Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Brute Force Problem byte[] of cipher3.bin: B@5c647e05 public static byte[] JACKAL_Decrypt (byte keyParti, byte keyPart2, byte[] cipherText) { if ((keyParticl) || (keyPartl>64) II (keyPart264)) throw

image text in transcribedimage text in transcribed

Brute Force Problem

byte[] of cipher3.bin: B@5c647e05

public static byte[] JACKAL_Decrypt (byte keyParti, byte keyPart2, byte[] cipherText) { if ((keyParticl) || (keyPartl>64) II (keyPart264)) throw new IllegalArgumentException ("JACKAL key values must be between 1 and 64"); byte x= (byte) (keyPart1+44); byte v= (byte) (keyPart2*=3); byte[]b=new byte[cipherText.length); for (int z=b.length-1;z>=0;Z--) { x= (byte) ((x keyPartl) $97); y= (byte) ((y* keyPart2) 289); b[2]= (byte) (cipherText[z] *x*y); return (b); After decrypting the message, you immediately fly to New York and prepare to intercept the exchange. With the element of surprise on your side, you easily defeat the agents of P.H.A.N.T.O.M. You expect to retrieve the secret plans from them; unfortunately, all you find is a USB drive with a single encrypted file (cipher3.bin). Back at your headquarters, Q gives you an implementation of the JACKAL decryption algorithm (JACKAL_Decrypt), but he has no clue what the secret key might be. Notice that the number of possible keys is fairly low for the Jackal cipher: both parts of the key are numbers between 1 and 64. Further, you know that the plaintext is a BMP image file, which means that the value of the first byte is 66 (character 'B' in ASCII) and the value of the second byte is 77 (character 'M'). Can you find the correct key and decrypt the ciphertext? public static byte[] JACKAL_Decrypt (byte keyParti, byte keyPart2, byte[] cipherText) { if ((keyParticl) || (keyPartl>64) II (keyPart264)) throw new IllegalArgumentException ("JACKAL key values must be between 1 and 64"); byte x= (byte) (keyPart1+44); byte v= (byte) (keyPart2*=3); byte[]b=new byte[cipherText.length); for (int z=b.length-1;z>=0;Z--) { x= (byte) ((x keyPartl) $97); y= (byte) ((y* keyPart2) 289); b[2]= (byte) (cipherText[z] *x*y); return (b); After decrypting the message, you immediately fly to New York and prepare to intercept the exchange. With the element of surprise on your side, you easily defeat the agents of P.H.A.N.T.O.M. You expect to retrieve the secret plans from them; unfortunately, all you find is a USB drive with a single encrypted file (cipher3.bin). Back at your headquarters, Q gives you an implementation of the JACKAL decryption algorithm (JACKAL_Decrypt), but he has no clue what the secret key might be. Notice that the number of possible keys is fairly low for the Jackal cipher: both parts of the key are numbers between 1 and 64. Further, you know that the plaintext is a BMP image file, which means that the value of the first byte is 66 (character 'B' in ASCII) and the value of the second byte is 77 (character 'M'). Can you find the correct key and decrypt the ciphertext

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Oracle Autonomous Database In Enterprise Architecture

Authors: Bal Mukund Sharma, Krishnakumar KM, Rashmi Panda

1st Edition

ISBN: 1801072248, 978-1801072243

More Books

Students also viewed these Databases questions

Question

Explain the importance of Human Resource Management

Answered: 1 week ago

Question

Discuss the scope of Human Resource Management

Answered: 1 week ago

Question

Discuss the different types of leadership

Answered: 1 week ago

Question

Write a note on Organisation manuals

Answered: 1 week ago