Question

suppose plaintext english is encrypted using a symmetric key cryptosystem with keyspace k. if the unicity...

suppose plaintext english is encrypted using a symmetric key cryptosystem with keyspace k. if the unicity distance of the cryptosystem is 20 characters, find the size of the keyspace

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The formula for expected unicity distance,

H(k)

where H(k) is the entropy of key space. If the size of keyspace is "S", H(k) = log2S.

D is defined as plaintext redundancy in bits per character.

For an English character, we have log2(26)= 4.7 bits of information. However, the average amount of information per character in meaningful English is 1.5.

So, D= 4.7 - 1.5 = 3.2 for English plaintext.

We have U= 20. S=?

So, from the equation of U, we get

20= log2S/3.2

=> 20*3.2= log2S

=> 64 = log2S

=> S= 264

So, the size of the key space is 264 .

Please upvote. Thanks.

Add a comment
Know the answer?
Add Answer to:
suppose plaintext english is encrypted using a symmetric key cryptosystem with keyspace k. if the unicity...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...

    Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show explanation with a diagram.

  • Suppose that incoming packets are encrypted with a symmetric key that only the sender and receiver...

    Suppose that incoming packets are encrypted with a symmetric key that only the sender and receiver know. Which type(s) of firewall will work with such packets and which will not? Why? Note: Some specific answer related to this question for these 3 firewalls: packet filtering, stateful packet filtering, and application proxy.

  • Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustra...

    Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using the prim es p 13 and q 17 and secret decryption key d 103 to (i) decrypt the ciphertext z2; (ii) compute the public encryption key e corresponding to d (ii) encrypt the plaintext m-. (c) Discuss the security of the RSA public-key cryptosystem Question 2 (compulsory) (a) Explain the operation of the RSA public-key cryptosystem (b) Illustrate your explanation by using...

  • Exercise 3.2 (Symmetric and Asymmetric Encryption) t In this exercise, you will send an encrypted...

    Exercise 3.2 (Symmetric and Asymmetric Encryption) t In this exercise, you will send an encrypted message from a socket client to a socket server. The message will be encrypted using AES symmetric encryption algorithm in the client. The server receives this ciphertext and decrypt it using the same symmetric key. Before communication over symmetric encryption, you need to first securely distribute the symmetric key between sender and receiver. You can use asymmetric encryption to help distribute the symmetric key. The...

  • Polyalphabetic Ciphers   Suppose the following ciphertext was encrypted using Vignenere cipher with key size equal to...

    Polyalphabetic Ciphers   Suppose the following ciphertext was encrypted using Vignenere cipher with key size equal to 2. Try to find the two letters that were used in the encryption. SVSMHSCXGROFSLSOBDVOICIKZWSMVKBSGWPIKRWMVWCNSBBBSZFOGOBDODWFSNSWCMFKQIV KGYDOFKHOROZOQDWYBCAKMPWVZYTPWMSCWXHRSVSQWCZKHEFOGYAOHSAOGSBDVOSHSMID WFSKBNXERSQSOBMKBNTYFBSQWYBKZKBNZYQKZQCFSBBWSXHDVSGZFYQOGCWCOVGYICSNWXAK BICDVOFZFSJKHOOXRLICWXSCGYFQOXWJODWYBCTBCWQVILGDCFCVIXHKFIOCGYQSODWYBCOXR MCBDYFKHSCXGDVOIXWFSBGKZEGOCPSVSMHSCXGKGKHYCVTYFCSVSMHSBQFODBSCSXHKHSJOGSB WCNSBBBSZFOGOBDODWFSNSWCMFKQSSCWCWXQYBDFKGDKSHRHRSZFKQDWMSSBDVOROAYQB ODWMOBQRSDMZSKBMWOBDODVOBCKRSBSDVOSVSMHSCXGGSBSXCDICSNKOFOQYBCWNSBSNO XCVWQOBQRWMWXGDWDIDWYBKBNAYGDDYZSHSQKZYTPWMSCKOFOTSZVSNICWXUCCBHSHSCX OVGYYXCGBKGKZVCDAOBDPIKRWMVYTPWMSRCVROFCKOFOQRCCSXPIZYH

  • Problem 4. The plaintext P has been encrypted with RSA n = 65, e = 29...

    Problem 4. The plaintext P has been encrypted with RSA n = 65, e = 29 to yield the ciphertext C = 3 = P29 mod 65. Find P using the decryption key d, and prove the congruence class of P that solves this congruence is unique.

  • Write a script in python that inputs a line of plaintext and a distance value and...

    Write a script in python that inputs a line of plaintext and a distance value and outputs an encrypted text using a Caesar cipher. The script should work for any printable characters.

  • Symmetric key encryption. Suppose (KeyGen,Enc,Dec) is an IND-CPA secure symmetric key en- cryption. We define following...

    Symmetric key encryption. Suppose (KeyGen,Enc,Dec) is an IND-CPA secure symmetric key en- cryption. We define following new encryption algorithms, are the new schemes still IND-CPA secure? If yes, briefly explain why. If you think it insecure, give an explicit attack violating the IND-CPA definition. Recall that the intuition of IND-CPA security means the ciphertext does not leak any non-trivial information about the plaintext. Enc1(k,m) is defined as follows: It runs Enc(k,m) and obtains c0; then it adds a fixed padding...

  • So I wrote a script that inputs a line of plaintext and a distance value and...

    So I wrote a script that inputs a line of plaintext and a distance value and outputs an encrypted text using a Caesar cipher. The script should work for any printable characters: plainText = input("Enter a message: ") distance = int(input("Enter the distance value: ")) code = "" for ch in plainText: ordValue = ord(ch) cipherValue = ordValue + distance if cipherValue > 127: cipherValue = distance - (127 - ordValue + 1) code += chr(cipherValue) print(code) Now I need...

  • Two parties, A and B, need to perform encryption. They have one symmetric key between them. An in...

    Two parties, A and B, need to perform encryption. They have one symmetric key between them. An intruder acquires knowledge of the key. What is the impact on secrecy of previously exchanged messages? What would be the impact on secrecy of future messages? Is there any harm in A sending a plaintext message to B saying the key is no longer secret? Should A send that message encrypted with the now-exposed key? Explain your answers. (Computer Security II)

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT