Question
Network Security 1. Consider the simple substitution-permutation network discussed in class. Show how you get the ciphertext from the plaintext through XORing the round keys,
Network Security
1. Consider the simple substitution-permutation network discussed in class. Show
how you get the ciphertext from the plaintext through XORing the round keys,
performing the substitutions, and the permutations.
2. Factorize 96037 by brute force. You can find a list of prime numbers at
http://en.wikipedia.org/wiki/List_of_prime_numbers. Remember that you have
to try all prime numbers till 96037. You can write code to do this in Java, C, Swift,
Python, or another language of your choice.
3. Consider a simple (not secure) version of RSA. Here n = 711 = 77 and F(n) = 610
= 60. If the public key is b = 11, find the ciphertext y if the plaintext is x =10. If Bob
gets this ciphertext from Alice, what does he need to compute
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started