Need Help ?

Home / Expert Answers / Other / The first 5 people to email correctly decrypted images to the instructor will win fabulous prizes!!

The first 5 people to email correctly decrypted images to the instructor will win fabulous prizes!! ...


The first 5 people to email correctly decrypted images to the instructor will win fabulous prizes!! Implement a C program to decrypt a bmp image. Study the posted 8-bit-mini-DES algorithm posted, and study the code in miniDESv2.cpp. This source code implements an encryption algorithm. The posted ePic.bmp was encrypted with this algorithm. Modify the program as necessary to create a decryption program and use it to decrypt the posted ePic file. Use a brute force key-guessing approach. Use your decryption program on ePic with every possible 8-bit key value from 0 to 255. This will generate 255 decryption candidates, then check the candidates visually with Windows File Explorer or some other viewer. You will know when you have the correct answer because it will be an image recognizable by a human. You may want to start off with your own super tiny binary files (like, 4 bytes with values 1234) for testing. Encrypt and decrypt your small test data first, because this is a lot easier to debug, also, you will know your program works ahead-of-time if you plan to compete for the fabulous prizes. Requirements: 1) You must use the brute force approach described above. 2) You must FIRST write a program to generate the inverse function tables with C constant literal array initializer syntax, and print out these inverse function tables for paper submission. 3) CLEARY indicate your final correct key value 4) Indicate your final substitution table function composition order. eg: f0 ? f1 ? f0? f3 or whatever it turns out to be (this part is way easier than it sounds). Resources: See the posted files “miniDES.cpp” and “ePic.bmp”. There is a binary file editor built into Visual Studio. The bmp will not be posted until the official “start time”, but you may practice on your own bitmaps if desired. Turn In: Paper printouts of: 1) Source code for inverse table generator program 2) Source code for decryption program 3) Inverse function tables printout 4) Key value 5) Inverse function composition order (list) 6) Decrypted output. Sample Output Your inverse tables Your Key Your inverse function composition order Your deciphered image



Radioactive Tutors

Radio Active Tutors is a freelance academic writing assistance company. We provide our assistance to the numerous clients looking for a professional writing service.

NEED A CUSTOMIZE PAPER ON THE ABOVE DETAILS?
Order Now


OR

Get outline(Guide) for this assignment at only $10

Get Outline $10

**Outline takes 30 min - 2 hrs depending on the complexity and size of the task
Designed and developed by Brian Mubichi (mubix)
WhatsApp