For your testing, I attached two txt files contains pairs of plaintext and corresponding ciphertext. For instance, each row in the txt file has four numbers, separated by \tab:
29891 13620 13620 2653495094
where the first two instances (total 32+32 = 64 bits) represent plaintext and the last two instances are corresponding ciphertext. The run1 txt file is generated with one key and the run2 txt file is with a different key. This assignment tells us that if an attacker collects a few pairs of plaintext and corresponding ciphertext, attacker can quickly find the key used by doing cryptoanalysis.
Do you need help with this assignment or any other? We got you! Place your order and leave the rest to our experts.