We will now analyze a pseudorandom number sequence generated by a LFSR characterized by (p2 = 1, p1 = 1, p0 = 1).
a. Draw the LFSR diagram.
b. What is the sequence generated from the initialization vector (s2 = 1, s1 = 0, s0 = 0)?
c. What is the sequence generated from the initialization vector (s2 = 0, s1 = 1, s0 = 1)?
d. How are the two sequences related?
Refer to https://en.wikipedia.org/wiki/DES_supplementary_material for the s-boxes in DES to answer the following questions:
What is the output of the first round of the DES algorithm when the plaintext and the key are both all zeros? (List transition steps to justify your answer)
a. What’s the 64-bit value of IP(x)?
b. What’s the 48-bit subkey k1 of after PC-1?
c. What’s the 48-bit value of E(R0) after expansion?
d. What’s the 48-bit value after E(R0) XOR k1?
e. What’s the 32-bit value after S-boxes operations?
f. What’s the 64-bit (L1, R1) value after permutation P?
Suppose 8 bit registers have following contents
X=00001111
Y=10101010
Z= 11011011
W=00110011
What will be the 8 bit values of each register after execution of following sequences of
microoperations ?
X ← 𝑋 + 𝑌
Z←Z⋀ 𝑊, 𝑌 ← 𝑌 + 1
X←X-Z
The "SUPER GOODS " Pvt. Ltd. manufactures spices for the export market. In the factory, there are two machines called A and B. The following table shows a sample production of each machine in seven days. Day1 Day2 Day3 Day4 Day5 Day6 Day 7 Production of Machine A 160 180 150 110 190 140 165 Production of Machine B 180 100 115 170 155 165 195
Write a program in pseudocode to
• Declare a two-dimensional array to store these data and get user input to load the array. • Find the total production of machine A in the entire week. • Display the highest production and name of the machine that produced it.
2.1 By default, when you store, use, share or communicate your data in the cloud, usually, your data is in a raw, unencrypted format, known as ‘plaintext’, unless you have encrypted your data before being saved or transmitted. If you leave your data unencrypted, you will face the risk that anyone who gains access to your account can read, copy or delete your data. This leaves your data leaked or exposed to unauthorized individuals and entities. Thus, end-to-end data encryption including your emails if stored in Cloud servers, at rest, in-use and in motion, is a must. Discuss various methods of encryption that can secure data in storage and in transit.
2.2 In NOT less than three pages, critically discuss how Cloud computing and remote access has supported the COVID-19 response. (You are to conduct independent research and consult other academic materials/ articles to corroborate your discussion. Include all references consulted).
Write Verilog code to perform 8-bit division using non restoring algorithm.
Identify ways to safeguard computer against each of the following risk viruses, worms,
Trojan horses, botnets, denial of service attacks, back doors and spoofing
By default, when you store, use, share or communicate your data in the cloud, usually, your data is saved or transmitted. If you leave your data unencrypted, you will face the risk that anyone who gains access to your account can read, copy or delete your data. This leaves your data leaked or exposed to unauthorized individuals and entities. Thus, end-to-end data encryption including your emails if stored in Cloud servers, at rest, in-use and in motion, is a must. Discuss various methods of encryption that can secure data in storage and in transit
Write a program that allows the user to input two numbers. Use NUM1 & NUM2 as variables. The program should output 4 answers using 4 different operators which are +, ‐, /, * and MOD. Your Screen should look something like this:
Ans1 =
Ans2 =
Ans3 =
Ans4 =
*using netbeans*