Details of the f routine of the des algorithm

Assignment Help Basic Computer Science
Reference no: EM13935487

Question 1

In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.

Question 2
Using Figure 1, write the algorithm of the DES encryption (including the missing step in Q1) in pseudocode.

Question 3
Figure 1 also shows three routines/modules (IP, F and FP) with input (plaintext) and output (ciphertext) in the main DES cryptosystem. Write the algorithm for: IP and FP.

Question 4
Figure 2 shows the details of the F routine of the DES algorithm. Write the algorithm of the F routine in pseudocode; 6

Question 5
The F routine consists of Question 1 (1%; not more than 0.5 page)
In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.

Question 2 
Using Figure 1, write the algorithm of the DES encryption (including the missing step in Q1) in pseudocode.

Question 3
Figure 1 also shows three routines/modules (IP, F and FP) with input (plaintext) and output (ciphertext) in the main DES cryptosystem. Write the algorithm for: IP and FP.

Question 4
Figure 2 shows the details of the F routine of the DES algorithm. Write the algorithm of the The F routine consists of 3 lookup tables:E-table, S-Box and P-Box. Using the Internet/Library resources, find these tables and summarise in a few lines what the tables are all about. For each lookup table, give an example of input and the resulting output.

Question 6
However, Figure 2 does not show how Subkey (48 bits) is generated from the key-mixing(also known as subkey generation) stage. Use the Internet/Library Resources to find more about the key-mixing stage and write in pseudocode steps the algorithm of this key-mixing
stage.

Question 7
Deriving from Figure 1 (including the missing step from Q1), show the steps in pseudocode how DES decryption works.

Reference no: EM13935487

Questions Cloud

Inherently insecure for sensitive professional : Networks are inherently insecure for sensitive professional and personal data. Still we use networks for sharing data. How to deal with protecting data in an insecure network environment that is the topic of discussion of this report. In this repo..
Organisations operating in a global market : What trends do you think are impacting HR today for organisations operating in a global market?
What motivates a government to establish in credit markets : Government programmes. What motivates a government to establish/intervene in the credit markets? Impact of a financial crisis. What steps should Brunch take if a crisis occurs in country X which is a major exporting destination for Brunch Ltd?
Create a trade crisis between the uk and russian firms : Explain how the cancellation of the L/C could create a trade crisis between the UK and Russian firms. how an irrevocable L/C would normally facilitate the business transaction between the Russian importer and Channel Traders.
Details of the f routine of the des algorithm : In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.
How does the fungi benefit by being saprophytic or parasitic : Explain why fungi are characterized as being either saprophytic or parasitic. How does the fungi benefit by being saprophytic or parasitic?
How many generations will it take for culture to contain : How many generations will it take for the culture to contain more than 30,000 cells/ml? How long, in hours, will it be before the culture contains more than 30,000 cells/ml? Show your calculations.
What is the expected effective yield of investment portfolio : What is the expected effective yield of the investment portfolio? Based on the expected effective yield for the portfolio and the initial investment amount of £15 million, determine the annual interest to be earned on the portfolio.
Determine financing portfolio composition for kents branch : Determine the financing portfolio composition for Kent's southern branch that would minimize the expected effective financing rate while satisfying the restriction imposed by the parent.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Two concepts - persistence and being stateless

5. The text mentions two concepts - persistence and being stateless. At first glance, the notion that computer systems do not usually remember where you have been or what you have been doing seems counter-intuitive. What advantages can you see in hav..

  Recognize root-subsystem-functional decomposition diagram

You want to add another column to report showing number of cases still in progress which are over six months old. Also design functional decomposition diagram. Recognize the root and subsystems.

  Class encapsulating a singly linked list of website objects

PROGRAM 1Code a class encapsulating a singly linked list of website objects. A website has two attributes: a URL address (a String, you do not need to use the existing URL Java class) and 10 or fewer keywords describeing the topic of the website

  Compare how the gestures data is generated and represented

Analyze the accuracy of the input generated by each of the following input devices compared to electrical signals based methods of processing

  Important considerations in the design of performance

What are some of the important considerations in the design of performance benchmarks for mobile devices? Why?

  Automate the entry and updating of routing information

Automate the entry and updating of routing information, but you are concerned about excessive memory and processor utilization if you implement dynamic routing protocols.

  Calculate delay in network and data loss

For a 1-Gbps network operating over 5000 km, the delay is the limiting factor, not the bandwidth. Consider a MAN with the average source and destination 20 km apart.

  Make a class for a singly linked circular list

Make a class for a singly linked circular list that has no end and no beggining. The only access on the list is a single reference, current, that can point to any link on the list.

  An organization can prepare for and avoid the challenge

Identifying three primary challenges when deploying Active Directory and using it in an organization. Discuss specific ways an organization can prepare for and avoid the challenges.

  The context of a database system

1. Discuss what a user view represents in the context of a database system.

  Assignment on the hot topic in human computer interaction

Assignment on the hot topic in human computer interaction

  Database tables that the it staff

Suppose that you are the database developer for a local college. The Chief Information Officer (CIO) has asked you to provide a summary of normalizing database tables that the IT staff will use in the upcoming training session.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd