Denote the des encryption of the plain text

Assignment Help Computer Network Security
Reference no: EM13186358

a) Let DESk(P) denote the DES encryption of the plain text P by the key K.

i) If we set K to be the key consisting of all zeroes, explain why encrypting twice with this key for DES has the same effect as encrypting then decrypting. Equivalently, account for the following property when using the all-zero key

DESk(DESk(P) = P

ii) Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

b) Let b' denote the complement of a sequence of bits, so that for 780_DES encryption.png example. Then considering the round structure of DES, show that

251_DES encryption1.png

In other words, complementing the key, plaintext and ciphertext produces the same ciphertext as when none of these values is complemented.Hint: Use the following property of the XOR function x + x = 0.

Reference no: EM13186358

Questions Cloud

Find the volume of the solid whose base is the region : Find the volume of the solid whose base is the region bounded by y=x^{6}, y=1, and the y-axis and whose cross-sections perpendicular to the y axis are equilateral triangles.
How many players were there : After winning the championships, all Detroit Pistons teammates exchanged "high-fives."Altogether there were 66 high-fives. How many players were there?
What happens to the price of u.s. goods in mexico : Why would a country (for example, China) choose to keep their currency relatively pegged to the U.S. dollar. If the U.S. dollar were to appreciate considerably against most currencies, what would be the effect on Chinese exports to countries othe..
What are the dimensions and maximum area : A rectangular is to be fenced off and divide in two by another fence parallel to one side of the playground. 720 feet of fencing is used. what are the dimensions and maximum area.
Denote the des encryption of the plain text : Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.
Real gdp rose by what percent : Suppose nominal GDP in 2005 was $15 trillion, and in 2006 it was $16 trillion. The general price index in 2005 was 100, and in 2006 it was 103. Between 2005 and 2006, real GDP rose by what percent
What is the maximum voltage produced by the system : The electrical signal created by a piece of test equipment at a specific point in time is described by the function Vinst(t) = 12 × sin(360 × 60 × 6.3 + 79). What is the maximum voltage produced by the system.
What is the standard deviations : A factory employs several thousand workers, of whom 20% are Hispanic. If the 20 members of the union executive committee were chosen from the workers at random, the number of Hispanics on the committee would have the binomial distribution with n =..
A textile manufacturer concerned : A textile manufacturer concerned about its survival in the world marketplace has set as its goal, "To increase training and educational opportunities for its employees during the next twenty-four months." Why is this corporate objective ineffective

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explaining organization-s security architecture

Consider your organization's security architecture. How much do you know about it? How much do other workers know? How easy is it to learn more?

  Write application-layer protocols use to move message

Explain how message gets from Alice's host to Bob's host. Make sure to list series of application-layer protocols which are used to move message between the two hosts.

  Case study on byod

Identify the primary benefits of BYOD in organizations, and determine the key ways in which its concepts can enhance an end user's overall working experience.

  Piece of code that allows a buffer

Give an example of piece of code that allows a buffer over run to occur. Assuming a program contains absolutely no buffer over runs. What other control flow-related problems may it have.

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  Is protocol secure for sharing secrets on server computer

Suppose that Alice shares secret with her company's server computer. When Alice is on trip, she tries to store important message in CEO's account directory. Is this protocol secure? If not, how do you feel it could be modified to make it so?

  Question about virtue ethics

Based on virtue ethics, the right action to take in a particular situation is the action that a person with a strong moral character would take.

  Question about system maintenance

The 4-types of IT system maintenance also apply to other industries. Assume you were in charge of aircraft maintenance for a small airline.

  Relationship between technical or it staff

Determine what your relationship would be like with the technical or IT staff at your corporation if you were working side by side on a project or training exercise?

  Encrypt the plaintext by using vigenere cipher

Encrypt the following Plaintext using Vigenere cipher: Plaintext: stocks market is falling Key : one. Is Vigenere cipher monoalphabetic or polyalphabetic? Why?

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd