At one point, Kevin suggested that Bob use his (Kevin’s) private company’s newly developed block cipher with the electronic code book mode of operation for protecting the confidentiality of data on disks holding old survey archives. Kevin’s block cipher technique is proprietary intellectual property, so he does not share its code or designs with anyone. The technique was developed by adapting Kevin’s older code for a stream cipher for stock trading software.
(a) Identify all problems you can with Kevin’s mode or operation
(b) Propose some solutions to make Kevin’s cipher best work for this disk/volume encryption application
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here