Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Consider the following encryption scheme to provide confidentiality. A and B want to communicate with each other. A and B share a secret two bit

image text in transcribed
Consider the following encryption scheme to provide confidentiality. A and B want to communicate with each other. A and B share a secret two bit number T i.e. T is known only to A and B. A gets a 56-bit DES key K by repeating T 28 times. For example, if T was 01, then K would be 010101 ... Independently, B also gets the 56-bit DES key K in the same way. Now if A wants to send M to B, A will calculate C = E_K (M) and send C to B. B will recover the plaintext by doing M = D_K (C). Is this a good scheme? Give a YES/NO answer. If you said NO explain what you think is the single biggest weakness of the scheme

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Beginning Databases With PostgreSQL From Novice To Professional

Authors: Richard Stones, Neil Matthew

2nd Edition

1590594789, 978-1590594780

More Books

Students also viewed these Databases questions

Question

What is the learning and growth perspective?

Answered: 1 week ago

Question

Describe benchmarking and how it can be used in cost management

Answered: 1 week ago

Question

Explain the concept of shear force and bending moment in beams.

Answered: 1 week ago

Question

1 What demand is and what affects it.

Answered: 1 week ago