EBK COMPUTER NETWORKING
EBK COMPUTER NETWORKING
7th Edition
ISBN: 8220102955479
Author: Ross
Publisher: PEARSON
Question
Book Icon
Chapter 8, Problem P4P

a)

Program Plan Intro

Given Information:

Each block cipher Tireverses the order of the eight input bits. The 64-bit scrambler does not modify any bits and hence the output value of the mth bit is equal to the input value of the mth bit.

Example:

“11110000” becomes “00001111”.

Block Cipher:

A Block Cipher is a method of encrypting text in which a cryptographic key and algorithm are applied to blocks of data.

b)

Program Plan Intro

Given Information:

Each block cipher Tireverses the order of the eight input bits. The 64-bit scrambler does not modify any bits and hence the output value of the mth bit is equal to the input value of the mth bit.

Example:

“11110000” becomes “00001111”.

Block Cipher:

A Block Cipher is a method of encrypting text in which a cryptographic key and algorithm are applied to blocks of data.

c)

Program Plan Intro

Given Information:

Each block cipher Tireverses the order of the eight input bits. The 64-bit scrambler does not modify any bits and hence the output value of the mth bit is equal to the input value of the mth bit.

Example:

“11110000” becomes “00001111”.

Block Cipher:

A Block Cipher is a method of encrypting text in which a cryptographic key and algorithm are applied to blocks of data.

Blurred answer
Students have asked these similar questions
a. Compute CBC-MAC for a message of 16 bits, “8642” (in Hexa). Assume a block size of 8 bits with an IV=F1 (in hexa). For simplicity, assume the encryption to be a simple XOR of the key with the plaintext. Let the encryption key be B4 (in Hexa).  (Hint: Divide the message into blocks of 8 bits each; XOR each block with the previous cipher output; then encrypt this with the key. For the first block, XOR it with IV. Details in pages 325-326 Ch.12 of the textbook)     b. Suppose Alice computes the Secret prefix MAC (page 322: secret prefix MAC(x) = h(key || x)) for the message ”AM” (in ASCII) with key  “G” (in ASCII) that both Alice and Bob know. The hash function that is used is h(x1x2x3)= g(g(x1 XOR x2) XOR x3 ) where each xi is a character represented as 8 bits, and g(x) is a 8-bit string that is equal to the complement of bits in x. For example, g(10110011) = 01001100. The MAC is 8 bits. (8-bit ASCII representation of the characters is given below.) What is the Secret prefix MAC…
The very first step in the SHA1 algorithm is to pad the message so that it is a multiple of 512 bits. This padding occurs as follows (from NIST FPS 180-2): Suppose the length of the message M is L bits. Append bit 1 to the end of the message, followed by K zero bits where K is the smallest non-negative solution to L+1+K 448 (mod 512). Next append a 64-bit block that is a binary representation of the length integer L. For example, Message = “abc” length L = 24 bits 001100001 01100010 01100011 1 00……000 00…011000 a b c <---423---> <---64----> <-------------------512------------------------------>. Why do we include the length of the message in the calculation of the hash code?
00010280000000000000000000000000 This answer is not correct. Please give correct answer
Knowledge Booster
Background pattern image
Similar questions
SEE MORE QUESTIONS
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education