CIS3360_HW9_4-19-10%20solution - 73 68 Text i s h The...

Info icon This preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
CIS 3360 – Security in Computing Spring 2010 Solution for Homework 9 (100 points) Reference Tables for Radix 64: ASCII Table: Radix 64 Table 6-bit value Character Encoding 6-bit value Character Encoding 6-bit value Character Encoding 6-bit value Character Encoding 0 A 16 Q 32 g 48 w 1 B 17 R 33 h 49 x 2 C 18 S 34 i 50 y 3 D 19 T 35 j 51 z 4 E 20 U 36 k 52 0 5 F 21 V 37 l 53 1 6 G 22 W 38 m 54 2 7 H 23 X 39 n 55 3 8 I 24 Y 40 o 56 4 9 J 25 Z 41 p 57 5 10 K 26 a 42 q 58 6 11 L 27 b 43 r 59 7 12 M 28 c 44 s 60 8 13 N 29 d 45 t 61 9 14 O 30 e 46 u 62 + 15 P 31 f 47 v 63 / (pad) =
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
1) [60] Convert the following ASCII character strings to Radix64 character strings. a) Florida The result is “RmxvcmlkYQ==”.
Image of page 2
b) SeCuRiTy The result is “U2VDdVJpVHk=”.
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
c) CheRyl ASCII Hex 43 68 65 The result is “Q2hlUnls”. 2) [20] Convert the following Radix64 character strings to ASCII character strings. Show your work. a) c3Rpbmd1aXNo Radix64- Encoded c 3 R p Index 28 55 17 41 Binary 0 1 1 1 0 0 1 1 0 1 1 1 0 1 0 0 0 1 1 0 1 0 0 1 ASCII Hec 73 74 69 Text s t i Radix64- Encoded b m d 1 Index 27 38 29 53 Binary 0 1 1 0 1 1 1 0 0 1 1 0 0 1 1 1 0 1 1 1 0 1 0 1 ASCII Hec 6E 67 75 Text n g u Radix64- a X N o
Image of page 4
Encoded Index 26 23 13 40 Binary 0 1 1 0 1 0 0 1 0 1 1 1 0 0 1 1 0 1 1 0 1 0 0 0 ASCII Hec 69
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: 73 68 Text i s h The result is “stinguish”. 3) [20] Assume that we use the following notations: A B: E(K Apriv , E(K Bpub , H(M) || Z(M) )) This means A computes the Hash function of the message M as H(M), concatenates with the compressed value of M as Z(M), then encrypts the result using first the public key of B [K Bpub ] and then encrypts the result with the private key of A [K Apriv ]. A then transmits the result to B. Using these notations, indicate the message M sent by A to B utilizing the authentication and confidentiality of PGP. See page 7 of the lecture note of 4/19/10. Answer : E(K Bpub , K s ) || E(K s , Z(E(K Apriv , H(M)) || M))...
View Full Document

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern