Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Let the encrypt function of standard DES be C = E(P, K) where C is the ciphertext, P is the plaintext, and K is

 Let the encrypt function of standard DES be C = E(P, K) where C is the ciphertext, P is the plaintext, and K 

Let the encrypt function of standard DES be C = E(P, K) where C is the ciphertext, P is the plaintext, and K is the key. Accordingly, let the decrypt function of DES be P = D(C, K). Suppose that Alice uses a customized cipher C" = D(E(P, K), K) where K and K are two keys, and Alice then sends C" to Bob. Suppose an attacker happens to know the plaintext P, but he does not know the two keys that was used in the cipher. (a) (2pt) What are the sizes of K and K? (b) (6pt) Suppose an attacker knows the cipher text C'. Show that the attacker can figure out the two keys. Please elaborate your attack with diagrams. (c) (2pt) How could you modify the customized cipher and improve its security with- out adding another key? Why it becomes more secure? Please explain your answer.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

a Sizes of K and K The sizes of K and K are both the same as the block size of the DES algorithm DES ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Discrete and Combinatorial Mathematics An Applied Introduction

Authors: Ralph P. Grimaldi

5th edition

201726343, 978-0201726343

More Books

Students also viewed these Programming questions

Question

Is tire service system of WestJet JIT/lean?

Answered: 1 week ago

Question

What is value stream mapping and why is it important?

Answered: 1 week ago