INTE2625 - Encrypt and Decrypt Symmetric Cryptosystem Techniques Assignment

Download Solution Order New Solution

Assignment Task

Q1. Symmetric Key Cryptosystem

In this task, you will demonstrate your understanding of symmetric key encryption and decryption techniques.

Assume that you want to send your RMIT Student Number to your friend. To ensure the security, both of you have decided to use symmetric key encryption and decryption techniques. Consider the numerical part of your RMIT Student Number as the plaintext (P) . For example, if your RMIT Student Number is S4123456 , then the value of P = 4123456 .

Please note that you must use your RMIT Student Number as plaintext. You and your friend have decided to use a shared secret key K which is a 6-bit binary string. Use K = 101011 as the shared secret key . Therefore, you need to use this value of K throughout this question.

Answer the following questions

  1. Convert the plaintext P (the numerical part of your RMIT Student Number) into 24-bit binary strings by inserting additional ‘ n’ zeros to the left of the binary string of the actual binary string of your RMIT Student Number if necessary ( see Figure-1a ). Show the 24-bit binary string of the RMIT Student Number as output. Use any online decimal to binary conversion calculator to convert your RMIT Student Number to binary string.

20240621092756AM-22281560-2044367371.png

Figure-1.a: Conversion RMIT Student Number into of binary plaintext segments from the original plain text

  1. Divide the obtained 24-bit binary string of the plaintext (i.e., the outcome of Q1(a)) into four segments and generate four binary plaintext segments (see Figure-1b). Show all four plaintext 

20240621092756AM-2129049979-1456101353.png

  • Consider a 6-bit binary Initial Vector, IV = 111010. Using the Block Cipher Mode shown in Figure-1c, encrypt the plaintext segments obtained in Q1(b) to find the four ciphertext segments. Show detailed steps for computing all ciphertext segments.

Public Key Cryptosystem

In this task, you need to exhibit your understanding of the Public Key Cryptosystem based Key Exchange Protocol . Assume that Alice and Bob want to establish a shared key using the Diffie-Hellman Key Exchange protocol . Trudy is a Man-in- the-Middle (MiM) . Answer the following questions in the context of the Diffie-Hellman Key Exchange protocol.

Please note that you do not need to propose any new techniques. Instead, use an existing method. With necessary diagram, show detailed calculations to justify the correctness of your prevention technique. 

Q3. Implementing Firewall Rules using Iptables

In this task, you will demonstrate your knowledge of firewall using Iptables , a Linux command line utility to manage firewall . You are expected to do the following:

  • In addition to the lesson learned in practical class, you are required to do your own research to solve this
  • You are required to execute Iptables commands in Kali Linux You must provide all necessary screenshots of your work. Otherwise, marks will be deducted.
  • You must show the status of the FILTER Table before or after executing Otherwise, marks will be deducted.

This It Computer Science have been solved by our PhD Experts at My Uni Paper. Our Assignment Writing Experts are efficient in providing a fresh solution to this question. We are serving more than 10000+ Students in Australia, the UK, and the US by helping them to score HD in their academics. Our Experts are well-trained to follow all marking rubrics and referencing styles.

Be it a used or new solution, the quality of the work submitted by our assignment experts remains unhampered. You may continue to expect the same or even better quality with the used and new assignment solution files respectively. There’s one thing to be noticed you could choose one between the two and acquire an HD either way. You could choose a new assignment solution file to get yourself an exclusive, plagiarism (with free Turnitin file), expert quality assignment or order an old solution file that was considered worthy of the highest distinction.

Get It Done! Today

Country
Applicable Time Zone is AEST [Sydney, NSW] (GMT+11)
+

Every Assignment. Every Solution. Instantly. Deadline Ahead? Grab Your Sample Now.