solution
Trending nowThis is a popular solution!
Step by stepSolved in 2 steps with 1 images

Knowledge Booster
Similar questions
- This question concems block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) return (key+11"block)%6256, Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key Ox08. We now encrypt various plaintexts using modes for this cipher In every case in which the mode requires an IV, the IV will be OXAA. In the case of CTR mode, we use a (nonce || counter) arrangement in which the nonce is the left 5 bits of OXAA and the counter is a 3 bit counter that begins at 0. In all of the problems given below, one character is one block. Each character of the plaintext should be regarded as its corresponding ASCII code a) Encrypt the plaintext "cheery using CTR mode. Please enter your answer in hex. (Please do *"not"" enter an 0x, as this has been done) Ox b) Encrypt the plaintext "chirper" using ECB mode Please enter your answer in hex Ox C) Encrypt the plaintext…arrow_forwardwrite an encoder and a decoder for a modified "book cipher." A book cipher uses a document or book as the cipher key, and the cipher itself uses numbers that reference the words within the text. For example, one of the Beale ciphers used an edition of The Declaration of Independence as the cipher key. The cipher you will write will use a pair of numbers corresponding to each letter in the text. The first number denotes the position of a word in the key text (starting at 0), and the second number denotes the position of the letter in the word (also starting at 0). For instance, given the following key text (the numbers correspond to the index of the first word in the line) [0] 'Twas brillig, and the slithy toves Did gyre and gimble in the wabe; [13] All mimsy were the borogoves, And the mome raths outgrabe. [23] "Beware the Jabberwock, my son! The jaws that bite, the claws that catch! [36] Beware the Jubjub bird, and shun The frumious Bandersnatch!" [45] He took his vorpal sword in…arrow_forwardThis question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11"block)%256; } The inverse of this cipher is shown below. char inv_cipher(unsigned char block, char key) { // 163 is the inverse of 11 mod 256 return (163*(block-key+256))%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now decrypt various ciphertexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be OXAA. In the case of CTR mode, we use a (nonce || counter) arrangement in which the nonce is the left 5 bits of OXAA and the counter is a 3 bit counter that begins at 0. In all of the problems given below, one character is one block. Each character of the plaintext should be regarded as its corresponding ASCII code. The ciphertext is given in hexadecimal. a) Decrypt the ciphertext "303…arrow_forward
- use python pleasearrow_forwardWhat will be the ciphered text corresponding to “ALGORITHM” if bifid cipher is used for encryption with key as “KEY” with a period as 5? a) SBPISZTKZH b) PLNSOWGKQM c) SELFQEXBHM d) YFSGWNFBWarrow_forward21. RSA problem: given plaintext P, e, prime numbers p, q, compute ciphertext C. Decrypt C and verify you get plaintext P back.arrow_forward
- This question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11*block)%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now encrypt various plaintexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be OXAA. In the case of CTR mode, we use a (nonce || counter) arrangement in which the nonce is the left 5 bits of OXAA and the counter is a 3 bit counter that begins at 0. In all of the problems given below, one character is one block. Each character of the plaintext should be regarded as its corresponding ASCII code. a) Encrypt the plaintext "spider" using CTR mode. Please enter your answer in hex. (Please do **not** enter an 0x, as this has been done.) Ox b) Encrypt the plaintext "spelling" using ECB mode. Please enter your answer in hex. Ox c) Encrypt the…arrow_forwardPlease give me a step by step solution for this question, using only the regular c-instructions offered with hack assembly language.arrow_forwardThis question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11*block)%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now encrypt various plaintexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be OxAA. In the case of CTR mode, we use a (nonce || counter) arrangement in which the nonce is the left 5 bits of OxAA and the counter is a 3 bit counter that begins at 0. In all of the problems given below, one character is one block. Each character of the plaintext should be regarded as its corresponding ASCII code. a) Encrypt the plaintext "lippo" using CTR mode. Please enter your answer in hex. (Please do **not** enter an Ox, as this has been done.) Ox b) Encrypt the plaintext "lippi" using ECB mode. Please enter your answer in hex. Ox c) Encrypt the…arrow_forward
- AO A B C D E F G H I J K L M 0 1 2 3 4 5 6 7 8 9 10 11 12 N 0 P Q R S T U V W X Y Z 13 14 15 16 17 18 19 20 21 22 23 24 25 (Show your work.) Encrypt the message "TYVQ" using Affine Cipher in English alphabet with a = 7; b =22 and encryption function is f(p) = (7p+22) mod 26 A) hens B) helo C) zine D) zictarrow_forwardCan you please show the shifts for the encrypt & decrypt in this format? For example, like this : Example:ABCDEFGHIJKLMNOPQRSTUVWXYZ Row 1FGHIJKLMNOPQRSTUVWXYZABCDE Row 2 If the plaintext to encrypt is:THIS IS THE ANSWER The ciphertext becomes:YMNX NX YMJ FSXBJW This is for me to help understand and to redo the problem for studying. Thank you!!arrow_forwardIn C: Write a simple "brute force" decrypter for an autokey cipher. This program: 1. Reads in an array of characters (up to 100) and converts them to their ASCII values. 2. "Decrypts" the array for each modulo value (the spacebar and all letters, 27 total). 3. Determines the modulo value that has the second-most number of the character 'E' in the decrypted array. 4. Prints the "decrypted" array corresponding with the modulo value determined in step 3.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Computer Networking: A Top-Down Approach (7th Edi...Computer EngineeringISBN:9780133594140Author:James Kurose, Keith RossPublisher:PEARSONComputer Organization and Design MIPS Edition, Fi...Computer EngineeringISBN:9780124077263Author:David A. Patterson, John L. HennessyPublisher:Elsevier ScienceNetwork+ Guide to Networks (MindTap Course List)Computer EngineeringISBN:9781337569330Author:Jill West, Tamara Dean, Jean AndrewsPublisher:Cengage Learning
- Concepts of Database ManagementComputer EngineeringISBN:9781337093422Author:Joy L. Starks, Philip J. Pratt, Mary Z. LastPublisher:Cengage LearningPrelude to ProgrammingComputer EngineeringISBN:9780133750423Author:VENIT, StewartPublisher:Pearson EducationSc Business Data Communications and Networking, T...Computer EngineeringISBN:9781119368830Author:FITZGERALDPublisher:WILEY

Computer Networking: A Top-Down Approach (7th Edi...
Computer Engineering
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:PEARSON

Computer Organization and Design MIPS Edition, Fi...
Computer Engineering
ISBN:9780124077263
Author:David A. Patterson, John L. Hennessy
Publisher:Elsevier Science

Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:9781337569330
Author:Jill West, Tamara Dean, Jean Andrews
Publisher:Cengage Learning

Concepts of Database Management
Computer Engineering
ISBN:9781337093422
Author:Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:Cengage Learning

Prelude to Programming
Computer Engineering
ISBN:9780133750423
Author:VENIT, Stewart
Publisher:Pearson Education

Sc Business Data Communications and Networking, T...
Computer Engineering
ISBN:9781119368830
Author:FITZGERALD
Publisher:WILEY