1. Homepage
  2. Programming
  3. COM6103 Big Data Security and Privacy - Assignment 1: Symmetric cryptography

COM6103 Big Data Security and Privacy - Assignment 1: Symmetric cryptography

Engage in a Conversation
Hong KongHSUThe Hang Seng University of Hong KongCOM6103Big Data Security and PrivacySymmetric cryptography

COM6103 CourseNana.COM

Big Data Security and Privacy CourseNana.COM

2022/23 Semester 2 CourseNana.COM

In-class Assignment 1 CourseNana.COM

  CourseNana.COM


  CourseNana.COM

Lecture 2 CourseNana.COM

Symmetric cryptography CourseNana.COM

Save all answers in an ipynb file and name it YourSID_YourName_In-class1.ipynb , e.g., s123456_ZHANG_Chen_In-class1.ipynb . Submit the ipynb file to Moodle. CourseNana.COM

  CourseNana.COM

Question 1. CourseNana.COM

Alice and Bob work for a real estate agent. Eve is an ex-security engineer. CourseNana.COM

Q1. Eve has tricked Alice into decrypting a bunch of ciphertexts that Alice encrypted last month but forgot about. What type of attack is Eve employing? CourseNana.COM

Q2. Eve has an antenna that can pick up Alice's encrypted cell phone conversations. What type of attack is Eve employing? CourseNana.COM

Q3. Eve has bet Bob that she can figure out the AES secret key he shares with Alice if he will simply encrypt 20 messages for Eve using that key. For some unknown reason, Bob agrees. Eve gives him 20 messages, which he then encrypts and emails back to Eve. What kind of attack is Eve using here? CourseNana.COM

  CourseNana.COM

  CourseNana.COM

----------------------------------------------------------------------------------------------------------------- CourseNana.COM

  CourseNana.COM

  CourseNana.COM

Question 2. CourseNana.COM

Consider two messages  and  , each of n blocks :  = ||||..|| and M2 =  ||||..||, where and  differ only in the first block. Assume the same key is used for all encryptions. Which of the following statements hold? Please explain our answer. CourseNana.COM

Q1. If  and  are encrypted using electronic code book mode (ECB), none of the cipher text blocks will repeat between each message. CourseNana.COM

  CourseNana.COM

Q2.If  and  are encrypted using cipher block chaining (CBC), but the same initialization vector (IV) is used for encrypting both messages, none of the ciphertext blocks will repeat between each message. CourseNana.COM

  CourseNana.COM

----------------------------------------------------------------------------------------------------------------- CourseNana.COM

  CourseNana.COM

Question 3. Hand-on exploration CourseNana.COM

Encrypt the data with CBC mode. See In-Class Assignment 1.ipynb for details. CourseNana.COM

Demo: CourseNana.COM

Hint: the parameter ‘cipher.iv’ is required in decryption. CourseNana.COM

  CourseNana.COM

  CourseNana.COM

  CourseNana.COM

  CourseNana.COM

- End- CourseNana.COM

Get in Touch with Our Experts

WeChat WeChat
Whatsapp WhatsApp
Hong Kong代写,HSU代写,The Hang Seng University of Hong Kong代写,COM6103代写,Big Data Security and Privacy代写,Symmetric cryptography代写,Hong Kong代编,HSU代编,The Hang Seng University of Hong Kong代编,COM6103代编,Big Data Security and Privacy代编,Symmetric cryptography代编,Hong Kong代考,HSU代考,The Hang Seng University of Hong Kong代考,COM6103代考,Big Data Security and Privacy代考,Symmetric cryptography代考,Hong Konghelp,HSUhelp,The Hang Seng University of Hong Konghelp,COM6103help,Big Data Security and Privacyhelp,Symmetric cryptographyhelp,Hong Kong作业代写,HSU作业代写,The Hang Seng University of Hong Kong作业代写,COM6103作业代写,Big Data Security and Privacy作业代写,Symmetric cryptography作业代写,Hong Kong编程代写,HSU编程代写,The Hang Seng University of Hong Kong编程代写,COM6103编程代写,Big Data Security and Privacy编程代写,Symmetric cryptography编程代写,Hong Kongprogramming help,HSUprogramming help,The Hang Seng University of Hong Kongprogramming help,COM6103programming help,Big Data Security and Privacyprogramming help,Symmetric cryptographyprogramming help,Hong Kongassignment help,HSUassignment help,The Hang Seng University of Hong Kongassignment help,COM6103assignment help,Big Data Security and Privacyassignment help,Symmetric cryptographyassignment help,Hong Kongsolution,HSUsolution,The Hang Seng University of Hong Kongsolution,COM6103solution,Big Data Security and Privacysolution,Symmetric cryptographysolution,