Question

1. A block cipher algorithm in its basic form is almost never used for encrypting long...

1. A block cipher algorithm in its basic form is almost never used for encrypting long messages. Why? How are block ciphers deployed in practice if you want to encrypt long messages?

Homework Answers

Answer #1

A block cipher is hard to use when it comes to encrypting large files. This is because to cipher data, XOR operation is used. Then a one-time pad is generated to encrypt the given message. The message length is required to be less than a single pad. Which is hard to achieve in such cases.

To practically do it, there is a need of certain operations to chain the number of blocks formed. The length of the chain would be the product of the total number of blocks and block size. This length can be used to encrypt files. However, it is important to know that padding has to be used so that privacy is not affected.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to...
USE C++!!!! Encryption and Decryption are two cryptographic techniques. Encryption is used to transform text to meaningless characters, and decryption is used to transform meaningless characters into meaningful text. The algorithm that does the encryption is called a cipher. A simple encryption algorithm is Caesar cipher, which works as follows: replace each clear text letter by a letter chosen to be n places later in the alphabet. The number of places, n, is called the cipher key. For example, if...
Which of these is necessary before two parties can use a symmetric cryptographic algorithm? A key...
Which of these is necessary before two parties can use a symmetric cryptographic algorithm? A key they both know. A one-time pad. A communication Channel None of the above. How can two people realistically get a common key to use in a cipher? The algorithm automatically provides it Ciphers do not require a common key You can use quantum entangled elections. It can be done either meeting in person, or by a secure key exchange What is the fundamental idea...
True/False 1.___ Almost all property, plant, and equipment (PP&E) is depreciated, which means that its cost...
True/False 1.___ Almost all property, plant, and equipment (PP&E) is depreciated, which means that its cost is spread over its useful life. 2. ____ PP&E is a long-term asset. 3. ____ If PP&E is found to be permanently impaired, a loss must be recorded. 4. ____ If an expenditure increases the useful life of an asset, it should be capitalized, not expensed. 5. ____ It does not matter how a company divides a basket purchase since all the assets will...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
As our bodies begin to age, there is the never-ending series of aches and pains as...
As our bodies begin to age, there is the never-ending series of aches and pains as our cells, tissues, joints, and bones begin to deteriorate. However, the answer to our ailments always seems to come in the form of a pill that can provide us with what our bodies apparently can no longer provide. While most pharmaceuticals are subject to FDA approval and rigorous testing, dietary supplements are not subject to the same regulation. Most dietary supplements are based on...
[1] The basic problem that gives rise to the study of economics is the need to:...
[1] The basic problem that gives rise to the study of economics is the need to: A) control the effects of actions by foreign governments. B) be sure all the goods and services produced in an economy get sold. C) use scarce resources to satisfy people's unlimited material wants and needs. D) control people's tastes and wishes so that the available resources can produce all the goods and services they want. [2] Economics is concerned with: A) earning as much...
1 The Problem: Drugs in Series[1] One of the physician’s responsibilities is to give medicine dosage...
1 The Problem: Drugs in Series[1] One of the physician’s responsibilities is to give medicine dosage for a patient in an effective manner. Two mathematical techniques help physicians analyze the concentration of drug is the bloodstream of a patient: the exponential decay model (EDM) and the Geometric Series and its Formula (GSF). In this problem, we will analyze the situation where a drug is administered intravenously and that the concentration of the drug in the bloodstream jumps almost immediately to...
Please answer all, Thank you. 1. A firework is designed so that when it is fired...
Please answer all, Thank you. 1. A firework is designed so that when it is fired directly upwards, it explodes and splits into three equal-massed parts at its peak. Someone launches the firework directly upwards and measures the locations of two of the pieces of the firework. They find that one piece landed 2 meters to the left and another piece landed two meters in front of them. Where did the third piece of land? 2. A Newton's cradle is...
Diffusion of gases across a permeable membrane 1. How long did it take the O2 levels...
Diffusion of gases across a permeable membrane 1. How long did it take the O2 levels to become about equal outside and inside the cell? What happened to those levels after they became about equal over the additional 10 seconds? Why did this happen? My answer: It took 6 seconds to become equal. After they became about equal over the additional 10 seconds they fluctuate back and forth as equal equilibrium is achieved. 2.Cell use O2 and produce CO2 as...
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems....
QUESTION 1 Advanced Security Inc. was hired by the Treasury Bank Inc. for securing their systems. The first thing they did was implement the best practice if separation of domains. As a result of this The bank had to get a new domain name. any change made in the records points to only one party who could have made that change. If you are a technical person, you must have office in a particular area of the building. accessing outside...