Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Final Project Specifications and DemoDesign a digital system, using Logisim, for encryption - decryption using a 7 bit toy - key with the following functionality:

Final Project Specifications and DemoDesign a digital system, using Logisim, for encryption-decryption using a 7 bit toy-key with the following
functionality:
1. Use the Logisim Keyboard (which interfaces with your laptop keyboard) to write text. Text will be
displayed in four TTY Logisim displays.
2. In the first display you will display the text as it is typed in the keyboard.
3. In the second display you will display the encrypted text delivered by the Encryption Sub-system using a 7
bit toy-key. The encryption method using the 7 bit key is your decision. The 7 bits in your key will be used,
somehow, to change the original 7 bits of each character. The change should be reversible at the
decoding stage. Hint: There are only 128 possible combinations of 7 bits, therefore is very easy to crack
the encryption resulting from a single 7 bit toy-key if you know the encryption method.
4. In the third display you will display the text decrypted by your client, using the client decryption sub
system, at the other end of the channel. You client knows the encryption method and also knows the
encryption key.
5. In the fourth display you will display the text decrypted by the Hacker, using the Hacker Key Search and
Hacker Decryption sub-systems. The hacker knows the encryption method but not the 7-bit encryption
key.
6. Constraints: Spaces are not encrypted. You should check the 7 bit representation of a space and
somehow you should leave it unchanged when it appears in the channel. When there are no characters in
the channel the decryption displays are also frozen. Use type-D flip flops if needed.
7. You may use built-in Logisim blocks if desired (Such as Counters and Registers).
8. Hacker applies each possible 7-bit key and until text becomes intelligibly.
9. Each key that the Hacker applies should be tried on two to three words or about 20 characters (enough to
see a pattern of intelligibly text). Hint: Therefore the clock for the circuit that produces each Key for the
Hacker should be slower than the system clock (Look for information regarding clock division).
10. When text becomes intelligibly hacker stops the search and retains the working key.
I need step by step to make the encryption circuit in logisim.
I need to see the drawing of the complete circuit.
image text in transcribed

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Data Management Databases And Organizations

Authors: Richard T. Watson

2nd Edition

0471180742, 978-0471180746

More Books

Students also viewed these Databases questions

Question

What is the effect of word war second?

Answered: 1 week ago