Compute runtime of an average exhaustive key-search on des

Assignment Help Computer Network Security
Reference no: EM131380060

Assignment

As the example of COPACOBANA [105] shows, key-search machines need not be prohibitive from a monetary point of view. We now consider a simple brute- force attack on DES which runs on COPACOBANA.

1. Compute the runtime of an average exhaustive key-search on DES assuming the following implementational details:

COPACOBANA platform with 20 FPGA modules 6 FPGAs per FPGA module 4 DES engines per FPGA Each DES engine is fully pipelined and is capable of performing one encryption per clock cycle 100 MHz clock frequency

2. How many COPACOBANA machines do we need in the case of an average search time of one hour?

3. Why does any design of a key-search machine constitute only an upper security threshold? By upper security threshold we mean a (complexity) measure which describes the maximum security that is provided by a given cryptographic algo- rithm.

Reference no: EM131380060

Questions Cloud

Describe the w''s for these data : Create parallel boxplots as best you can from these summary statistics to display these results.
Discuss about the case-charleston manufacturing company : Charleston Manufacturing Company is a South Carolina producer of four sizes of high-quality, solid oak picture frames; the Small, the Medium, the Large and the Extra Large.  The flow of work-in-process (dashed arrow lines) through the six producti..
Describe the importance of organizational climate : Describe the importance of organizational climate and motivation and describe Kelley's model of effective followership (moving between roles).
Difference between language and present fairly statement : As a user of the financial statements in each instance, does one expression more than the other give you a greater comfort level with respect to the conformity of the financial statements with GAAP? Why or why not?
Compute runtime of an average exhaustive key-search on des : Compute the runtime of an average exhaustive key-search on DES assuming the implementational details. How many COPACOBANA machines do we need in the case of an average search time of one hour?
Write a brief description of the school''s mail deliveries : What percent of the days actually lie within one standard deviation of the mean? Comment.
Describe the power types from the french : Describe leader power, follower motivation, and the aspects of effective followership and provide an overview of influence and the major process and content motivational theories.
Types of electric pencil-sharpener producers : There are two types of electric pencil-sharpener producers. “High-quality” manufacturers produce very good sharpeners that consumers value at $14. “Low-quality” manufacturers produce less good ones that are valued at $8. Suppose that the sale of low-..
Identify the w''s of these data : Identify the variables, classify each as categorical or quantitative, and specify units if relevant.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain and analyze cryptography and cryptanalysis

Explain and analyze cryptography and cryptanalysis in relation to computer security systems. Analyze the types of popular encryption techniques that businesses have to choose from.

  Describe the need for information security

Describe the need for information security, The potential issues and risks that exist and what benefits they can gain from the new wireless fidelity (W-Fi) project

  Why cooperation on a global basis is required cyber security

An introduction which addresses the reasons why cooperation on a global basis is required to address cyber security challenges. This introduction should focus on political, economic, and social factors.

  What are the five http response code categories

What is the structure of a POST request? What headers have to be present in HTTP/1.0 and HTTP /1.1? What are the five HTTP response code categories? What data are contained in HTTP headers?

  What is the entropy of the plaintext message

A foreign navy has implemented a secure communications system in which submarine commanders transmit a single 5-letter message every day. The messages may only use capital (English) letters, and all messages are equally probable.

  Problem regarding the machine probability

The probability that two machines is related by , A to work is 0.7 and the probability that B works if A is working is 0.8 , and 0.35 if A fails work find that machine probability B does not work.

  What is the length of the data field (in hexadecimal)

What is the Destination Address (in hexadecimal)?

  Brief statement describing an it acquisition

Write a brief statement describing an IT acquisition by an organization about which you have knowledge. State whether the organization believes the acquisition met its objectives (e.g., improved the performance of the organization). State why you ..

  Describe the three principles of ip security

Describe The Three Principles of IP Security

  What is the definition of privacy as it relates to

1introduction to the management of information security?2.which trend in it has eliminated the we have technology

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Aid in hacking into computer networks

what you have done as the network administrator to protect the network against such attacks, as well as additional measures to secure the network against worms, viruses, DoS attacks, spyware, and other such network intrusions that can disrupt the ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd