0% found this document useful (0 votes)
6 views

Docx

Uploaded by

Kanzah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views

Docx

Uploaded by

Kanzah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Crypto Lab – Secret-Key Encryption

3.2 Task 2: Encryption Mode – ECB vs. CBC


 2. Display the encrypted picture using any picture viewing software. Can you derive any useful
information about the original picture from the encrypted picture? Please explain your
observations.

This study source was downloaded by 100000806027424 from CourseHero.com on 03-28-2024 06:09:40 GMT -05:00

https://www.coursehero.com/file/23127003/Crypto-Lab/
 The disadvantage of ECB method is that identical plaintext blocks are encrypted into
identical cipher text blocks; thus, data patterns are not well hidden. So, we can see the
blur outline print of the original image. So, no confidentiality is provided.
 On the other hand, CBC provides more secure mechanism because it used the operation
XOR before encryption of each cipher text block.

3.3 Task 3: Encryption Mode – Corrupted Cipher Text


 How much information can you recover by decrypting the corrupted file, if the encryption
mode is ECB, CBC, CFB, or OFB, respectively? Please answer this question before you conduct
this task, and then find out whether your answer is correct or wrong after you finish this task.
(2) Please explain why. (3) What are the implication of these differences?
 In ECB mode, only one block is affected when any problem in a cipher text happens, moreover
each block is decrypted independently. However, the corrupted bit of the 30th byte in cipher
text block 8 bytes might spread to all n bits in plaintext block 8 bytes since we do the decryption
one block at a time.
 In CBC mode, there was affect in two blocks.
 In CFB mode, there is problem in n / r number of blocks. Therefore, the error propagation
criterion is poor.

This study source was downloaded by 100000806027424 from CourseHero.com on 03-28-2024 06:09:40 GMT -05:00

https://www.coursehero.com/file/23127003/Crypto-Lab/
 In OFB mode, the feedback is only in the key-generation system. If the single digit of the 30th
byte corrupted, then in plain text that only that byte or character is corrupted. Thus, only OFB
mode shows the most promising result and almost all the texts are recovered.

3.4 Task 4 : Padding


 Padding is needed for ECB and CBC encryption modes because their inputs contain number of
blocks, thus padding could ensure that. Block size depends on the algorithm: AES uses 16 byte
blocks while Blowfish and 3DES use 8-byte blocks.
 There is no need padding for encryption mode CFB and OFB because they are stream ciphers, in
which the size of the block is usually fixed (one character).

3.6 Task 6: Pseudo Random Number Generation


 Task 6.A: Measure the Entropy of Kernel

This study source was downloaded by 100000806027424 from CourseHero.com on 03-28-2024 06:09:40 GMT -05:00

https://www.coursehero.com/file/23127003/Crypto-Lab/
Powered by TCPDF (www.tcpdf.org)

You might also like