Design and implement modified des cipher

Assignment Help Basic Computer Science
Reference no: EM13935866

Design and implement Modified DES cipher as mentioned below and observe the Avalanche effect. The number of rounds allowed from one to five only. Observe the Avalanche effect by c hanging the bits of the plain text. That is Once the first round is completed, change 1 bit of the plain text and observe the change in cipher text bits. Continue the analysis by changing half of the bits in the plain text. Module: Decryption Phase Task 1: Generate an input sequence 64-bit input number for decryption Task 2: Implementing IP-1 Inverse Initial Permutation function on 64-bit number Task 3: Implementing Expansion function on 32 bit number to get 48-bit number Task 4: Implementing XOR on 48 bit with Round 1 key Task 5: Implementing S- Box function on 48 bit number to get 32 - bit number Task 6: Implementing Permutation function on 32- bit Task 7: Generate the output from Decryption phase

Reference no: EM13935866

Questions Cloud

Studies of leadership in the future : What implications do your studies of leadership have for you in the future? What more do you need to learn or do? How will you develop your own leadership knowledge and skills?
Discuss hepatitis c epidemic is similar to hiv/aids epidemic : Discuss three ways the Hepatitis C epidemic is similar to the of the HIV/AIDS epidemic and three ways the Hepatitis C epidemic is different than the HIV/AIDS epidemic.
Transformational leader give with an example : assignment is Based on an IT company of case study and question Related to same, Check it and Make according to that the assignment , Here I am Case study and Questions, in first
Create a team-based empowered organization : In other words, he wants to create a team-based, empowered organization. Several of his best managers are resisting the idea strongly.
Design and implement modified des cipher : Design and implement Modified DES cipher as mentioned below and observe the Avalanche effect. The number of rounds allowed from one to five only. Observe the Avalanche effect by c hanging the bits of the plain text.
Replay television programs received from cable : Personal Video Recorders (PVRs): Personal video recorders (PVRs) are digital video recorders used to record and replay television programs received from cable, satellite, or local broadcasts. However, unlike VCRs, which PVRs replaced, PVRs offer m..
What is the fundamental flaw in the chief accountant work : Consider the analysis of the decision performed by the company's chief accountant and compare it to your analysis in part a. What is the fundamental flaw in the chief accountant's work?
Prepare the bvcr and pre-acquisition worksheet : Prepare the acquisition analysis at 1 July 2015. Prepare the BVCR and pre-acquisition worksheet entries ONLY at 30 June 2016
Discuss the advantages that large multinationals : Discuss the benefits / advantages of Asset accounting in SAP Financials. General discussion and then show how 2 Multi-Nationals have benefited based on these advantages/benefits discussed/researched.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Design a module

Design a module, using pseudocode, named getNumber, which uses a reference parameter variable to accept an Integer argument. The module should prompt the user to enter a number and then store the input in the reference paramter variable.

  Evaluate the reason for the limited use of the root

Evaluate the reason for the limited use of the root or superuser account in Linux

  C programhow to read in value

C programHow to read in value  only  once in the  double array? please  so me the example of how you do it

  Replacing a hard drive

The hard drive is among the most essential components of the computer system since it is the area where the whole computer's data is saved for the life of the computer. The following steps are to be used to replace a hard drive:

  A drive that you are investigating contains several

a drive that you are investigating contains several password-protected files. what procedures would you need to follow

  Write a pascal program which reads price of an item

write a pascal program which reads price of an item

  Create a visual logic flowchart that parallels pseudocode

Create a Visual Logic flowchart that parallels this pseudocode.

  Privacy protection act and forensic computer science

Research a scholarly paper in two paragraphs summaries. First paragraph is a summary of the article and the second paragraph is a reaction or discussion to the article. - Must be in APA formatTopic 1: Privacy Protection Act,

  Develop system models based on the unified modeling

you have been asked to develop uml diagrams to graphically depict and describe the architecture of two 2 unrelated

  Determine features and capacities of ram-disk storage

Determine the features and capacities (RAM, disk storage, processor speed) that Amy should include in the Web server computer that she will need for her site.

  Write pseud code for 8-puzzle problem

write pseud code for 8-puzzle problem

  Item number in the inventory

Write a console program that will ask the user for an item number in the inventory and display the name of that item. Stay in a loop so that the user may enter the item number multiple times. Use the letter E to exit the application. Show an error me..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd