Question

Assume we encrypt a one “block” message (16 bytes) with a 128 bit OTP key. How...

Assume we encrypt a one “block” message (16 bytes) with a 128 bit OTP key. How long will it take to decipher the message if we are doing 12 x 10^16 XORs per second?

Homework Answers

Answer #1

Size of message = 16 bytes

But 1 byte = 8 bits

Size of message in bits = 16 x 8 = 128 bits

Size of key = 128 bits

In OTP, we XOR every message bit with its corresponding key bit

It is given that we are doing 12 x 10^16 XOR operations per second.

Time taken by 1 XOR operation is :

Time taken to try 1 key is :

Now in order to decipher the message we need to try every possible key

Number of possible keys = 2^128

Time taken is :

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Assume one file has r = 10^6 records. Each record takes R = 100 bytes, of...
Assume one file has r = 10^6 records. Each record takes R = 100 bytes, of which 10 bytes are for the key of the record. Suppose the key values range from 1 through 1,000,000 inclusive. Assume the block size B is 1000 bytes for all files, and that an address (block pointer, tree node pointer, or data record pointer) takes 10 bytes. What is the blocking factor bfr i for the single level index ? How many index blocks...
At 4:35 AM, a covert channel with a bandwidth of 2 bit/sec gains access to a...
At 4:35 AM, a covert channel with a bandwidth of 2 bit/sec gains access to a 2048 byte plaintext message that reads “Bomb Location X at 6:05 AM”. How long will it take to transmit the plaintext of this message? If the covert channel has no access to the encryption key used for the communication, is the scenario a computationally secure one for the transmitter?
how much water we need for one block of cement given : grade of cement M5...
how much water we need for one block of cement given : grade of cement M5 (1 x 5 x 10) volume of dry cement = 0.347 m*3 volume of one block = 980400mm*3
1. The memory units that follow are specified by the number of words times the number...
1. The memory units that follow are specified by the number of words times the number of bits per word. How many address lines and input/output data lines are needed in each case? (a) 8K X 16 (b) 2G X 8 (c) 16M X 32 (d) 256K X 64 2. Give the number of bytes stored in each memory unit in question 1. 3. Word number 563 decimal in the memory shown in Fig. 7.3 (see Mano-Ch7.pdf) contains the binary...
Use python language please #One of the early common methods for encrypting text was the #Playfair...
Use python language please #One of the early common methods for encrypting text was the #Playfair cipher. You can read more about the Playfair cipher #here: https://en.wikipedia.org/wiki/Playfair_cipher # #The Playfair cipher starts with a 5x5 matrix of letters, #such as this one: # # D A V I O # Y N E R B # C F G H K # L M P Q S # T U W X Z # #To fit the 26-letter alphabet into...
2) Allowing (or requiring) users to use numerical digits (including 0) and one of 28 “special...
2) Allowing (or requiring) users to use numerical digits (including 0) and one of 28 “special characters” dramatically increases the number of possible passwords. Furthermore, passwords often are case-sensitive, effectively doubling the size of the alphabet by defining 52 distinct letter characters.    Assuming that passwords are case-sensitive and can include numerical digits and special characters, how many possible 6, 8 and 10 character passwords can be created? (8 points) 3) Allowing digits and special characters creates an enormous number...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
Let’s drill a straight tunnel through the earth. It turns out that if an object of...
Let’s drill a straight tunnel through the earth. It turns out that if an object of mass m is in the tunnel, a distance x from the center of the tunnel, then the gravitational and normal forces wild combine to exert a force on it of mgx/R toward the center of the tunnel – just as if the object were connected to the center of the tunnel by a spring. (Here g is the usual 9.8 m/s2 and R is...
Many baseball sportswriters believe that the key to success in baseball is pitching. One way to...
Many baseball sportswriters believe that the key to success in baseball is pitching. One way to measure success in pitching is a team’s Earned Run Average (ERA). The team ERA gives the number of earned runs per game scored by opponents, where the lower the team ERA is, the better a team’s pitching. In the United States, professional baseball is played in a season of 162 games. For the 2013 season, the number of wins (y) and team ERA (x),...
how did they come up with 12 for the test value? We want to test that,...
how did they come up with 12 for the test value? We want to test that, Ho:- The average annual 401k investment of employees at ABC, Inc. is equal to the average national 401k investment. Vs H1:- The average annual 401k investment of employees at ABC, Inc. is lower than the average national 401k investment. We can take l.o.s 1%,5%.,10%. But we will take 5% l.o.s. because it is neither too low nor too high. 2) a) In the output...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT