Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Need help to code this in java. and need key.txt, decryptedmsg.txt and code in java also please add comments on it.Thanks The objective of the

Need help to code this in java. and need key.txt, decryptedmsg.txt and code in java also please add comments on it.Thanks

image text in transcribed

image text in transcribed

image text in transcribed

The objective of the project is to demonstrate, from an attackers perspective, how insecure the use of a single key is over multiple messages. Your goal is to develop a program, in the language you are most comfortable in, to retrieve the key used to encrypt multiple messages as well as decrypt said messages and an extra provided message Messages Many Time Pad Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream cipher, all with the same stream cipher key Hint: XOR the ciphertexts together,and consider what happens when a space is XORed with a character in [a-zA-Z] ciphertext #1 9d6e7a 7d155295eef8512c087da56084743aaa 9985ee3848a7 6 Bc3484d2e2ea6b3f4e5483f61 2d5598Tff4782f360bd4809bab835fale65f8459c681447250 8cc7f72241ee70c34fb9e7cBc4c 246132845d5d73d070de99a73efele9ee 627ea8f4aaae147087cce6c8cd08813f91caf9d71204 6b1 ciphertext #2 8968617d0flb97e5ee51280f3aec72caf106bdb48d44a68291339e35db8 6b6f56f214054Bbf25 3cd1593eB498baa34ba4f02fda070e25075b04387681b473610cc7f75614ae21a3efb8672dB5d 3e2031cc5b5a23c17ad9cda334ef1 ciphertext #3 8f6f3779154199e8e014375c34a267cle745bbad895fe391c526873383cfale86632575481e80 3c41c93f94d97a 738f54d02a9ec66bb1360b44ed3210206254fcc627b240bfbid38b89978Ba09 3d2f2a9b4b1327c1Tedf99b224fele9ee66effc649a 3b5430c7c9a2a91d7c51bab14e9d57d395 66a5634c4340 c958c5a93fff89e0394f3f49369ce9c6ee6f26b29a82e29fb9ca0a8657c4Bad2c 60eaf70a 6b44918 a 40630392171ca 29b87 cd9e9e 037c6ad2bc4be08c61ba 6223a9bac0a024741 b71b270a0579abld030Bce9b54b391a6a49ebacfc5eb5b57dd56caf0b1694544cfa6e The objective of the project is to demonstrate, from an attackers perspective, how insecure the use of a single key is over multiple messages. Your goal is to develop a program, in the language you are most comfortable in, to retrieve the key used to encrypt multiple messages as well as decrypt said messages and an extra provided message Messages Many Time Pad Let us see what goes wrong when a stream cipher key is used more than once. Below are eleven hex-encoded ciphertexts that are the result of encrypting eleven plaintexts with a stream cipher, all with the same stream cipher key Hint: XOR the ciphertexts together,and consider what happens when a space is XORed with a character in [a-zA-Z] ciphertext #1 9d6e7a 7d155295eef8512c087da56084743aaa 9985ee3848a7 6 Bc3484d2e2ea6b3f4e5483f61 2d5598Tff4782f360bd4809bab835fale65f8459c681447250 8cc7f72241ee70c34fb9e7cBc4c 246132845d5d73d070de99a73efele9ee 627ea8f4aaae147087cce6c8cd08813f91caf9d71204 6b1 ciphertext #2 8968617d0flb97e5ee51280f3aec72caf106bdb48d44a68291339e35db8 6b6f56f214054Bbf25 3cd1593eB498baa34ba4f02fda070e25075b04387681b473610cc7f75614ae21a3efb8672dB5d 3e2031cc5b5a23c17ad9cda334ef1 ciphertext #3 8f6f3779154199e8e014375c34a267cle745bbad895fe391c526873383cfale86632575481e80 3c41c93f94d97a 738f54d02a9ec66bb1360b44ed3210206254fcc627b240bfbid38b89978Ba09 3d2f2a9b4b1327c1Tedf99b224fele9ee66effc649a 3b5430c7c9a2a91d7c51bab14e9d57d395 66a5634c4340 c958c5a93fff89e0394f3f49369ce9c6ee6f26b29a82e29fb9ca0a8657c4Bad2c 60eaf70a 6b44918 a 40630392171ca 29b87 cd9e9e 037c6ad2bc4be08c61ba 6223a9bac0a024741 b71b270a0579abld030Bce9b54b391a6a49ebacfc5eb5b57dd56caf0b1694544cfa6e

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access with AI-Powered Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Students also viewed these Databases questions