logo

The Assignment on Basics of Cryptography

   

Added on  2022-08-30

12 Pages2602 Words34 Views
Theoretical Computer Science
 | 
 | 
 | 
Running head: BASICS OF CRYPTOGRAPHY
BASICS OF CRYPTOGRAPHY
Name of the student:
Name of the university:
Author Note:
The Assignment on Basics of Cryptography_1

BASICS OF CRYPTOGRAPHY1
Table of Contents
Answer 1:...................................................................................................................................2
Answer 2:...................................................................................................................................2
Answer 3:...................................................................................................................................3
Answer 4:...................................................................................................................................3
Answer 5:...................................................................................................................................4
Answer 6:...................................................................................................................................5
Answer 7:...................................................................................................................................5
Answer 8:...................................................................................................................................5
Answer 9:...................................................................................................................................6
Answer 10:.................................................................................................................................6
Answer 11:.................................................................................................................................7
Answer 12:.................................................................................................................................7
Answer 13:.................................................................................................................................7
Answer 14:.................................................................................................................................8
Answer 15:.................................................................................................................................8
Answer 16:.................................................................................................................................8
References..................................................................................................................................9
The Assignment on Basics of Cryptography_2

BASICS OF CRYPTOGRAPHY2
Answer 1:
The terms ‘Chaffing’ and ‘Winnowing’ defines a cryptographic technique that is
applied for security while sending messages from the sender to the receiver without the help
of the encryption and decryption of the messages. False packets are used in this procedure
along with the actual messages. Chaffing is the process where each legitimate message packet
as well as the false packet have a serial number and a MAC (message authentication code)
associated with it (Samid 2018). Winnowing is referred to the process when the invalid MAC
numbers are discarded and the valid MAC numbers are considered as that implies the actual
messages.
Serial Number Transmitted Packet MAC Code Status
1 I am 4j850k3 valid
1 I am 8dF7j89 invalid
2 Reading a book 79Kdu65p7 valid
2 Reading a book 65Dhu34l7 invalid
3 Called ‘Jack Reaper’ 9Oph12Dfhk6 valid
3 Called ‘Jack
Reaper’
4Fgh23Cytk5 invalid
However, the chaffing must be identical to the actual messages because here the
language of the message is English. If the false message is anything random, then the actual
message can be easily reconstructed.
The Assignment on Basics of Cryptography_3

BASICS OF CRYPTOGRAPHY3
Answer 2:
The method of encryption is used to deliver the messages over a network by
encrypting or decrypting the particular information that has to be send from the source to the
destination. The various algorithms used are the RSA algorithm, the DES algorithm and so
on. The algorithm for encryption is:
Answer 3:
One-time pad is an encryption technique applied while sending messages that
emerged during the First World War. It is considered as the most secure encryption technique
until date because every time a unique byte key is generated for every byte of the plain text
message and no key is repeated for another time (Pelosi, Kessler and Brown 2016). The
algorithm used for the one-time pad encryption is
Ci=E (Pi, Ki) for I=1, 2, 3, ....., n. In this algorithm, Pi denotes the i-th character of the
plain text message and Ki denotes the key stream of that particular character. The key is
placed at the starting of the particular message that is used for the encryption. To avoid one-
time pad encryption attack one needs to follow the randomness naturally of quantum
mechanical events that is recognised by the Geiger counter. ‘
Cryptographic Key
Cryptographic
Algorithm
Encrypted MessagePlain text Message
The Assignment on Basics of Cryptography_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cryptography: Algorithms, Key Management, and Protocols
|30
|7402
|319

Ciphers are used here for a better performance
|9
|2746
|44