Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Crib Dragging Example So this doesn't have to have code. Could someone please tell me step by step what I am supposed to do. I

Crib Dragging Example

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

So this doesn't have to have code. Could someone please tell me step by step what I am supposed to do. I have exhausted all other resources and I cannot make any progress. I have XOR ciphertext 1 and 2 together. which gave me

Message 1 =

14061b00e4ebebb01d43ac33291d7aa75f1fe1e24dcf86115b9e8b9ef026417854a7f1adf71a5dfc0c70367fd21b8c44d67d3bdb610fd4561c0331ddc672629cf3b29668a3f44e38c9cb3f95fae277df73177eb2aaa9133a93d1ee1e9ee627ea8f4aaaa147087cce6c8cd08813f81caf9d7120486b16

Now what do I do? I know at some point I am supposed to XOR 100 Commonly used words.

3.0 Project Functionality 3.1 Overview The objective of the project is to demonstrate, from an attackers perspective, how insecure the use of a single key is over multiple messages. Your goal is to develop a program in the language you are most comfortable in, to retrieve the key used to encrypt multiple messages as well as decrypt said messages and an extra provided message. 3.2 Messages Many Time Pad Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream cipher, all with the same stream cipher key. Hint: XOR the ciphertexts together, and consider what happens when a space is XORed with a character in [a-zA-Z]. ciphertext #1: 9d6e7a7d155295eef8512c087da560848743aaa9985ee3848a768c3484d2e2ea6b3f4e5483861 2d55987ff47827360bd4809bab835fale65f8459c6814472508cc7f72241ee70c34fb9e7c8c4c 246132845d5d73d070de99a73efele9ee627ea8f4aaae147087cce6c3cd08813581caf9d71204 86b16 ciphertext #2: 8968617d0f1b97e5ee51280f3aec72caf106bdb48d44a 68291339e35db86b6f56f2140548bf25 3cd1593e8498baa 34ba4f02fda070e25075b04387681b473610cc7f75614ae21a3efb8672d85d 3e2031cc5b5a23c17ad9cda334ef10 ciphertext #3: 8f6f3779154f99e8e014375c34a 267c1e745bbad895fe391c526873383cfale86632575481e80 3041093f94d97a738f54d02a9ec66bb1360b44ed3210206254fcc627b240bfb1d38b899788a09 3d2f2a9b4b1327c17edf99b224fe1e9ee66effc649a3b5430c7c9a2a 91d7c51bab14e9d57d395 66a 563404340c858c5a93fff89e0394f3f49369ce9c6ee6f26b29a82e29fb9ca0a 8 657c48ad2c 60eaf70 a 6b44918a 40630392171ca29b87cd9e9e037c6ad2bc4be08c6lba6223a8bac0a024741 b71b270a0579ab1d0308ce9b54b391a6a 49ebacfc5eb5b57dd56caf0b1694544cfa6e ciphertext #4: 9a697e6b415897fef902205c34a267d6fa 42 abbe 985fe3939728963598clbofc7a3b4c17c2f10 1c51488f94199b667f54009b9eb7df40721ac4a 963156473406cc62707406ea043cb586789009 3f2f658048433fc07ccacdaf23f54dd9a 853e4df41ace6130e61986f8cd48156b11daad1692d4 33518349d2d0ec09a4ddafdf59e0882 a 4ffdd7cdd8 96bf7bb663ea83f37f59ca0e17a 7a 4aa96c 25fee50d2b0d93de5f6719091700e19e97d18607077c2985f856ef8035ab7c66bdbadfee2 a 664 e77bf66ac078 8bac1748eacb45936196004a2b0e955b6a8798166e4 ciphertext #5: 8a68717e085ed8eae515651438a07fc9f448 feb 49358b19f812385249386b6f56f73461bbce21 6dc0dcle24ecfa361b74d0ebeeb7efe0921bb 508a38024921118d7b757d44af1d31bed270995d 3e24288d4c5a30c8738b9bb23ef25d9caa27e4c908abfc550b678b279604891ab512a790772c5 f2f5d3f872802cb895a93f7abd51993e5ee937 6dbd072f0f27b35e43f2ffb85b7e4773242bb33 7caee 40067079f934477149c520bfa9c81cf97d01c6125c6f352f88833af7466babc98e3247f4 b70ae7cee 40c9b0cc2780bba 25e 325e694bacbfef59a5b27d8631 ciphertext #6: 9a6972380c5a91e5f80537193ca133c7e75faea9924bb191953e8f22d7c5adf067264b1d96f85 3c41892 ad448 Obd73f54902b1af35ef1860ac02972d05013543d93d306603fb4932be8b3d8f48 25613183571320c170d9cde 638f41e80e173e3dc5caefb574d6fce 688cc49113f515a6cf7f2c0 66e4c3385230885884ddcf3f898029fele8dd3fcc9f76f3a77d35fa2d75b281b7e56b7f45bf32 25e3ff003501078d146e018e484ee183830187ca0d6025d5f348ed9b61ae7f33acbfddf36b774 d60a86ca016d1f4c83b8dbda f59795e624 dbdbbf310 a 5b271813fa31400835f4eec250ddd43de 10a 25e790c9f28e7ebd0c74fa11181fcf79cf68d5bd75b662bbacf38d31b39cbcdc71d213d611 812188ebe 8855dcf857337ac75e2b36cceb0c4a729e1b7c72e78e0962c112351e62aa0f41456e bd34667929cdb06c2ffd627d7b11da Ob6dd57900docafd9651 a 32e8d4247a 7ab3cce24d08150c eee321b38 dae50481acf00896ce1f8c7b7499dcf79008c9b5aee24b8de4ff17371160 ciphertext #7: 876f377f04559df9ea1d695c2db 971c8fc45feb6985543939728963598c1b0fc7a3b5c5491f80 Od81c8cfe089aa071f54906afaf38eflf2cab4d9f3e130636118369716107fc4938a8d269904C 7623249f51407306798bcdae29bb5f9bef68f9c65ca7f81d4 d5 a 8 66fdedc8a05ac53b9cf792d4 9625129852e17858f53d4f1aa9c1993e9bac770cb9162 a 3b46622a82e2ef09fbbeb2e7942a360 66fce91f330b978c557208805207f1cc9cd29392487064d6f95ba8862fea 642eabf3c8f222785 e25bc74e35386a6d6748cafe 750320c7c04a7bfef57b4fa799b6baf1d06834901 ciphertext #8: 90647079135f94eef80265133bec67ccf006b3bc8944 a 69084228 2296cae2e962364a069ba11 1c91188e34ccfb27af5400bbaa 467f20469b50ed33c1e436601897869240be30 e36a 996 699044 2561249e5d1327c170d8dce638f35f83a866f9ca08b8f05f0123856491c68b56b91dad9d6b2c4 a 6315238b2316088b51c7fbbcd50f9ee7fbc66ccado 6 febb 77070e92c3eb292befb61325 Obf2c 69a3e40a3410959a14630e9d5219e780828c81ca1d766cc0f811 ww1O U U . w CD N ciphertext #10: ciphertext #9: vo 3322379548473ac67185 o U CD 40 O UW O 00 N 40 40 0 0 T V in 0 Hi Nih No U 8f2175740e5893 abe818351438be33cde 606adb2d04fa29c8933826195c3a1fc7f20405496e91 ffe56142e8164ded48415b053abd1732 a 4 2900872b72624aeb082 dbad27c8c09 5 No CD 0 N in CD 564328009e726d7003e00779ba9c79d84d 4bad08833922998c2b1bd6f3e55188df85 3.0 Project Functionality 3.1 Overview The objective of the project is to demonstrate, from an attackers perspective, how insecure the use of a single key is over multiple messages. Your goal is to develop a program in the language you are most comfortable in, to retrieve the key used to encrypt multiple messages as well as decrypt said messages and an extra provided message. 3.2 Messages Many Time Pad Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream cipher, all with the same stream cipher key. Hint: XOR the ciphertexts together, and consider what happens when a space is XORed with a character in [a-zA-Z]. ciphertext #1: 9d6e7a7d155295eef8512c087da560848743aaa9985ee3848a768c3484d2e2ea6b3f4e5483861 2d55987ff47827360bd4809bab835fale65f8459c6814472508cc7f72241ee70c34fb9e7c8c4c 246132845d5d73d070de99a73efele9ee627ea8f4aaae147087cce6c3cd08813581caf9d71204 86b16 ciphertext #2: 8968617d0f1b97e5ee51280f3aec72caf106bdb48d44a 68291339e35db86b6f56f2140548bf25 3cd1593e8498baa 34ba4f02fda070e25075b04387681b473610cc7f75614ae21a3efb8672d85d 3e2031cc5b5a23c17ad9cda334ef10 ciphertext #3: 8f6f3779154f99e8e014375c34a 267c1e745bbad895fe391c526873383cfale86632575481e80 3041093f94d97a738f54d02a9ec66bb1360b44ed3210206254fcc627b240bfb1d38b899788a09 3d2f2a9b4b1327c17edf99b224fe1e9ee66effc649a3b5430c7c9a2a 91d7c51bab14e9d57d395 66a 563404340c858c5a93fff89e0394f3f49369ce9c6ee6f26b29a82e29fb9ca0a 8 657c48ad2c 