hw1_sol_Security

hw1_sol_Security - CSC474/574 Information Systems Security...

Info iconThis preview shows pages 1–3. Sign up to view the full content.

View Full Document Right Arrow Icon
CSC474/574 - Information Systems Security: Homework1 Solutions Sketch September 20, 2004 1. Consider slide 12 in the handout for topic 2.2. Prove that the decryp- tion process of a one-round Feistel cipher is the same as the input of the corresponding encryption process. That is, ( L 0 2 ,R 0 2 ) = ( L 0 ,R 0 ). Ans. R 0 = L 1 = R 2 = R 0 0 = L 0 1 = R 0 2 L 0 2 = R 0 1 = L 0 0 L F ( R 0 0 ,K 1 ) = L 2 L F ( R 2 ,K 1 ) = R 1 L F ( R 0 ,K 1 ) = L 0 2. Random J. Protocol-Designer has been told to design a scheme to prevent messages from being modified by an intruder. Random J. decides to append to each message a hash of that message. Why doesn’t this solve the problem? Ans. Anybody can generate and append a hash to any message. A malicious adversary can easily modify the message and append the recomputed hash value. This modification goes undetected at the receiving end. 3. How many DES keys, on the average, encrypt a particular plaintext block to a particular ciphertext block? Ans. There are 2 56 possible keys and 2 64 possible ciphertext blocks for a particu- lar plaintext block. So only about 2 56 - 64 = 1 / 256 of the possible ciphertext blocks can be obtained with a DES key. 1
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
4. Alice developed a message authentication code (MAC) based on DES. Her algorithm works as follows: For a given input message M, rep- resent M as M = ( X 1 k X 2 k ... k Xm ), where Xi is a 64-bit block and k represents concatenation. Compute Delta ( M ) = X 1 X 2 ... Xm , where represents bit-wise XOR. Then the MAC for M is computed as C K ( M ) = E K ( Delta ( M )), where E is DES encryption algorithm and K is
Background image of page 2
Image of page 3
This is the end of the preview. Sign up to access the rest of the document.

This note was uploaded on 12/03/2008 for the course CSC 574 taught by Professor Ning during the Spring '04 term at N.C. State.

Page1 / 5

hw1_sol_Security - CSC474/574 Information Systems Security...

This preview shows document pages 1 - 3. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online