Calculate the average avalanche effect

Assignment Help Computer Network Security
Reference no: EM131680215

Assignment

Given the following S-Boxes:

S1= [    15        10        2

5

 

            8          4          11

6

 

           1          0          14

7

 

           9          3          12

13

];

S2= [    4          0          15

 

10

 

            8          9          7

13

 

           5           1         6

11

 

           2          3          14

12

];

Implement the following 16 bit cipher:

Plain text:

Plain text:

Key:

P = [a1 a2 a3 a4] where a1..a4 are 4 bit each

K = [k1 k2 k3 k4] where k1..k4 are 4 bit each

 

Cipher text:

C = E(p) = [ S1(a2k1) S2(a4k3) S1(a1k2)

S2(a3k4)

]

Example: P = [1000 1100 1101 0110], K = [0001 0011 0010 1111]

               C = [S1(1101) S2(0100) S1(1011) S2(0010 ] = [6 0 12 5]

                                                                                      = [0110 0000 1100 0101]

1. Draw a chart which shows the relation between P, C, and K according to this cipher.

2. Implement the above mentioned cipher and calculate the cipher text for the plaintexts provided in Appendix I and the key provided in Appendix II.


3. Measure the avalanche effect for the encryption algorithm using the provided plaintexts. Change 1 bit in the input and calculate the % of how many bits are changed in the cipher text. Repeat this for the provided 10 plaintext inputs; this will give 10 x 16 rounds. Calculate the average avalanche effect.

4. Suggest a change to the encryption algorithm to enhance the avalanche effect. Repeat 3 and comment on your finding.

Appendix I: Test Plain Text

1001 0100 0110 0110

0010 1001 1100 0010

0101 1100 1110 0010

1001 1100 0010 0111

1011 1101 1101 1111

0001 1101 0001 0011

1110 0001 1100 0011

0011 1110 0000 0010

0101 0011 1101 1011

1100 0010 0111 0100

Appendix II: Test Key

1010 0010 0011 1010

Verified Expert

This assignment deals with the avalanche effect and effect of change in the single bit in the percentage of the avalanche effect.It also include the program that describe the entire functionality of avalanche effect

Reference no: EM131680215

Questions Cloud

How the information systems function supports a business : What major features of a business are important for understanding the role of information systems?
Find the probability that no kings appear before first ace : A deck of cards is shuffled well. The cards are dealt one by one, until the first time an Ace appears. Find the probability that no kings, queens, or jacks.
What is personal daily fiber recommendation : a. What is your personal daily fiber recommendation? b. What is the current average daily intake of fiber for adults according to the research?
Calculate the amount of depreciation expense recorded : Calculate the amount of depreciation expense recorded in Rose Company's 2021 income statement related to the machine. Do not use decimals in your answer
Calculate the average avalanche effect : INCS-741 Cryptography - Draw a chart which shows the relation between P, C, and K according to this cipher - Implement the above mentioned cipher and calculate
Find probability that the hand contains cards of every suit : A random 13-card hand is dealt from a standard deck of cards. What is the probability that the hand contains at least 3 cards of every suit?
Calculate the book value of the equipment at december : On January 1, 2017, ABC Company purchased a large piece of equipment for $285,000. Calculate the book value of the equipment at December
Find the probability of each of the given possibilities : A random 5-card poker hand is dealt from a standard deck of cards. Find the probability of each of the following possibilities (in terms of binomial coecients).
Explain why employees resist organisational change : Explain why employees resist organisational change. Discuss ways Golden Sun can alleviate employee resistance to change

Reviews

inf1680215

1/17/2018 4:48:51 AM

Money is not the criteria.just share the news about assignmnt..so you guys deliverng the solution between 12 to 20hrs,right?..sorry for asking too many questions,i totally denpended on u.so i dont had choice everything is good,so u guys used 2 similar keys & encrypted the plain text with key and after getting cipher text,encrypted again this cipher with the same key.is it right?? Thanks you so much for your help, you guys are super helper. hahaha thanks

inf1680215

12/18/2017 5:19:15 AM

[C= Ep(Ep(P, K1), k2)] everything is good, so u guys used 2 similar keys & encrypted the plaintext with key and after getting cypher text, encrypted again this cypher with the same key.is it right?? why don't u write the code for 3rd question too..just adding extra lines of code to which was given.which is the calculation of avalanche effect of bits changed in every plain text(16rounds of every plaintext) Yes, you can use either use the same key or different key The code for 3rd and 4th are similar. You just need to comment out the key part.

len1680215

10/14/2017 6:40:26 AM

I just need answer for 4th ques & program which output has to calculate avalanche effect Implement the above mentioned cipher and calculate the cipher text for the plaintexts provided in Appendix I and the key provided in Appendix II.

Write a Review

Computer Network Security Questions & Answers

  Network design paper

Network Design Paper

  Analyze security requirements and prepare a security policy

Analyze security requirements and prepare a security policy.

  Develop a wireless and remote connectivity assessment

Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.

  Characteristics of clausewitzs theory of warfare

Characteristics of Clausewitz's Theory of Warfare and compare and contrast the key characteristics of Clausewitz's theory of warfare.

  Describe a malware attack that causes the victim

Describe a malware attack that causes the victim to receive physical advertisement and describe how to modify a NAT router to prevent packets with spoofed IP addresses from exiting a private network.

  Define cyber-attack simulator systems

Identify at least three (3) benefits or key knowledge points that could be derived from using cyber-attack simulator systems and research, and suggest how this insight could assist in defining the needs for security within an organization.

  Implement skills and knowledge gained through course

To implement the skills and knowledge gained through the course and to achieve greater awareness of the latest security tools and techniques for computer systems security.

  Discuss the major networking building blocks

Discuss the major networking building blocks and their functions. Secondly, discuss software application's vulnerabilities, such as those found in web browsers.

  Question about substitution ciphers

Think about two substitution ciphers. One adds a value of i to the ASCII code of the plain text character. The other adds a price of j to the plaintext character. All additions are modulo 256.

  How has the role of private security changed since the 911

1. how has the role of private security changed since the 911 attacks?what are some of the roles that private

  Summerize the role of public key infrastructure

Summerize the role of Public Key Infrastructure (PKI). Discuss the use of a Certificate Authority (CA). Include the use of a CA and also include why the backing up of these keys is so important.

  Write paper about information security and cyber security

Write paper about the following topics- information security, cyber security, and risk management with relation to cloud computing including things like risk management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd