QUESTION 2 a) Assume that k = 3 and n = 5. Then the list of datawords and codewoards are given as follows: Dataword Codeword 000 00000 010 01001 011 01100 101 10101 Assume the sender encodes the dataword 010 as 01001 and sends it to the receiver. Explain the following scenario. i. The receiver receives 01001. ii. The receiver receives 01101. 11. The receiver receives 00000. b) Identify the type of error for the following situation. i. A sender sends 01001 and the receiver receives 01101. 11. A sender sends 01001 and the receiver receives 00000.
Q: padding Question 11 Suppose we have a block cipher with block size 8-bytes (64-bits) and we will use…
A: PKCS#5 padding is defined for 8-byte block sizes ECB should not be used if encrypting more than…
Q: The decrypted message of fdhvdu fiskhu is: Blank 1 *Hint the text was encrypted using f(p) - (p+3)…
A: To decrypt the message in first we just need to decrease the value by 3 characters to decrypt the…
Q: you should achieve O(n) time)When Bob wants to send Alice a message M on the Internet, he breaks M…
A: Answer: When Alice receives the packets, every packet is associated with a sequence number. The…
Q: If you have a codeword set that has a hamming distance of at least 13 between all codewords, then…
A: The Hamming distance between two codewords is simply the number of bits that are disparate between…
Q: c. Suppose Alice computes the Secret suffix MAC (page 322: secret suffix MAC(x) = h(x || key)) for…
A: Answer is given below .
Q: 3. (b) A sender needs to send the four data items Ox1236, OXABCC, OX03BC, and OXEEEE. To avoid…
A: Four data items are: 0x1236 0xABCC 0x03BC 0xEEEE 0x is the prefix that is used to denote the data…
Q: Given the data word codeword at the sender site. PLEASE ANSWER IT CORRECTLY AND SHOW EVERY STEPS.…
A: Solution:
Q: Which statement is correct about this petri Net: p2 p4 p1 p3 O The petri net is unbounded since…
A: A Petri net is a group of arcs, places, and transitions. In the Petri net directed arcs connect the…
Q: Suppose we have a code consisting of 5 ternary codewords, with codeword lengths (1, 1, 2, 2, 3). How…
A: the answer is given below:-
Q: Suppose N people want to communicate with each of N – 1 other people using symmetric key encryption.…
A: Actually, Encryption is the conversion of data into a form, called a ciphertext, that cannot be…
Q: We have intercepted a message that we need to decode. Luckily, we know that they use the letters A…
A: As explained in algorithm we can do the above process N/2 times and for odd (N/2)-1 where N is the…
Q: Let M be the plaintext message M = MALAYSIA and the private key, K ISSOGOOD a) Using the expansion…
A: After a conversation of plain text M= MALAYSIA to ASCII/UTF-8 it becomes 01001101 01000001 01001100…
Q: Consider the following message M=1010001101. The cyclic redundancy check (CRC) for this message…
A: Introduction given , message M=1010001101. divisor polynomial is x5 + x4 + x² + 1 . We have to…
Q: Given that K=3 and the transmitted message is repeated 7 times, what is the value of R?
A: N=7 K= 3 R=K/N
Q: Exercise 3.13 Suppose we add another bit to the toy number system, allowing signif- icands of the…
A: The solution for the above given question is given below:
Q: above question : Suppose that we have the following 128-bit AES key, given in hexadecimal…
A: Advanced Encryption Standard (AES): Airstrikes that are computational complexity is faster than a…
Q: 3.(a) What is minimum hamming distance? Why are redundant bits added by the sender? Name two error…
A: Given: What is the shortest hammering distance? Why does the sender include superfluous bits? Name…
Q: Given X = [14 15 19 4 12 11 27 10]; write a script to replace the odd elements of X with zeros, and…
A: Code: X=[14 15 19 4 12 11 27 10]Z=X;Z(rem(X,2) == 1)=0
Q: A sender needs to send the four data items 0x0236, 0x0BCC, 0x03BC, and 0xEEEE. To avoid confusion,…
A:
Q: 1. Given the generator polynomial G(x) = X5+X3+X+1 and the message polynomial M(x) = X9+X7+X6+X²+1…
A:
Q: When Bob wants to send Alice a message M on the Internet, he breaks M into n data packets, numbers…
A: Alice can use the fragmentation scheme as in computer networks. Let's say the message size is…
Q: Q) Consider the following NN below, using the back-propagation algorithm, t a) Find all the errors…
A: In above figure have three parts 1.input part 2.hidden part 3.output part Below figure t Get the…
Q: When a sender wants to transmit a private message to a recipient, the sender takes the plaintext…
A: the process of turning data or information into a code, particularly to restrict unwanted access.
Q: Question ACTIVITY : CODING Suppose the following messages are source encoded given by the…
A: The message Can be decoded as 10010011 1)LEFT-DOWN-UP-RIGHT 01010010 2)DOWN-DOWN-UP-LEFT…
Q: . Given a starting address: 192.200.0.0 • Deltona has 4,000 users • New Smyrna Beach has 5,000 users…
A: Given that, Starting address= 192.200.0.0 Number of users in Deltona= 4000 Number of users in New…
Q: Consider two events, a and b, and a set of these binary events is S = {a, b, a, a, b, a, b, b, b, a,…
A: Answer: Binary events S = { a, b,a,a,b,a,b,b,b,a,a,a} If we split at middle then left have 4 a and 2…
Q: Sender needs to send 10011110 to a receiver. For efficient reception of the data sender wants to…
A: Error Detecting Code(EDC) is used to check information/data and its error, and if any error occurs…
Q: Assume we have a code composed of 5 ternary codewords of varying lengths (1, 1, 2, 2, 3). How many…
A: Intro Assume we have a code composed of 5 ternary codewords of varying lengths (1, 1, 2, 2, 3). How…
Q: Assume that Bob & Alice share a secret K. Describe how Alice can authenticate herself to Bob using a…
A: Actually, the given question is: Assume that Bob & Alice share a secret K. Describe how Alice…
Q: we are given a dataset named Park having a variable T, B & R. I want to rename T to S and R to Q.…
A: In SAS we have several options like rename, keep, drop to modify the attributes of given dataset.…
Q: 6. Consider 7-bit messages that we encode into 11-bit codewords using 4 parity bits. Thus our…
A: The question is: which of the given parity bits satisfy property (0) or (1) or both.
Q: Show all the steps to find value of CRC for dataword 10110101 and the divisor (polynomial value) is…
A: A cyclic redundancy check (CRC) is an error-detecting code commonly used in digital networks and…
Q: Mr. Thapa wants to send a message to his friend Mr. Chen via a public channel. To make his message…
A:
Q: 3. Consider the following forwarding table (that uses longest prefix matching). Rewrite this…
A: the forwarding table using the a.b.c.d/x notation is given below
Q: Question 1 For good encyption schemes, the messages are uniformly distributed over the mes O True O…
A: In cryptography, encryption is the process of encoding information. This process converts the…
Q: What is the number of padding bits if the length of the original message is 2590 bits? Do we need…
A: Ans 1: We have to calculate by : |P| = (-2590 - 128) mod 1024 = -2718 mod 1024 = 354…
Q: The eficiency of 64 equiprobable messages coded in fixed length i . a9 b 9l00% AP 2+ Ihe effciency…
A: #According to our Guidelines I can give you 3 solution to maximum first 3 questions.
Q: 7. In the proof of the claim that for any n-bit messages, any resulting code C with parity bits…
A: Answer : e is the correct as minimum distance is 3 so we take only three cases.
Q: In the following problems, check suitable rule (Sum, Subtraction or Product) and compute the total…
A: To do: check suitable rule for given
Q: All packets are treated equally in Priority Queuing. Select one: O True O False
A: A FIFO queue is a queue that operates on a first-in, first-out principle.
Q: In the diagram below, assume that X-145, B=2490, Y=106, D=3125, and Z=20. Determine the values of A,…
A: When X bytes are sent Seq# = A and Ack# = B where X = 145, B = 2490. To find: A = ? we know, bytes…
Q: 3. (b) Given the data word 10100111110 and the divisor 10111, Show the generation of the codeword at…
A:
Q: By using checksum of 8-bit approach, prove that a block of 16-bit data which has been sent contain…
A: Check sum is one of the error detection techniques used to check is there is an error present in…
Q: Assume a systematic (n, k) block code where n = 4, k =2 (a) Write all the codewords in this code.…
A: Since you are asking multiple questions, we are answering first 3 questions for you. If you want…
Q: Given the dataword x + x + x° +x* +x'+x+ 1, and the divisor x* +x+ 1, show the generation of the…
A:
Q: r1, 0(r5) LW r2, 4(r5) Add r3,r1,r7 Add r4
A: Draw out how the following code is run step-by-step with forwarding. What is the CPI? LW r1, 0(r5)…
Q: using c++ write a program program:- Suppose that you are receiving a packet number of a data…
A: We use selection sorting to put packets in order where we find minimum value to store at first…
Q: ACTIVITY: CODING III. Complete the given table by writing the channel encoded message by using…
A: Solution:
Step by step
Solved in 3 steps with 3 images
- When Bob wants to send Alice a message M on the Internet, he breaks M into n data packets, numbers the packets consecutively, and injects them into the network. When the packets arrive at Alice’s computer, they may be out of order, so Alice must assemble the sequence of n packets in order before she can be sure she has the entire message. Describe an efficient scheme for Alice to do this. What is the running time of this algorithm? From Data Structures and Algorithms C-7.561-The eficiency of 64 equiprobable messages coded in fixed length i . a9 b 9l00% AP 2+ Ihe effciency of 17 cquiprobable messages coded in a fixed lengh wil be approximately—— WI00% B)20% 8% d)non ofthe mentioned 3- The average code lengih L f 10 equiprobuble messages coded in a ixed length il be - 1 W2 94 dnonofthe mentioned 4 For 11 cquiprobable messages coded in fixed ength cod then 5- For 256 equiprobable messsges coded in fxed length code then**Please do A or C** a. Compute CBC-MAC for a message of 16 bits, “8642” (in Hexa). Assume a block size of 8 bits with an IV=F1 (in hexa). For simplicity, assume the encryption to be a simple XOR of the key with the plaintext. Let the encryption key be B4 (in Hexa). (Hint: Divide the message into blocks of 8 bits each; XOR each block with the previous cipher output; then encrypt this with the key. For the first block, XOR it with IV. Details in pages 325-326 Ch.12 of the textbook) b. Suppose Alice computes the Secret prefix MAC (page 322: secret prefix MAC(x) = h(key || x)) for the message ”AM” (in ASCII) with key “G” (in ASCII) that both Alice and Bob know. The hash function that is used is h(x1x2x3)= g(g(x1 XOR x2) XOR x3 ) where each xi is a character represented as 8 bits, and g(x) is a 8-bit string that is equal to the complement of bits in x. For example, g(10110011) = 01001100. The MAC is 8 bits. (8-bit ASCII representation of the characters is given below.) What is the…
- above question : Suppose that we have the following 128-bit AES key, given in hexadecimalrepresentation:54 77 6F 20 4F 6E 65 20 4E 69 6E 65 20 54 77 6F Construct the round key for the first round. Main Question: Complete the first round of the encryption (128-bit AES) of the following plaintext by using the round-key you generated above:63 72 79 70 74 61 6e 61 6c 79 73 69 73 6f 6e 65Give answer of both subparts. (Don't use AI)Alice is using the one-time pad and notices that when her key is all-zeroes ? = 0^?, then Enc(?, ?) = ? and her message is sent in the clear! To avoid this problem, she decides to modify the scheme to exclude the all-zeroes key. That is, the key is now chosen uniformly from {0, 1}^?\ {0^?}, the set of all ?-bit strings except 0^? . In this way, she guarantees that her plaintext is never sent in the clear. Is this variant still one-time perfectly secure? Justify your answer.
- 1. We have defined a symmetric cryptography algorithm using the XOR operator. Assume our messages (before encryption) consist of only uppercase and lowercase letters, digits and blank character. In addition, assume the key size is only one byte which is an integer between 0 and 255 (inclusive). The pseudocode of the proposed encryption algorithm is as follows: Read the message // for example message=”Hi” Read the key // for example key=10 Cipher_text=[] //an empty list for i=1 to len(message): Cipher_text= Cipher_text.append(XOR(message[i],key)) Return Cipher_text Assume XOR function, takes a character and the key, then returns the result of bitwise XOR of ASCII code of the letter with the key as an (one byte) integer. For example, if message=”Hi” and key=10, then we should first calculate the ASCCI code of “H” which is 72 and find the result of (72 XOR 10) which is 66. Then the ASCCI code of “i” is 105, so the result of (105 XOR 10) is 99. Thus the Cipher_text would be…1. We have defined a symmetric cryptography algorithm using the XOR operator. Assume our messages (before encryption) consist of only uppercase and lowercase letters, digits and blank character. In addition, assume the key size is only one byte which is an integer between 0 and 255 (inclusive). The pseudocode of the proposed encryption algorithm is as follows: Read the message // for example message=”Hi” Read the key // for example key=10 Cipher_text=[] //an empty list for i=1 to len(message): Cipher_text= Cipher_text.append(XOR(message[i],key)) Return Cipher_text Assume XOR function, takes a character and the key, then returns the result of bitwise XOR of ASCII code of the letter with the key as an (one byte) integer. For example, if message=”Hi” and key=10, then we should first calculate the ASCCI code of “H” which is 72 and find the result of (72 XOR 10) which is 66. Then the ASCCI code of “i” is 105, so the result of (105 XOR 10) is 99. Thus the Cipher_text would be…1. (A=0,Z=25) Encode: BE HONEST using the encrypting function f (p) = (p+ 3) mod 26. 2. Decode: GPWJO if the original message was encrypted using f (p) = (7p+ 10) mod 26. 3. What is the 6th term in the following sequence? 11, 15, 19, 23, ___, Blank 1 4. Using the Euclidean algorithm to compute for the gcd (1283, 7295), what is the value of the last nonzero remainder? 5. Is the given integer 9321 a prime or composite?
- Assume you are using any correct plaintext padding method, such as those described in lecture, with a 128-bit (16-byte) block cipher. If you are sending a message that is 184 bytes long, how many padding bytes would you need to add? Justify your answer. For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 0 a 8 e 1 c 9 d 2 f a 0 3 6 b 7 4 3 c 5 5 8 d b 6 4 e 9 7 2 f 1 You can think of this as a simple substitution cipher for hexadecimal digits. There is no “key” other than the table itself.The following message uses a direct mapping of letters to numbers (i.e. A-1, B=2, c-3, etc.).Using the values D=17 and m=21, decrypt the following message:10 15 12 18 1 3 17 14 7 18 14 17 17 9 18 14How many 14-bit strings (that is, bit strings of length 14) are there with: (a) start with sub-string 011? (b) have weight 7 (i.e., contain exactly 7 1’s) and start with the sub-string 011? (c) either start with 011 or end with 01 (or both)? (d) have weight 7 and either start with 011 or end with 01 (or both)?