Question

Consider a block cipher that is used in cipher block chaining mode. Suppose that during transmission,...

Consider a block cipher that is used in cipher block chaining mode. Suppose that during transmission, Ci , the i-th ciphertext block, is corrupted. How many plaintext blocks will be affected? Answer the same question for the case of cipher feedback mode.

Homework Answers

Answer #1

Note: Done accordingly. Please comment for any problem. Please Uprate. Thanks.

In Cipher block chaining mode if one ciphertext block is damaged, only two received plaintext blocks will be damaged.

As shown in figure suppose block underlined by red is corrupted then that block and next block is affected only.

Same is with CFB mode as shown below in decryption of CFB:

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Consider a block cipher that is used in cipher block chaining mode. Suppose that during transmission,...
Consider a block cipher that is used in cipher block chaining mode. Suppose that during transmission, Ci , the i-th ciphertext block, is corrupted. How many plaintext blocks will be affected? Answer the same question for the case of cipher feedback mode.
Can a parallel computer (which can do many operations simultaneously) perform Cipher Block Chaining (CBC) block...
Can a parallel computer (which can do many operations simultaneously) perform Cipher Block Chaining (CBC) block cipher mode decryption faster than encryption? Explain your answer.
This question concerns block cipher modes. We will use a simple affine cipher, which can be...
This question concerns block cipher modes. We will use a simple affine cipher, which can be expressed in C as follows. char cipher(unsigned char block, char key) { return (key+11*block)%256; } Note that the block size is 8 bits, which is one byte (and one ASCII character). We will work with the fixed key 0x08. We now encrypt various plaintexts using modes for this cipher. In every case in which the mode requires an IV, the IV will be 0xAA....
As in the previous question, consider a Feistel cipher that has only 5 rounds. Suppose further...
As in the previous question, consider a Feistel cipher that has only 5 rounds. Suppose further that the round function F(X,Ki ), which takes in input a block X and a round key Ki , is defined as F(X, Ki ) = X ⊕ Ki and that the cipher works on blocks of 4 bits, the round key K1 is 1010 and all other round keys are defined by the equation Ki+1 = Ki⊕ 1011, the input is LE0|| RE0...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
Suppose soft drink production at bottling plant is described by the production function: ? =??^.? where...
Suppose soft drink production at bottling plant is described by the production function: ? =??^.? where y is the number of cases of soft drinks produced and x is the number of hours of labor hired. We also assume the wage for labor is r, price for soft drink is p and fixed costs is $1,000. k. Find the optimal input of x that maximizes the profit. (Hint: this is the input-side optimization, you should derive optimal x as a...
Suppose a vertical pipe is to be used as part of a system to manually cycle...
Suppose a vertical pipe is to be used as part of a system to manually cycle nutrients upward from the floor of a lake. (Many lakes do this naturally, some do not. Green Lake, near Syracuse, NY, is one such lake.) A pump is to be installed on the lake floor at the base of the pipe. The base of the pipe will have a diameter of 9 cm. The nozzle of the pipe at the top will have a...
a. [3 pts] Consider the simple loan case. Suppose that the dealership allows you to pay...
a. [3 pts] Consider the simple loan case. Suppose that the dealership allows you to pay the car off in four installments of $5,000, with each installment due once a year. The first payment is due the day that you purchase the car; the remaining installments are then paid on the same date each consecutive year, for the remaining three years. What is the present discounted value of the payments you make for the car? b. [5 pts] Now suppose...
ONLY ANSWER F AND G 1. Mortgage Problem Consider a 20-year mortgage for $350,000 is taken...
ONLY ANSWER F AND G 1. Mortgage Problem Consider a 20-year mortgage for $350,000 is taken out in Jan. 2019 at a 5.40% annual interest rate.      a. What is the Payment Amount for this mortgage?   (2)      b. What total amount will be paid by the borrower over the 20-year payback period? (2)      c. What is the Interest / Principle breakdown for payment #5?   (2)      d. If a $250 per month prepay is made starting with payment...
. Suppose a vertical pipe is to be used as part of a system to manually...
. Suppose a vertical pipe is to be used as part of a system to manually cycle nutrients upward from the floor of a lake. (Many lakes do this naturally, some do not. Green Lake, near Syracuse, NY, is one such lake.) A pump is to be installed on the lake floor at the base of the pipe. The base of the pipe will have a diameter of 9 cm. The nozzle of the pipe at the top will have...