Computer science encryption Problem. Please answer A and B.
b. How many different 8-bit block ciphers can there be in
total?
a. 8 bit ciphertexts would be there
b.8 bit-block ciphers would be there
The reason is that the algorithms producing ideal block cipher are secure but have to be compelled to build some (mathematical) assumption regarding the block cipher in.Normally, the idea goes one thing like this: "If the cryptography secret's chosen randomly, then an assaulter who doesn't recognize the key cannot distinguish between the block cipher and a very random permutation, even employing a chosen-plain text attack."This is an off-the-cuff statement of the pseudo-random permutation [PRP] assumption.
Computer science encryption Problem. Please answer A and B. ) Consider any block cipher (such as...
Computer science encryption please refer to the chart to help For the remaining questions, consider a 4-bit block cipher, described in hexadecimal by the following table: Plaintext Ciphertext Plaintext Ciphertext 4 You can think of this as a simple substitution cipher for hexadecimal digits. The table itself serves as the "key" s (6 pts) For this question, you will perform encryption and 5. decryption using the same cipher described above, but in CBC mode. Recall that you can convert hexadecimal...
Computer Science Encryption Please make it simple thank you. To make a secure block cipher, why is diffusion not enough? That is, why is confusion also necessary?
Let us consider the block cipher type of symmetric encryption. The basic idea is that you have a block of plaintext (for example, 128 bits) and a key (for example, 128 bits) as inputs to the encryption algorithm. The output will be a block of cipher-text (for example, 128 bits). If the encryption algorithm does not conduct compression, the output block size will be at least as large as the plaintext block (in other words, the cipher text is of...
Computer Science Encryption. Please make it simple only a few sentences should suffice just not too long thank you 2. Explain why it is impractical to use an ideal block cipher for real-world encryption.
Alice has at her disposal 3 encryption algorithms, they are: a transposition cipher, a monoalphabetic substitution cipher and a polyalphabetic substitution cipher. She encrypts the following plaintext: Hello World For each of the following ciphertexts write down which type of cipher, or ciphers, Alice could have used to generate it. Explain your reasoning. In addition if you believe that more than one cipher could have generated the ciphertext explain which one is the most likely. (a) ollerldWHO (3 marks) (b)...
Computer Science C++ Help, here's the question that needs to be answered (TASK D): Task D. Decryption Implement two decryption functions corresponding to the above ciphers. When decrypting ciphertext, ensure that the produced decrypted string is equal to the original plaintext: decryptCaesar(ciphertext, rshift) == plaintext decryptVigenere(ciphertext, keyword) == plaintext Write a program decryption.cpp that uses the above functions to demonstrate encryption and decryption for both ciphers. It should first ask the user to input plaintext, then ask for a right...
please answer $5 UXIF map in the computer uses direct mapping Question 18 5 pts Suppose we have a byte-addressable computer using 2-way set associative mapping with 16-bit main memory addresses and 32 blocks of cache. Suppose also that each block contains 8 bytes. The size of the block offset field is bits, the bits. size of the set field is bits, and the size of the tag field is 5 pts Question 19 Suppose we have a byte-addressable computer...
Please help me with this computer architecture problem (a) How many byte offset bits are required in the address to reference 1024 words of data when the word size is 128 bits? (b) What is the total capacity of memory that is addressable using 48-bit word addresses (assume each data word is 32 bits).
Draw pictures please!! 63. (II) (a) 16-bit sampling provides how many different possible voltages? (b) 24-bit sampling provides how many different possible voltages? (c) For color TV, 3 subpixels, each 8 bits, provides a total of how many dif- ferent colors?
1. Overwhelmingly, in a computer, a subtraction such as A-B is done by taking the two's complement of b and adding it. (You don't need to know the details of how to complement). In other words, the computer actually calculates A + (-B). Add together 0111 as A and 1101 as B and neglect any carry, or 5th bit in the result. The leftmost bit is a sign bit. What was B's value? A) -13 B) -4 C) -3 D)...