Description
Unformatted Attachment Preview
Purchase answer to see full attachment
Explanation & Answer
View attached explanation and answer. Let me know if you have any questions.
1
Name:
Date:
Honor Pledge: I pledge that the only resources I used to complete this homework were the course
textbook, the course slides, or my personal course notes. I did not confer with any other student,
consult any solutions manuals, printed or on-line, nor did I do any Internet searches to solve any
problems for this homework assignment. The solutions below are my own work.
Student Signature___________________
2.A Solution
Sure, an intruder can listen in on a conversation and figure out the key in the following
manner: Assume A and B are two parties, and K defines a key of length N.
i)
A random string R is generated by partner A
ii)
S is calculated using the formula K XOR R.
iii)
The calculated S, is then sent to partner B.
iv)
Partner B then computes the S1 using the formula SXOR K.
v)
The calculated S1 is then sent to partner A.
vi)
Validation is done by partner A to determine if R is equal to S1.
As a result, an attacker who overhears the dialogue will possess both S and S1. As a result,
he/she can compute the key as K = S1 XOR S.
2.B Solution
a)
Encryption
Message: Midway upon the journey of our life I found myself within a forest dark, For the
straightforward pathway had been lost.
2
Keys: n...