Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

b) A simple crypto algorithm is used to protect data from unauthorised users. The plain text (the unprotected data) of 8-bit size is fed

image text in transcribed  


b) A simple crypto algorithm is used to protect data from unauthorised users. The plain text (the unprotected data) of 8-bit size is fed to the avr32 microcontroller that runs the algorithm. The algorithm uses an 8-bit secret key known only to both the sender and the recipent. The output is an 8-bit size ciphertext (protected data). The crypto algorithm will process the data according to the following steps: i. Exor the plaintext with key. ii. Shift left the data 2 times iii. EX-OR with key iv. Shift right the data 3 times v. EX-OR with key Write the C program to perform the processes. Produce the ciphertext for Plaintext=0x24 and Key=0x28. Use the appropriate registers to store the data and the key. (11 Marks)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

Here is a C program that performs the described crypto algorithm to produce the ciphertex... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles of Information Systems

Authors: Ralph M. Stair, George W. Reynolds

9th edition

978-1337097536, 1337097535, 978-1337515634, 1337515639, 978-0324665284

More Books

Students also viewed these Programming questions

Question

=+a) Create a 90% confidence interval for this percentage.

Answered: 1 week ago