Question
What is the difference between diffusion and confusion?[2 Marks] The sender do the following operations on message m before sending it: Protocol A: c= e
- What is the difference between diffusion and confusion?[2 Marks]
- The sender do the following operations on message m before sending it:
- Protocol A:
c=ek1[m h(k2m)]
where e is a private-key encryption algorithm, m is the message sent, h() is a hashing function ( such as SHA-1), || indicates a concatenation, and k1, k2 are secret keys which are stored only at sender and receiver.
- Protocol B:
c=ek1[m sigkpr(hm)]
Explain in details which the processes that the receiver will do step-by-step upon receipt of c [8 Marks].
- Given the plaintext {000102030405 060708090A0B0C0D0E0F} and the key you will generate it from your network adaptors(wire or wireless) Mac address according to the following table [15 Marks]:
24bits | 16 bits | 24 bits | 24 bits | 16 bits | 24 bits |
Put the 1st 6 digits of your MAC | Put FFFE | Put the 2nd 6 digits of your MAC | Put again the 1st 6 digits of your MAC | Put FFFE | Put again the 2nd 6 digits of your MAC |
128 Bits |
- Print screen from your MAC address.
- Show the original contents of State, displayed as a 4 x 4 matrix.
- Show the value of State after initial AddRoundKey.
- Show the value of State after SubBytes.
- Show the value of State after ShiftRows.
- Show the value of State after MixColumns.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started