Question

We have the following encryption algorithm: XOR with the HEX key BC, rotate 4 places to...

We have the following encryption algorithm: XOR with the HEX key BC, rotate 4 places to the left, and XOR with the HEX key AA. Show your work for full marks.

a. If we start with the bit pattern represented by the HEX number ACE1, what would the HEX number be that represents the encrypted bit pattern?

b. Assume that we have intercepted a message that was encoded using the same algorithm. The encoded message as a HEX number was D007. What was the original message as a HEX number?

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Encryption algorithm

  • XOR with the HEX key BC
  • rotate 4 places to the left
  • XOR with the HEX key AA

Decryption algorithm

  • XOR with the HEX key AA
  • rotate 4 places to the right
  • XOR with the HEX key BC

a. If we start with the bit pattern represented by the HEX number ACE1, what would the HEX number be that represents the encrypted bit pattern?

Plaintext = ACE1

Encryption

Step 1: ACE1 XOR BCBC (Key is repeated twice to match the length)

= 1010 1100 1110 0001 XOR 1011 1011 1100 1100

= 0001 0111 0010 1101 => 172D

Step 2: Rotate 0001 0111 0010 1101 4 places left

= 0111 0010 1101 0001 => 72D1

Step 3: 72D1 XOR AAAA (Key is repeated twice to match the length)

= 0111 0010 1101 0001 XOR 1010 1010 1010 1010

= 1101 1000 0111 1011 => D87B

Ciphertext = D87B

b. Assume that we have intercepted a message that was encoded using the same algorithm. The encoded message as a HEX number was D007. What was the original message as a HEX number?

Ciphertext = D007

Decryption

Step 1: D007 XOR AAAA (Key is repeated twice to match the length)

= 1101 0000 0000 0111 XOR 1010 1010 1010 1010

= 0111 1010 1010 1101 => 7AAD

Step 2: Rotate 0111 1010 1010 1101 4 places right

= 1101 0111 1010 1010 => D7AA

Step 3: D7AA XOR BCBC (Key is repeated twice to match the length)

= 1101 0111 1010 1010 XOR 1011 1011 1100 1100

= 0110 1100 0110 0110 => 6C66

Plaintext = 6C66

Add a comment
Know the answer?
Add Answer to:
We have the following encryption algorithm: XOR with the HEX key BC, rotate 4 places to...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 3. We have the following encryption algorithm: XOR with the HEX key AA, rotate 4 places...

    3. We have the following encryption algorithm: XOR with the HEX key AA, rotate 4 places to the right, and XOR with the HEX key BC. Show your work for full marks. a. If we start with the bit pattern represented by the HEX number ACE1, what would the HEX number be that represents the encrypted bit pattern? b. Assume that we have intercepted a message that was encoded using the same algorithm. The encoded message as a HEX number...

  • 2.Consider the following credit card numbers and tell me if they are valid or not. If...

    2.Consider the following credit card numbers and tell me if they are valid or not. If a number is invalid, write the valid credit number by changing the “check” digit. Show your work for full marks. a. 4519 6731 6055 4166 b. 4515 1663 4722 3333 c. How many valid (according to the Luhn check) 16-digit credit card numbers are there that start with these 14 digits 4444 4444 4444 45? Give one of the valid credit card numbers. 3....

  • We have intercepted a message that we need to decode. Luckily, we know that they use...

    We have intercepted a message that we need to decode. Luckily, we know that they use the letters A to Z, space, 0 to 9. We also know that when they encode messages they start by shifting the first letter once to the left, then shift the next two letters right twice, then the next three letters left 3 times, then the next four letters right 4 times, the next five letters left 5 times, and so on. a. If...

  • We have intercepted a message that we need to decode. Luckily, we know that they use...

    We have intercepted a message that we need to decode. Luckily, we know that they use the letters A to Z, space, 0 to 9. We also know that when they encode messages they start by shifting the first letter once to the right, then shift the next two letters left twice, then the next three letters right 3 times, then the next four letters left 4 times, the next five letters right 5 times, and so on. a. If...

  • We have considered encryption, and in particular, the algorithm and underlying theory of the Advanced Encryption Standar...

    We have considered encryption, and in particular, the algorithm and underlying theory of the Advanced Encryption Standard (AES). 3.1. What is the Advanced Encryption Standard? 3.2. What is a Certificate Authority? 3.3. What is meant by a public key and how is such a key used? 3.4. Consider a very simplified model of AES in which there will be only one P box and one S box and an 8 bit key. Use 0xBC as the key. Show, step by...

  • The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols...

    The Diffie-Hellman public-key encryption algorithm is an alternative key exchange algorithm that is used by protocols such as IPSec for communicating parties to agree on a shared key. The DH algorithm makes use of a large prime number p and another large number, g that is less than p. Both p and g are made public (so that an attacker would know them). In DH, Alice and Bob each independently choose secret keys, ?? and ??, respectively. Alice then computes...

  • For the RSA encryption algorithm , do the following (a) Use p=257,q=337(n=pq=86609),b=(p-1)(q-1)=86016. Gcd(E,b)=1, choose E=17, find...

    For the RSA encryption algorithm , do the following (a) Use p=257,q=337(n=pq=86609),b=(p-1)(q-1)=86016. Gcd(E,b)=1, choose E=17, find D, the number which has to be used for decryption, using Extended Euclidean Algorithm (b) One would like to send the simple message represented by 18537. What is the message which will be sent? (c) Decrypt this encrypted message to recover the original message.

  • Write a program that implements an elementary bit stream cipher. An elementary level bit stream cipher...

    Write a program that implements an elementary bit stream cipher. An elementary level bit stream cipher is an encryption algorithm that encrypts 1 byte of plain text at a time. This one uses a given 4-bit bit pattern as the key. The size of the encrypted message that we want to be able to send has a maximum length of 200 characters. You must: 1. prompt the user to input the clear text to be encrypted. You must use printf()...

  • Background: For this assignment, you will write a small encryption utility that implements a simple encryption...

    Background: For this assignment, you will write a small encryption utility that implements a simple encryption algorithm described below. The program will take one command line argument as an input; this will represent the word which is to be encrypted. As an output, your program will print the encrypted version of the word to the console using a simple printf() statement. This is the only output your program needs to produce. There is an important catch, however: your program is...

  • polynomial bo bit + b2 t2 +b3 t3 a) A binary string bobib2b3 is converted to...

    polynomial bo bit + b2 t2 +b3 t3 a) A binary string bobib2b3 is converted to a and is then coded by multiplying by the polynomial1+t2+t3. The resulting polynomial is then converted back to a binary string of length seven then transmitted. This string is received as 1011010, with bit order being lower powers to the left. Assume that at most one of these seven been corrupted in the transmission process (Ensure that you have determined the correct order of...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT