Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Need help to code this in java. and need key.txt, decryptedmsg.txt and code in java also please add comments on it.Thanks The objective of the

Need help to code this in java. and need key.txt, decryptedmsg.txt and code in java also please add comments on it.Thanks

image text in transcribed

image text in transcribed

image text in transcribed

The objective of the project is to demonstrate, from an attackers perspective, how insecure the use of a single key is over multiple messages. Your goal is to develop a program, in the language you are most comfortable in, to retrieve the key used to encrypt multiple messages as well as decrypt said messages and an extra provided message Messages Many Time Pad Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream cipher, all with the same stream cipher key Hint: XOR the ciphertexts together,and consider what happens when a space is XORed with a character in [a-zA-Z] ciphertext #1 9d6e7a 7d155295eef8512c087da56084743aaa 9985ee3848a7 6 Bc3484d2e2ea6b3f4e5483f61 2d5598Tff4782f360bd4809bab835fale65f8459c681447250 8cc7f72241ee70c34fb9e7cBc4c 246132845d5d73d070de99a73efele9ee 627ea8f4aaae147087cce6c8cd08813f91caf9d71204 6b1 ciphertext #2 8968617d0flb97e5ee51280f3aec72caf106bdb48d44a68291339e35db8 6b6f56f214054Bbf25 3cd1593eB498baa34ba4f02fda070e25075b04387681b473610cc7f75614ae21a3efb8672dB5d 3e2031cc5b5a23c17ad9cda334ef1 ciphertext #3 8f6f3779154199e8e014375c34a267cle745bbad895fe391c526873383cfale86632575481e80 3c41c93f94d97a 738f54d02a9ec66bb1360b44ed3210206254fcc627b240bfbid38b89978Ba09 3d2f2a9b4b1327c1Tedf99b224fele9ee66effc649a 3b5430c7c9a2a91d7c51bab14e9d57d395 66a5634c4340 c958c5a93fff89e0394f3f49369ce9c6ee6f26b29a82e29fb9ca0a8657c4Bad2c 60eaf70a 6b44918 a 40630392171ca 29b87 cd9e9e 037c6ad2bc4be08c61ba 6223a9bac0a024741 b71b270a0579abld030Bce9b54b391a6a49ebacfc5eb5b57dd56caf0b1694544cfa6e 1d534 8024, elec 84d6f 00d66 1c2 2b7 f8fbb4d41 6d756d31B 93f43d-40 dbcffd2fd 867d0d04 beabd51a2c 4b56f27 a e6 6215 b c c 2 c- 235 e c ed 6 cl c714e b7d43 58bec 4bd7a 3b27c 7114b 4b0 6db7b 643b34b1b3 d3927332 af a04b e8b17f b78063 b04fb c1dee6 d382b-86d8 2d6a93398b efd af0 8d85f1 8df3B3a83e e36d41b7ae 34d738be1a f66651 71d699 740bf9 933b57 937a57676b 33db67 36eb2 e5c6cb f1a975 14 cf5b b2f225 80b71 90bf5bb7dc 15f6255bf8 bd af 42c9d-b909 5ea-77 338dc5 92 d f c b 8 a 0 c bdc09f 5 eadcd0 b0c6df a3d1a 215fd4 8b79f a 412ecb aa3d1bc059 f078dd9bd4 2fbc0 e10e36ccb7 7f8f8ef60c cee9-513a8 35-2e98bdf dfd811 7d48e6 ffd9a5 0721b3 93b173 3b5 3b6feafcd9 aea 3bff9b c9addC 50df9a 8d4 90df8 10df-b7720 79cc0dc360 349de803df 55dd6bd7fc 0f0443b5fa d4bd28 5b3542 e3 cb90 fbfc3b 9930d8 82b0 5dc584ec64 eb087f8d00 1028d-25b5 9830-df5de 4d07 584c27 4#54725-c89d #401235 e: b 88406 2830c7e7b 7d2dee 71f1eb e8045e a f135cb 946ee0a23e p6cf357 pl a d e 2 c 7 ip 6 c 5 6 5 6 0 1 d e-ip 7 d 6 6 62 a-332 et 8 6 3 f 7 b ca3262d18be c80796 e ciphertext #8: 9c647079135f94eef80265133bec67ccf006b3bc8944a69d84228f2296cae2e962364a0 69ba11 1c91188e34ccfb27af5400bbaa467f20469b50ed33c1e436601897869240be30e36a99 6 9 9044 2561249e5d1327c170dBdce638f35fB3a866f9ca08bBf05f0123856491c68b56b91dad9d6b2c4 a6315238b2316c88b51c7fbbcd50f9ee7fbc66ccad06febb77070e92 c3eb292befb613250bf2c 69a 3e40a 3410959a14630e9d5219e780B28 c81cald766ccOf811 ciphertext #9: 9d64746a044fd8e0ee08651f2fb563d0fa41acbcBd44bad08833922998c2blbd6f3e55188dfB5 3cd5992e44698bf71f54a02a4eb73f40221ba4d8720564328009e726d7003e00779ba9c79d84d 322379548473ac67185 ciphertext #10: 8f2175740e5893abe818351438be33Cde 60 6 a db 2 d 0 4 68c0 a82e54d82b634b04f04afb265ef0321b74c9668144a2900872b72624aeb082dbad27cBc09 37613185555673dc6cc2d7a16cef5692a874eac24deffe56142e8164ded48415b053abd1732a4 d21 fa29c8933826195c3alfc7E20405496e91 Target ciphertext (decrypt this one): 966e786a0042d4abf21e305c35ad65c1b542bbbe8f55b3848032c6359fc3e2e96b21421196a10 7c90195a30896 61 f 5 4 9 0 6 ab a e 3 5 fd196fb1519b2d1206320bB92b7c7719e60e37b697738c07 76292a9c5d132ac66a8bdla728bb5882e 629

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Microsoft Visual Basic 2017 For Windows Web And Database Applications

Authors: Corinne Hoisington

1st Edition

1337102113, 978-1337102117

More Books

Students also viewed these Databases questions

Question

What is meant by planning or define planning?

Answered: 1 week ago

Question

Define span of management or define span of control ?

Answered: 1 week ago

Question

What is meant by formal organisation ?

Answered: 1 week ago

Question

What is meant by staff authority ?

Answered: 1 week ago

Question

Write formal and informal proposals.

Answered: 1 week ago

Question

Describe the components of a formal report.

Answered: 1 week ago

Question

Write formal and informal reports.

Answered: 1 week ago