Cryptography Homework

Verified

Added on  2019/09/25

|3
|629
|415
Homework Assignment
AI Summary
This assignment presents three distinct cryptography problems. The first requires decrypting a message using a monoalphabetic substitution cipher. The second problem delves into the probability of a unique key in a block cipher given a plaintext-ciphertext pair, requiring an understanding of key spaces and collision probabilities. The final problem involves analyzing a flawed implementation of the DES algorithm where the mangler function is simplified to an XOR operation with a zero key, and the initial and final permutations are omitted. Students are asked to determine the plaintext given the ciphertext.
Document Page
1. Decrypt the following message shown below in exactly 70 characters per line (except
on the last line).
nhjQHktQSktQUwSjQ?hjgQ,hjQMjx,QwqQ,hjQkgESkdQUMjk,EwgQSktQkUc.EMjQ,hwx
jQMEPh,xQ?hEUhQgjejMQUw.dHQhkejQ jjgQ?E,hhwdHjgQqMwSQ,hjSQ .,Q tQ,hjQh
kgHQwqQ,tMkggtVQnhjQmMjgUhQhkejQkdMjkHtQHExUwejMjHQ,hk,Q,hjQ dkUfgjxxQ
wqQ,hjQxfEgQExQgwQMjkxwgQ?htQkQh.SkgQ jEgPQxhw.dHQ jQk kgHwgjHQ?E,hw.,
QMjHMjxxQ,wQ,hjQUkJMEUjQwqQkQ,wMSjg,wMVQG,QSktQwgjQHktQUwSjQ,wQ jQMjUw
PgEYjHQ,hk,Q,hjQg.S jMQwqQdjPxyQ,hjQeEddwxE,tQwqQ,hjQxfEgyQwMQ,hjQ,jMS
Egk,EwgQwqQ,hjQwxQxkUM.SQkMjQMjkxwgxQjc.kddtQEgx.qqEUEjg,QqwMQk kgHwgE
gPQkQxjgxE,EejQ jEgPQ,wQ,hjQxkSjQqk,jVQvhk,QjdxjQExQE,Q,hk,Qxhw.dHQ,Mk
UjQ,hjQEgx.JjMk djQdEgjuQGxQE,Q,hjQqkU.d,tQwqQMjkxwgyQwMQJjMhkJxQ,hjQq
kU.d,tQwqQHExUw.MxjuQ-.,QkQq.ddzPMw?gQhwMxjQwMQHwPQExQ jtwgHQUwSJkMExw
gQkQSwMjQMk,EwgkdyQkxQ?jddQkxQkQSwMjQUwgejMxk djQkgESkdyQ,hkgQkgQEgqkg
,QwqQkQHktQwMQkQ?jjfQwMQjejgQkQSwg,hyQwdHVQ-.,Qx.JJwxjQ,hjtQ?jMjQw,hjM
?ExjyQ?hk,Q?w.dHQE,QkekEduQnhjQc.jx,EwgQExQgw,yQLkgQ,hjtQMjkxwguQgwMyQ
LkgQ,hjtQ,kdfuQ .,yQLkgQ,hjtQx.qqjMu
2. Consider a mono-alphabetic substitution cipher (each character in the plaintext is
substituted by the same or another character to generate the ciphertext) applied on English words
which use
the 26-character alphabet from a to z and no other characters. Assume the keys used by this cipher are
40
bits in length. You may assume that each one of all possible plaintext-ciphertext mappings is equally
likely
to be the mapping used by a key with this cipher. When using this cipher, what is the expected number
of
different keys which will result in the encryption of the 8-character plaintext tortoise into the 8-
character
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ciphertext kmakmsuh?
3. Consider a block cipher that uses blocks of length n bits and keys of length s bits.
Assume s ≤ n. The secret key used by the cipher is k. You are an attacker and you do not know k but
you want to find out the value of k. You discover one plaintext-ciphertext pair, (m, c). So, you know that
there exists k such that E(k, m) = c. Now, suppose you guess the value of the key as k
0
and verify that
E(k
0
, m) = c. But, you cannot be sure that k
0 = k because there may be more than one key which encrypts
m to c.
This question is related to how confident you can be that your guess is correct. What is the probability
that there is no other s-bit key (besides k) which will encrypt the same plaintext, m, to the same
ciphertext,
c? In other words, what is the probability that there is no k
0 6= k such that E(k
0
, m) = c? State any
assumptions you make.
4.
A not-so-bright programmer writing a piece of software to implement DES ends
up implementing the mangler function as simply an XOR of Rn and Kn for encryption, for each of the
16 rounds. In addition, the programmer forgets to implement the initial and final permutations. You also
find out that the 48-bit keys used in the rounds are all a string of 0’s. You happen to intercept a message
Document Page
encrypted using this software. If the intercepted ciphertext, in hex, is 0xaaaa bbbb cccc dddd, what is
the
plaintext?
chevron_up_icon
1 out of 3
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]