Experimenting with AES-”S symmetric key cipher. Note: You may use any programming language that provided libraries for AES. Descrion: This assignment consists of two parts: PART 1: write a program that uses AES-12/1 to decrypt a message. The program should be named "decrypt", and should deal with three files that contain the encrypted text as a stream of bytes, the 128-bit key for decryption stored as a stream of bytes, and file outcome of the decryption, respectively. o To test this program, here's an example of an encrypted message a. its 128-bit secret key PART 2: you will try to use "brute force" to decrypt an encrypted message, where you only have Sirrst 96-bits of the 12S-bit secret key (last 9 bytes of the secret key are he program should be called "findk", and should deal with two files that contain the encrypted text as a stream of bytes and the first 96-bits of the key, respetively. The program should decryptedn standard the the missing h6177 of the key in hexadecimal, themessage and the time took to find the correct key. o To test this part, here is the encrypted file (c rt , and the first 96-13i. of the key Hint: the original message starts with the word "Salam"

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter8: Data And Network Communication Technology
Section: Chapter Questions
Problem 41VE
icon
Related questions
Question

Experimenting with AES-”S symmetric key cipher. Note: You may use any programming language that provided libraries for AES. Descrion: This assignment consists of two parts:
PART 1: write a program that uses AES-12/1 to decrypt a message. The program should be named "decrypt", and should deal with three files that contain the encrypted text as a stream of bytes, the 128-bit key for decryption stored as a stream of bytes, and file outcome of the decryption, respectively. o To test this program, here's an example of an encrypted message a. its 128-bit secret key

PART 2: you will try to use "brute force" to decrypt an encrypted message, where you only have Sirrst 96-bits of the 12S-bit secret key (last 9 bytes of the secret key are he program should be called "findk", and should deal with two files that contain the encrypted text as a stream of bytes and the first 96-bits of the key, respetively. The program should decryptedn standard the the missing h6177 of the key in hexadecimal, themessage and the time took to find the correct key. o To test this part, here is the encrypted file (c rt , and the first 96-13i. of the key Hint: the original message starts with the word "Salam"

Expert Solution
steps

Step by step

Solved in 4 steps with 1 images

Blurred answer
Knowledge Booster
Encryption and decryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning