Question
1) Analysis and Comparison of the Toy Stream Cipher Concept: a. Potential Vulnerabilities: In the above toy stream cipher application, assume that Alice uses your
1) Analysis and Comparison of the Toy Stream Cipher Concept: a. Potential Vulnerabilities: In the above toy stream cipher application, assume that Alice uses your software as is, and after encrypting n blocks of data, her computer completely crashes and then re-start just code to encrypt the rest of the data. Does this create a specific vulnerability in the encryption process? Describe an attack that can exploit the current state of the implementation in this event (the answer should have ideally 5-6 sentences, backed up with some basic equations to support the arguments). b. Potential Remedies: Can you suggest at least two ways to mitigate the negative impacts of these potential risks? Your solution should address the root cause of this vulnerability (remember in-class discussions). You can consider an approach only local to the machine, and another that gets benefits from the internet connection. c. Stream cipher vs. OPT: The toy stream-cipher application, as indicated, is an instantiation of the PRNG approach discussed in class. Hence, it offers several advantages, but also has some limitations compared to pure OTP encryption. Specifically: i. Describe, with 2-3 sentences each, at least three advantages of the stream cipher technique over OTP. ii. Describe, with 2-3 sentences each, one potential superiority of OTP over the stream-cipher technique.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started