Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Final Project Specifications and DemoDesign a digital system, using Logisim, for encryption - decryption using a 7 bit toy - key with the following functionality:
Final Project Specifications and DemoDesign a digital system, using Logisim, for encryptiondecryption using a bit toykey with the following
functionality:
Use the Logisim Keyboard which interfaces with your laptop keyboard to write text. Text will be
displayed in four TTY Logisim displays.
In the first display you will display the text as it is typed in the keyboard.
In the second display you will display the encrypted text delivered by the Encryption Subsystem using a
bit toykey. The encryption method using the bit key is your decision. The bits in your key will be used,
somehow, to change the original bits of each character. The change should be reversible at the
decoding stage. Hint: There are only possible combinations of bits, therefore is very easy to crack
the encryption resulting from a single bit toykey if you know the encryption method.
In the third display you will display the text decrypted by your client, using the client decryption sub
system, at the other end of the channel. You client knows the encryption method and also knows the
encryption key.
In the fourth display you will display the text decrypted by the Hacker, using the Hacker Key Search and
Hacker Decryption subsystems. The hacker knows the encryption method but not the bit encryption
key.
Constraints: Spaces are not encrypted. You should check the bit representation of a space and
somehow you should leave it unchanged when it appears in the channel. When there are no characters in
the channel the decryption displays are also frozen. Use typeD flip flops if needed.
You may use builtin Logisim blocks if desired Such as Counters and Registers
Hacker applies each possible bit key and until text becomes intelligibly.
Each key that the Hacker applies should be tried on two to three words or about characters enough to
see a pattern of intelligibly text Hint: Therefore the clock for the circuit that produces each Key for the
Hacker should be slower than the system clock Look for information regarding clock division
When text becomes intelligibly hacker stops the search and retains the working key.
I need step by step to make the encryption circuit in logisim
I need to see the drawing of the complete circuit.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started