1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Ivenika [448]
3 years ago
15

2. Research, find and use a better (different from the simple Shift Cipher) encryption technique to encrypt a string of your cho

ice. You can use an internet solver to encrypt your string as well. List your original, text string and the encrypted version of it. Briefly describe why this encryption technique is better than the simple shift cipher you used in question 1. What makes the encryption stronger or harder to crack? Briefly describe how your chosen encryption technique work?

Computers and Technology
1 answer:
Kruka [31]3 years ago
8 0

Answer:

There are two better techniques for encryption as compared to shift cipher. One is block cipher. Such techniques use one key for both encryption and decryption. For example Advanced Encryption Standard (AES). This is based on symmetric key encryption.

The other way is to use asymmetric key encryption technique which based on two keys i.e. public and private key for encryption and decryption. For example, Rivest-Shamir-Adleman (RSA).

Explanation:

What is AES?

Advanced Encryption Standard (AES) is a symmetric key block cipher  which uses 128, 192 or 256-bit keys  length to encrypt and decrypt a block of plain text or message. It is stronger and faster than Shift Cipher encryption technique. It can encrypt data blocks of 128 bit using the above mentioned bit key lengths. The greater then key length the greater the security. the number of rounds in AES is variable and depends on the length of the key. The length of these keys determines the number of rounds for example 128 bit keys has 10 rounds, 12 rounds for 192 bit keys and 14 rounds for 256 bit keys. Each rounds involves some processing. This process is explained below:

How AES works?

The data is divided into each of size 128 bits makes a matrix of 4x4 columns of 16 bytes. (bytes because AES takes 128 bit plain text block as 16 bytes)

Substitution: First the data is substituted using a fixed substitution table which is predetermined. This makes a matrix of rows and columns.

Shifting: Each rows of the matrix is shifted to the left and the dropped entries in row are inserted on the right. Shift is carried out as follows −  

Mixing columns: Use a mathematical method/equation to transform the columns where the input of the method is each column of data which is then replaced by this function into a different new matrix of data(bytes). This is basically the first round to transform plain text to cipher text. Now consider these bytes as 128 bits, the first round key is added to these resultant column bits by XOR. A separate portion of the encryption key length is used to perform the transformation on each column. The number of rounds depend on the the key length.

After the first round key comes the second round key and so on and when the last round key is added then this whole process goes back to Substitution phase, then shifting rows phase, then mixing columns and another round key is added after this. For example, if 128 bit key is used this means there will be nine such rounds.

Advantages

AES supports large key sizes which makes it more secure and stronger than shift cipher encryption techniques which can be cracked because of their small key space. If someone wants to decrypt a message and knows it's encrypted by a Shift Cipher technique then the key space of all possible keys is only the size of the alphabet. This is a very small scale.  An attack such brute force attack attempting all 26 keys or even using exhaustive technique will easily crack this. So AES having large key size is more robust against cracking. For example in AES in order to crack an encryption for 128 bit around 2128 attempts are needed. Also for a 256 bit key, 2256 different combinations attempts are needed to ensure the right one is included which makes it harder to crack and makes is more secure.

I have used an internet solver to encrypt a string and i am attaching the result of the encryption. The plain text is: Two One Nine Two

The key is Thats my Kung Fu

and the cipher text in hexadecimal after using AES is:

29 c3 50 5f 57 14 20 f6 40 22 99 b3 1a 02 d7 3a

You might be interested in
Which text features does this section contain? Check all that apply.
NISA [10]

which ones apply manuelh


6 0
3 years ago
Your personal opinion about what a "successful" console in the future will need to include to sell well. How have the changes in
Marizza181 [45]

Answer:

The answer is below

Explanation:

In my personal opinion what a "successful" console in the future will need to include to sell well is "a big library of games." This feature will help a console supports many games that will appeal to all categories of gamers.

The changes in technology, gaming culture, and overall society has affected the game market in many ways such as:

1. In terms of technology: it has made the game manufacturers both the console and third-party game developers to improve their gaming features. For example, the advancement in gaming pads becoming wireless. The gaming console having internet or online features, where gamers can play with each other around the world from their rooms. Also, the gaming character design looking more and more like the real-life personality it represents.

2. In terms of gaming culture: modern games are no longer for teenagers alone. It is now appealing to adults as well. This is evident in football players and coaches playing the games and talking about it. Even some players tend to influence their ratings in the game by mentioning how good they are in the press in comparison to the rating game developers are giving them.

3. Overall society has now seen gaming consoles as part of everyday life. The parents, researchers, and even feminist groups are now well aware of the gaming industry. And each of the stakeholders involved is influenced by how the game consoles manufacturers market their games through media, sports personalities, celebrities, etc.

4 0
3 years ago
Windows, Apple’s Mac OS, and Unix/Linux are just some of the most common what?
34kurt
Most common PC operating systems
7 0
3 years ago
Read 2 more answers
In PKI, the CA periodically distributes a(n) _________ to all users that identifies all revoked certificates.
Trava [24]

Answer:

" CRL (certificate revocation list)" is the appropriate answer.

Explanation:

  • A collection of such subscriber bases containing accreditation or certification status combined with the validation, revocation, or outdated certification within each final customer is known as CRL.
  • Only certain subscribing workstations with a certain underlying cause authentication system should have been duplicated.
4 0
3 years ago
In this exercise we look at memory locality properties of matrix computation. Th e following code is written in C, where element
Sonja [21]

Answer:

Explanation:

temporal locality can be defined as: when a particular memory  is referenced or accessed several times  within a specific period of time. In the question, i think the variable that exhibit temporal locality are I, J and 0(all the variable). This is because the variable J and 0 are accessed several times within the loop. I would not have been part of it, but in the A[I][J]=B[I][0]+A[J][I], the variable "I" is also accessed in the addition. this is why it is part of the temporal locality.

4 0
3 years ago
Other questions:
  • Brenda's working on improving a Google Search Ads quality score so it potentially gets a better ad rank and performs better in t
    9·1 answer
  • 1. _______ is when two things happen at one time when using the Scratch program.
    6·1 answer
  • Evidence that Social media hasn’t improved human communication.
    12·1 answer
  • Most keyboards today are in a
    8·1 answer
  • List the names of 3 computer scientists
    6·2 answers
  • Technologies can offer safety and protection for people
    11·1 answer
  • Pleas help 99 points and get brainliest
    9·2 answers
  • Pls help me im confused prob more on the way
    6·1 answer
  • Why optical disk is slower than magnetic disk.?​
    9·2 answers
  • What is the difference between turn-based game mode and point-based game mode?
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!