Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Design Specifications:Design a digital system, using Logisim, for encryption - decryption using a 7 bit toy - key with the following functionality: 1 . Use
Design Specifications:Design a digital system, using Logisim, for encryptiondecryption using a bit toykey with the following functionality: Use the Logisim Keyboard which interfaces with your laptop keyboard to write text. Text will be displayed in four TTY Logisim displays In the first display you will display the text as it is typed in the keyboard In the second display you will display the encrypted text delivered by the Encryption Subsystem using a bit toykey. The encryption method using the bit key is your decision. The bits in your key will be used, somehow, to change the original bits of each character. The change should be reversible at the decoding stage. Hint: There are only possible combinations of bits, therefore is very easy to crack the encryption resulting from a single bit toykey if you know the encryption method In the third display you will display the text decrypted by your client, using the client decryption subsystem, at the other end of the channel. You client knows the encryption method and also knows the encryption key In the fourth display you will display the text decrypted by the Hacker, using the Hacker Key Search and Hacker Decryption subsystems. The hacker knows the encryption method but not the bit encryption key Constraints: Spaces are not encrypted. You should check the bit representation of a space and somehow you should leave it unchanged when it appears in the channel. When there are no characters in the channel the decryption displays are also frozen. Use typeD flip flops if needed. You may use builtin Logisim blocks if desired Such as Counters and Registers Hacker applies each possible bit key and until text becomes intelligibly Each key that the Hacker applies should be tried on two to three words or about characters enough to see a pattern of intelligibly text Hint: Therefore the clock for the circuit that produces each Key for the Hacker should be slower than the system clock Look for information regarding clock division When text becomes intelligibly hacker stops the search and retains the working key.See demonstration videos provided for the project.Optional VHDL Bonus: A working VHDL realization, in addition to a Logisim implementation, is worth up to bonus points.A possible architecture of your system, using different encryption decryption subsystems.
I need the logisim circuit done, not explained. It can be a screenshot or a drawing. I need the one without VHDL and if possible the one with VHDL
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started