Data standard encryption

Assignment Help Basic Computer Science
Reference no: EM131498592

Data Standard Encryption (DES): An Exercise in Hand Calculations

Before starting this lab, please make certain to read and understand the document entitled "SIMPLIFIED DES," which is available via a link in the Week 2 Lesson. It is actually Appendix G in the textbook. This document introduces a simplified approach to the DES encryption/decryption algorithm.The philosophy behind it is to give the student the opportunity to actually do these processes by hand to get the gist of the DES technique. Most of the operations involved in this algorithm are also present in other encryption algorithms. Once you are comfortable with this document and the calculations presented in it, proceed as follows:

1. Obtain from your professor a unique 10-bit key (unique to each individual student).

2. Obtain from your professor a unique 8-bit message (unique to each individual student).

3. Start going through the steps described in the document to encrypt this message.

4. These individual steps must be documented in full detail. Remember that you are doing this to get the feel and the experience of actually going through a symmetric encryption technique, so thoroughness is important here.

5. Once you succeed in encrypting the message, go back and decrypt it and verify that your cipher text is indeed resolvable into the original plaintext.

6. Prepare a detailed lab report documenting all the steps, with captions detailing what each step represents.

7. Plan on spending a few hours on this educational venture.

10-bit key is: 11000 11110

8-bit message is: 0010 1000

Reference no: EM131498592

Questions Cloud

What was the trade discount rate royal received : Royal Furniture bought a sofa for $960. The sofa had a $1,560 list price. What was the trade discount rate Royal received?
Balance of a bank account : Write a function that computes the balance of a bank account with a given initial balance and interest rate.
Protecting existing servers from unauthorized users : Provide recommendations for the Internet access on a virtual web server. Provide recommendations for protecting existing servers from unauthorized users.
Design a piping system : The design of a processing plant is being considered for development. In this plant, ten large centrifugal compressors will be used for water cooling.
Data standard encryption : Before starting this lab, please make certain to read and understand the document entitled "SIMPLIFIED DES," which is available via a link in the Week 2 Lesson.
What are the conditions that can create a terrorist : What are conditions that can create a terrorist? What are religious, cultural, economic and/or political conditions that can lead to recruitment of terrorists?
The effective interest rate on the simple interest note : you were offered the opportunity to purchase either a simple interest note
Contribute to slowing disk performance : What do you think are some of the main things that contribute to slowing disk performance? How might you address these issues?
Identify components of policy development and implementation : Identify components of policy development and implementation. Determine the influences on criminal justice policy development and policy-making.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Write a routine to display a pie chart

Each section label is to be displayed outside the boundary of the pie chart near the corresponding pie section.

  Which standard problem can be used to model king arthur''s

King Arthur expects 150 knights for an annual dinner at Camelot. Unfortunately, some of the knights quarrel with each other, and Arthur knows who quarrels with whom. Arthur wants to seat his guests around a table so that no two quarreling knights ..

  Does the choice in lzrw1 satisfy these criteria

The hash function used in LZRW1 can be found in Appendix B. Knuth [39] writes that such functions should be quick to compute and should minimize collisions. Does the choice in LZRW1 satisfy these criteria? The constant 40543 which appears in the d..

  Unethical conduct on the part of an organization

Find a recent news story in which there was unethical conduct on the part of an organization or group. For example, consider the Facebook IPO and the accusations of insider trading.

  Design of the data center

How does the design of the data center differ from the design of the LANs intended to provide user access to the network?

  Username parameter has the value chucky

Write a complete Java method called authenticate that takes two Strings (username, password) as parameters and returns a boolean. If the username parameter has the value "Chucky" and the password parameter has the value "Cheese1", return true. Oth..

  Add and write a new product in product list (file)

The remaining thing like product price, quantity, tax, and discount automatically added in customer invoice from actual product list when customer final bill is generated.

  C code

C code to find the sum of elements

  Adding fiber from the beginning

Adding fiber from the beginning.

  Discuss the role of system administrator

Discuss the role of system administrator and the skills necessary for net work administrator.

  Four perspectives of the bsc

Indicate a measure for each of the four perspectives of the BSC that Just Dogs might useto help them track their performance. You should have four measures in each category.

  How system access big date to maximum in usage?

How system access big date to maximium in usage?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd