CS461 MP 1: Due Wednesday 09/17 by 11:59 pm Fall 2014
\Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm
that he himself can't break."
{ Bruce Schneier
Guidelines
You must work alone for this assignment.
You may use any programming language you're comfortable with, but we are using Python.
You're free to use any API or library you like. Don't re-invent the wheel.
Your answers might or might not be the same as your classmates'.
You must submit your answers in your SVN repository; we will only grade what's there!
Overview
This assignment will give you a chance to explore symmetric encryption.
Files
In your svn directory, you'll nd a folder called \mp1". The following les will be inside:
1. sub key.txt: key for task 1.
2. sub ciphertext.txt: ciphertext for task 1.
3. aes key.hex: key for task 2.
4. aes iv.hex: initialization vector for task 2.
5. aes ciphertext.hex: ciphertext for task 2.
6. aes weak ciphertext.hex: ciphertext for task 3.
7. key length.txt: a number needed for task 4.
8. bonus ciphertext.txt: ciphertext for a bonus mission, should you choose accept it.
We've also generated some (nearly) empty les for you to submit your answers to.
Tasks
1. Substitution Cipher (30 points)
2. Decrypting AES (30 points)
3. Breaking A Weak AES Key (30 points)
4. Computing Key Space Size (10 points)
5. Bonus: Breaking A Substitution Cipher (20 bonus points)
1CS461 MP 1: Due Wednesday 09/17 by 11:59 pm Fall 2014
1 Substitution Cipher
sub key.txt contains a permutation of the 26 upper-case letters that represents the key for
a substitution cipher. Using this key, the ith letter in the alphabet in the plaintext has been
replaced by the ith letter in sub key.txt to produce ciphertext in sub ciphertext.txt. For
example, if the rst three letters in your sub key.txt are ZDF..., then all As in the plaintext have
become Zs in the ciphertext, all Bs have become Ds, and all Cs have become Fs. The plaintext
we encrypted is a clue from the gameshow Jeopardy, and has only upper-case letters, numbers
and spaces. Numbers and spaces in the plaintext were not encrypted. They appear exactly as
they did in the plaintext.
Use sub key.txt to decrypt sub ciphertext.txt to obtain the plaintext and submit
it in sub plaintext.txt.
2 Decrypting AES
aes key.hex contains a 256-bit AES key represented as a series of hexadecimal values. aes iv.hex
contains a 128-bit Initialization Vector in a similar representation. We encrypted a Jeopardy
clue using AES in CBC mode with this key and IV and wrote the resulting ciphertext (also
stored in hexadecimal) in aes ciphertext.hex.
Decrypt the ciphertext and submit the plaintext in aes plaintext.txt.
3 Breaking A Weak AES Key
As with the last task, we encrypted a Jeopardy clue using 256-bit AES in CBC and stored the
result in hexadecimal in the le aes weak ciphertext.hex. For this task, though, we haven't
supplied the key. All we'll tell you about the key is that it is 256 bits long and its 251 most
signi cant (leftmost) bits are all 0's. The initialization vector was set to all 0s.
Find the plaintext and submit it in aes weak plaintext.txt.
4 Computing Key Space Size
Imagine a cipher you're working with takes a key with an unusual length. In key length.txt
you'll nd a single decimal (base 10) number representing how many bits the key has.
Calculate the total number of possible keys for this cipher (i.e. the size of the
key space), and submit your answer in key space size.txt as a single decimal num-
ber.
5 Bonus: Breaking A Substitution Cipher
For 20 bonus points, let's see if you can solve task 1 without the key. You can nd the cipher
text in bonus ciphertext.txt. The plaintext is guaranteed to consist of uppercase words in
English and spaces. As in task 1, spaces were not encrypted.
Submit the plaintext in bonus plaintext.txt.
2CS461 MP 1: Due Wednesday 09/17 by 11:59 pm Fall 2014
Final Checklist
Make sure you have submitted these les:
sub plaintext.txt
aes plaintext.txt
aes weak plaintext.txt
key space size.txt
(optional) bonus plaintext.txt
3
- 浏览: 964736 次
文章分类
最新评论
-
18335864773:
很多公司项目 都在使用pageoffice 来操作word,e ...
用java生成word文档 -
Gozs_cs_dn:
请问下博主, 怎样将sitemesh3.xsd绑定 sitem ...
SiteMesh3配置 -
Rose_06:
springside4.0quick-start.bat报错原因 -
ilemma:
我也是刚参见工作啊,经理让自学这个,有些东西不太懂,能不能发个 ...
Apache Shiro在Web中的应用 -
shanbangyou:
你废了
程序员上班打酱油的方法
计算机安全
- 博客分类:
- 程序代写
发表评论
-
递归归并排序
2016-02-11 20:26 312/* MergeSort.java CSC 225 - ... -
java冒泡排序对布尔类型进行排序
2015-12-11 23:06 602QQ 928900200 程序代写 java不能对 ... -
判断宏是否是“安全”的
2014-11-22 22:54 522给了一系列C++的宏定义,问你一个表达式是否是“安全”的。 ... -
C语言求平均值
2014-11-19 19:14 501木其工作室:QQ928900200 Computing I ... -
C语言连连看
2014-11-18 16:34 565(1)定义一个矩阵,随机产生字符布置地图,例如下面这个4x ... -
The Monty Hall Problem
2014-10-19 12:58 610GNG1106 Lab 3The Monty Hall Pro ... -
java类
2014-10-16 08:27 269木其工作室 qq 928900200 You are ... -
ECE/CPSC 3520
2014-10-13 09:49 491ECE/CPSC 3520Fall 2014Software ... -
java星球机器人建模UML
2014-10-06 22:29 360Your task is to design and imp ... -
数据库sql
2014-10-06 22:25 580service QQ 928900200 ... -
C语言 cgi(3)
2014-08-04 09:17 3261cs3157 – Advanced ProgrammingS ... -
C语言 cgi(2)
2014-08-04 09:10 2811Columbia Universitycs3157 – Ad ... -
C语言cgi(1)
2014-08-04 09:08 3041Columbia Universitycs3157 – Ad ... -
c++ input,output
2014-08-04 08:37 429You should be comfortable w ... -
Array of Objects
2014-08-04 08:30 625You should be comfortable w ... -
bat脚本打开网页
2014-07-13 09:54 844start iexplore "http://ww ... -
java 汉诺塔实现自动演示
2014-07-10 11:53 4421、增加计时功能,显 ... -
代写java程序qq:928900200
2014-06-18 12:46 3学校为全面提升学校教学质量,提高管理水平,决定开发一套小型成 ... -
基于MVC的系统代写
2014-06-16 12:13 409人力资源管理系统 完成系统静态页面设计,页面数 ... -
程序设计实践C++ 程序代写(QQ 928900200)
2014-06-10 08:15 284程序设计实践 采用C++ ...
相关推荐
计算机安全资料 计算机安全资料 计算机安全资料 计算机安全资料
计算机安全课件计算机安全课件计算机安全课件计算机安全课件计算机安全课件
计算机安全 Stallings 计算机安全原理与实践 pdf 版本
计算机安全原理与实践第四版答案
计算机安全审计报告
中国大部分的计算机安全法律法规,做企业信息安全时参考
计算机安全教程 课件 计算机安全教程 课件 计算机安全教程 课件 计算机安全教程 课件 计算机安全教程 课件 计算机安全教程 课件
本书详尽地介绍了计算机安全的理论与实践,阐释了该领域最基本和最普遍的知识,包括计算机安全的本质和面临的挑战,策略与安全的关系,密码学的角色与应用,策略实现机制,保障技术和方法学,脆弱性分析和入侵检测等...
计算机安全计算机安全计算机安全计算机安全计算机安全计算机安全
目前,随着科学技术和社会经济的飞速发展,计算机和网络的普及程度...不断的增加,因此,要想确保计算机能够在安全的环境下服务于人们的生活、学习,就必须要加强对计算机安全性问题的研究,并要做好相关的 防范措施。
计算机安全试题 下载计算机安全试题 下载
计算机安全 教案 经典 1计算机安全概述 2计算机安全体系结构 4物理安全与可靠性 5-1操作系统安全 5-2操作系统安全性 数据库安全
中国人民银行计算机安全管理暂行规定(试行)
计算机 安全论文,或者说是病毒论文 计算机 安全论文,或者说是病毒论文
计算机安全技术概述包括计算机安全的发展,演变以及未来展望和习题
病毒与计算机安全.ppt;病毒与计算机安全.ppt;病毒与计算机安全.ppt;病毒与计算机安全.ppt
涉密计算机安全保密审计报告20130725.pdf
计算机安全教案2PPT.rar计算机安全教案2PPT.rar计算机安全教案2PPT.rar
涉密计算机安全保密审计报告.pdf