Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Design Specifications:Design a digital system, using Logisim, for encryption - decryption using a 7 bit toy - key with the following functionality: 1 . Use

Design Specifications:Design a digital system, using Logisim, for encryption-decryption using a 7 bit toy-key with the following functionality:1. Use the Logisim Keyboard (which interfaces with your laptop keyboard) to write text. Text will be displayed in four TTY Logisim displays.2. In the first display you will display the text as it is typed in the keyboard.3. In the second display you will display the encrypted text delivered by the Encryption Sub-system using a 7 bit toy-key. The encryption method using the 7 bit key is your decision. The 7 bits in your key will be used, somehow, to change the original 7 bits of each character. The change should be reversible at the decoding stage. Hint: There are only 128 possible combinations of 7 bits, therefore is very easy to crack the encryption resulting from a single 7 bit toy-key if you know the encryption method.4. In the third display you will display the text decrypted by your client, using the client decryption subsystem, at the other end of the channel. You client knows the encryption method and also knows the encryption key.5. In the fourth display you will display the text decrypted by the Hacker, using the Hacker Key Search and Hacker Decryption sub-systems. The hacker knows the encryption method but not the 7-bit encryption key.6. Constraints: Spaces are not encrypted. You should check the 7 bit representation of a space and somehow you should leave it unchanged when it appears in the channel. When there are no characters in the channel the decryption displays are also frozen. Use type-D flip flops if needed. 7. You may use built-in Logisim blocks if desired (Such as Counters and Registers).8. Hacker applies each possible 7-bit key and until text becomes intelligibly.9. Each key that the Hacker applies should be tried on two to three words or about 20 characters (enough to see a pattern of intelligibly text). Hint: Therefore the clock for the circuit that produces each Key for the Hacker should be slower than the system clock (Look for information regarding clock division).10. When text becomes intelligibly hacker stops the search and retains the working key.See demonstration videos provided for the project.Optional VHDL Bonus: A working VHDL realization, in addition to a Logisim implementation, is worth up to 6 bonus points.A possible architecture of your system, using different encryption decryption subsystems.
I need the logisim circuit done, not explained. It can be a screenshot or a drawing. I need the one without VHDL and if possible the one with VHDL

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Relational Database Design With Microcomputer Applications

Authors: Glenn A. Jackson

1st Edition

0137718411, 978-0137718412

More Books

Students also viewed these Databases questions

Question

Determine Yeq for the circuit in Fig. 9.75. 5 3

Answered: 1 week ago