Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Please do this problem in C programming language: deskey.txt content: 0f1571c947d9e859 You need to develop 2 C programs DES ECB Enc.c and DES ECB Dec.c

Please do this problem in C programming language:

image text in transcribed

deskey.txt content:

0f1571c947d9e859 
You need to develop 2 C programs "DES ECB Enc.c" and "DES ECB Dec.c" that use the ECB mode DES cipher in OpenSSL to encrypt or decrypt a given file (of arbitrary length) into another encrypted or the decrypted file with any given encryption key and IV. Specifically, the programs need to support the following commands line arguments and usage: DES_ECB_Enc -k -i -o DES_ECB_Dec -k -i -o where contains the 32-byte encryption key in hex format; contains the 8-byte IV in hex format; is the name of the input file (e.g., plaintext or cipertext); is the name of the output file (e.g., cipher text or plaintext). Note: and are text files, input file> could be either text or binary file, Coutput file> is a binary file. The programs need to do basic sanity check on , , and gracefully exit when any illegitimate file is found (e.g., the does not contain 8 bytes in hex). Take a screen shot of the execution of the following commands: DES_ECB_Enc -k deskey.txt -i CS468-HN2.txt -o CS468-Hw2.mydesec DES_ECB_Dec -k deskey.txt -i CS468-HN2.mydesecb -o CS468-HW2-mydesecb.txt name the screenshot file "CS468-HN2-3A." (here * depends on the format of your screenshot, e.g., jpg, use provided deskey.txt files). You need to develop 2 C programs "DES ECB Enc.c" and "DES ECB Dec.c" that use the ECB mode DES cipher in OpenSSL to encrypt or decrypt a given file (of arbitrary length) into another encrypted or the decrypted file with any given encryption key and IV. Specifically, the programs need to support the following commands line arguments and usage: DES_ECB_Enc -k -i -o DES_ECB_Dec -k -i -o where contains the 32-byte encryption key in hex format; contains the 8-byte IV in hex format; is the name of the input file (e.g., plaintext or cipertext); is the name of the output file (e.g., cipher text or plaintext). Note: and are text files, input file> could be either text or binary file, Coutput file> is a binary file. The programs need to do basic sanity check on , , and gracefully exit when any illegitimate file is found (e.g., the does not contain 8 bytes in hex). Take a screen shot of the execution of the following commands: DES_ECB_Enc -k deskey.txt -i CS468-HN2.txt -o CS468-Hw2.mydesec DES_ECB_Dec -k deskey.txt -i CS468-HN2.mydesecb -o CS468-HW2-mydesecb.txt name the screenshot file "CS468-HN2-3A." (here * depends on the format of your screenshot, e.g., jpg, use provided deskey.txt files)

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

XML Data Management Native XML And XML Enabled Database Systems

Authors: Akmal Chaudhri, Awais Rashid, Roberto Zicari, John Fuller

1st Edition

ISBN: 0201844524, 978-0201844528

Students also viewed these Databases questions

Question

1. Discuss the four components of language.

Answered: 1 week ago

Question

f. What stereotypes were reinforced in the commercials?

Answered: 1 week ago