Answered step by step
Verified Expert Solution
Question
1 Approved Answer
b) A simple crypto algorithm is used to protect data from unauthorised users. The plain text (the unprotected data) of 8-bit size is fed
b) A simple crypto algorithm is used to protect data from unauthorised users. The plain text (the unprotected data) of 8-bit size is fed to the avr32 microcontroller that runs the algorithm. The algorithm uses an 8-bit secret key known only to both the sender and the recipent. The output is an 8-bit size ciphertext (protected data). The crypto algorithm will process the data according to the following steps: i. Exor the plaintext with key. ii. Shift left the data 2 times iii. EX-OR with key iv. Shift right the data 3 times v. EX-OR with key Write the C program to perform the processes. Produce the ciphertext for Plaintext=0x24 and Key=0x28. Use the appropriate registers to store the data and the key. (11 Marks)
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Here is a C program that performs the described crypto algorithm to produce the ciphertex...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started