60eaf70 a 6b44918a 40630392171ca29b87cd9e9e037c6ad2bc4be08c6lba6223a8bac0a024741 b71b270a0579ab1d0308ce9b54b391a6a 49ebacfc5eb5b57dd56caf0b1694544cfa6e ciphertext #4: 9a697e6b415897fef902205c34a267d6fa 42 abbe 985fe3939728963598clbofc7a3b4c17c2f10 1c51488f94199b667f54009b9eb7df40721ac4a 963156473406cc62707406ea043cb586789009 3f2f658048433fc07ccacdaf23f54dd9a 853e4df41ace6130e61986f8cd48156b11daad1692d4 33518349d2d0ec09a4ddafdf59e0882 a 4ffdd7cdd8 96bf7bb663ea83f37f59ca0e17a 7a 4aa96c 25fee50d2b0d93de5f6719091700e19e97d18607077c2985f856ef8035ab7c66bdbadfee2 a 664 e77bf66ac078 8bac1748eacb45936196004a2b0e955b6a8798166e4 ciphertext #5: 8a68717e085ed8eae515651438a07fc9f448 feb 49358b19f812385249386b6f56f73461bbce21 6dc0dcle24ecfa361b74d0ebeeb7efe0921bb 508a38024921118d7b757d44af1d31bed270995d 3e24288d4c5a30c8738b9bb23ef25d9caa27e4c908abfc550b678b279604891ab512a790772c5 f2f5d3f872802cb895a93f7abd51993e5ee937 6dbd072f0f27b35e43f2ffb85b7e4773242bb33 7caee 40067079f934477149c520bfa9c81cf97d01c6125c6f352f88833af7466babc98e3247f4 b70ae7cee 40c9b0cc2780bba 25e 325e694bacbfef59a5b27d8631 ciphertext #6: 9a6972380c5a91e5f80537193ca133c7e75faea9924bb191953e8f22d7c5adf067264b1d96f85 3c41892 ad448 Obd73f54902b1af35ef1860ac02972d05013543d93d306603fb4932be8b3d8f48 25613183571320c170d9cde 638f41e80e173e3dc5caefb574d6fce 688cc49113f515a6cf7f2c0 66e4c3385230885884ddcf3f898029fele8dd3fcc9f76f3a77d35fa2d75b281b7e56b7f45bf32 25e3ff003501078d146e018e484ee183830187ca0d6025d5f348ed9b61ae7f33acbfddf36b774 d60a86ca016d1f4c83b8dbda f59795e624 dbdbbf310 a 5b271813fa31400835f4eec250ddd43de 10a 25e790c9f28e7ebd0c74fa11181fcf79cf68d5bd75b662bbacf38d31b39cbcdc71d213d611 812188ebe 8855dcf857337ac75e2b36cceb0c4a729e1b7c72e78e0962c112351e62aa0f41456e bd34667929cdb06c2ffd627d7b11da Ob6dd57900docafd9651 a 32e8d4247a 7ab3cce24d08150c eee321b38 dae50481acf00896ce1f8c7b7499dcf79008c9b5aee24b8de4ff17371160 ciphertext #7: 876f377f04559df9ea1d695c2db 971c8fc45feb6985543939728963598c1b0fc7a3b5c5491f80 Od81c8cfe089aa071f54906afaf38eflf2cab4d9f3e130636118369716107fc4938a8d269904C 7623249f51407306798bcdae29bb5f9bef68f9c65ca7f81d4 d5 a 8 66fdedc8a05ac53b9cf792d4 9625129852e17858f53d4f1aa9c1993e9bac770cb9162 a 3b46622a82e2ef09fbbeb2e7942a360 66fce91f330b978c557208805207f1cc9cd29392487064d6f95ba8862fea 642eabf3c8f222785 e25bc74e35386a6d6748cafe 750320c7c04a7bfef57b4fa799b6baf1d06834901 ciphertext #8: 90647079135f94eef80265133bec67ccf006b3bc8944 a 69084228 2296cae2e962364a069ba11 1c91188e34ccfb27af5400bbaa 467f20469b50ed33c1e436601897869240be30 e36a 996 699044 2561249e5d1327c170d8dce638f35f83a866f9ca08b8f05f0123856491c68b56b91dad9d6b2c4 a 6315238b2316088b51c7fbbcd50f9ee7fbc66ccado 6 febb 77070e92c3eb292befb61325 Obf2c 69a3e40a3410959a14630e9d5219e780828c81ca1d766cc0f811 ww1O U U . w CD N ciphertext #10: ciphertext #9: vo 3322379548473ac67185 o U CD 40 O UW O 00 N 40 40 0 0 T V in 0 Hi Nih No U 8f2175740e5893 abe818351438be33cde 606adb2d04fa29c8933826195c3a1fc7f20405496e91 ffe56142e8164ded48415b053abd1732 a 4 2900872b72624aeb082 dbad27c8c09 5 No CD 0 N in CD 564328009e726d7003e00779ba9c79d84d 4bad08833922998c2b1bd6f3e55188df85

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Select Healthcare Classification Systems And Databases

Authors: Katherine S. Rowell, Ann Cutrell

1st Edition

0615909760, 978-0615909769

More Books

Students also viewed these Databases questions