Part I Q1 Complete the following Truth Table: F denotes false and T denotes True ABC=A or BD= A xor BE= A and BFFFTTTTFsuppose T denotes an operator: ’or’, ‘xor’ or ‘and’. Input1 T input2 = Result where, input1,2 are ‘A’ and ‘B’ and Result is one of C, D, or E. which operation will yield? input1 (2) T result = input 2(1) Q2 Using the English alphabet (i.e., mod 26 arithmetic) let plaintext = {p1, p2,… , pn} and corresponding ciphertext = {c1, c2,… , cn}. Suppose the encryption function is ci = pi + 10 (mod 26). You receive the ciphertext message EWEM SC K QBOKD CMRYYV What is the decryption function, and the decrypted/recovered plaintext? What type of cipher is this? Show your calcs. Q. 3 Bob believes that he has come up with a nifty hash function. He assigns a numeric value VChar to each letter in the alphabet equal to the letter’s position in the alphabet, i.e., VA = 1, VB = 2, …, VZ = 26. For a message, he calculates the hash value H = (VChar 1 x VChar 2 x VChar 3 …x VChar N) mod(26). Bob uses this function to send a one-word message, REGAL, to his banker Bill, along with his calculated hash value for the message. Alice is able to intercept the message, and generates an alternative message that has a hash value that collides with Bob’s original hash value. Give definition and properties of the hash function. Show a message that Alice may have used to spoof Bob’s message, and demonstrate that its hash value collides with Bob’s original hash. Risk assessments only need to be conducted one time in the life of a security plan. True/Falsejustify
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here