In this assignment, you have to mount a key
recovery attack on a symmetric key encryption scheme in the KPA
(Known Plaintext Attack) model. Mr. Cryptix has designed a new
block cipher and implemented it in Java. Here is the java code for his
block cipher. This block cipher uses 56 bit key and encrypts
blocks of size 64 bits. The message to be encoded is assumed to be
a string of ascii characters. The message is first converted into
binary by converting each ascii character to 8 bit binary number.
Mr. Cryptix uses the following code
for this conversion. Then this binary string is encrypted with the
block cipher using the ECB mode. Here
is the code that encrypts using the ECB mode.
In order to know if this encryption scheme is
secure, I have used this encryption scheme to encrypt a file. I
have used different keys for each student. To be able to mount an
attack I would let you know that the first line of the file is the
following:
This file contains the first 33 chapters of
Great Expectations. The next file contains the remaining
chapters. |
Here is this line converted to
binary format. In the table below I have given the encryption of
this line with your key. You have to use this information to mount
a key recovery attack and let me know your secret key.
Name |
The message
encrypted with your 56-bit secret key |
Abhishek Gupta (EE) |
cipher-1 |
Rishab Goyal |
cipher-2 |
Abhishek Kumar |
cipher-3 |
Ankita |
cipher-4 |
Ashwini Choudhary |
cipher-5 |
Himanshu Shekhar |
cipher-6 |
Soniya Goyal |
cipher-7 |
Abhishek Sinha |
cipher-8 |
Manish Yadav |
cipher-9 |
Deepak Sharma |
cipher-10 |
Shashank Verma |
cipher-11 |
Abhishek Gupta (CSE) |
cipher-12 |
Rajat Agarwal |
cipher-13 |
Ashish Gaurav |
cipher-14 |
Utkarsh Ohm |
cipher-15 |
Suyash Roongta |
cipher-16 |
Abhishek Aggarwal |
cipher-17 |
Sushant Saxena |
cipher-18 |
Mehul Kumar |
cipher-19 |
Prince |
cipher-20 |
Ramanshu Mahaur |
cipher-21 |
Siddhant Ujjain |
cipher-22 |
Chandrika Bharadwaj |
cipher-23 |
Abhay Gupta |
cipher-24 |
Abhinn Kothari |
cipher-25 |
Alok Singh |
cipher-26 |
Naveen Kumar |
cipher-27 |
Parth Jaiswal |
cipher-28 |
Gaurav Ashok |
cipher-29 |
Ruchin Kukreja |
cipher-30 |
Mayank Singh Gurjar |
cipher-31 |
Nikhil Kumar |
cipher-32 |
Soumyaranjan Majhi |
cipher-33 |