Description
helppneed answer with diagram or step by step
Unformatted Attachment Preview
CS2470 Lab2 Assignment
Part 1: DES/3DES (2 points)
3DES = Run DES three times using 2 keys:
Same as DES if k1=k2
Question #1: Why did US Government not use 2DES as
the encryption standard?
Hint: Attackers could use “Known‐Plaintext” Attack and “Meet‐in‐the‐Middle Attack” to crack 2DES
Please explain how attacker crack 2DES and show your work.
Part 2: Secure communication (8 points)
Bob wants to provide confidentiality, non‐repudiation, and message integrity.
Bob uses three keys: 1)his private key, 2) Alice’s public key, newly created symmetric key
2. How can Bob encrypt the data to ensure the confidentiality, non‐repudiation, and integrity of the
message? (Please describe the detailed steps and show your work)
3. How can Alice decrypt the data to validate the non‐repudiation and integrity of the message?
(Please describe the detailed steps and show your work)
Purchase answer to see full
attachment