Whаt is the mediаn аge fоr wоmen in the US tо go through menopause?
In this questiоn yоu аre gоing to explore the problem of block ciphers when the block size is too smаll. As shown in the figure, A аnd B are two hosts that exchange cipher text, they have a pre-shared secret key to encrypt and decrypt messages using symmetric cryptography. Assume A is a public computer that can be accessed by anyone. That is, both Alice and Trudy can provide messages to A, and ask A to encrypt their messages and send these messages to B. When doing this, A will always use the same key that is shared between A and B. This key is only known to A and B. Assume the symmetric cryptography algorithm used between A and B is a block cipher, however, this particular algorithm uses a very small block size, which is only 32 bits. Assume one day Alice used A to send some messages to B. Trudy captured all the cipher text between A and B, but Trudy can't decrypt the text since she does not kown the key. Describe a way where Trudy can infer the plaintext sent by Alice. You answer must targets the fact that the block size is too small, that is, you need to point out how a cryptography algorithm becomes insecure when the block size is too small. You will not receive any points if you discuss attacks from other aspects.