Details of the f routine of the des algorithm

Assignment Help Basic Computer Science
Reference no: EM13935487

Question 1

In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.

Question 2
Using Figure 1, write the algorithm of the DES encryption (including the missing step in Q1) in pseudocode.

Question 3
Figure 1 also shows three routines/modules (IP, F and FP) with input (plaintext) and output (ciphertext) in the main DES cryptosystem. Write the algorithm for: IP and FP.

Question 4
Figure 2 shows the details of the F routine of the DES algorithm. Write the algorithm of the F routine in pseudocode; 6

Question 5
The F routine consists of Question 1 (1%; not more than 0.5 page)
In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.

Question 2 
Using Figure 1, write the algorithm of the DES encryption (including the missing step in Q1) in pseudocode.

Question 3
Figure 1 also shows three routines/modules (IP, F and FP) with input (plaintext) and output (ciphertext) in the main DES cryptosystem. Write the algorithm for: IP and FP.

Question 4
Figure 2 shows the details of the F routine of the DES algorithm. Write the algorithm of the The F routine consists of 3 lookup tables:E-table, S-Box and P-Box. Using the Internet/Library resources, find these tables and summarise in a few lines what the tables are all about. For each lookup table, give an example of input and the resulting output.

Question 6
However, Figure 2 does not show how Subkey (48 bits) is generated from the key-mixing(also known as subkey generation) stage. Use the Internet/Library Resources to find more about the key-mixing stage and write in pseudocode steps the algorithm of this key-mixing
stage.

Question 7
Deriving from Figure 1 (including the missing step from Q1), show the steps in pseudocode how DES decryption works.

Reference no: EM13935487

Questions Cloud

Inherently insecure for sensitive professional : Networks are inherently insecure for sensitive professional and personal data. Still we use networks for sharing data. How to deal with protecting data in an insecure network environment that is the topic of discussion of this report. In this repo..
Organisations operating in a global market : What trends do you think are impacting HR today for organisations operating in a global market?
What motivates a government to establish in credit markets : Government programmes. What motivates a government to establish/intervene in the credit markets? Impact of a financial crisis. What steps should Brunch take if a crisis occurs in country X which is a major exporting destination for Brunch Ltd?
Create a trade crisis between the uk and russian firms : Explain how the cancellation of the L/C could create a trade crisis between the UK and Russian firms. how an irrevocable L/C would normally facilitate the business transaction between the Russian importer and Channel Traders.
Details of the f routine of the des algorithm : In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.
How does the fungi benefit by being saprophytic or parasitic : Explain why fungi are characterized as being either saprophytic or parasitic. How does the fungi benefit by being saprophytic or parasitic?
How many generations will it take for culture to contain : How many generations will it take for the culture to contain more than 30,000 cells/ml? How long, in hours, will it be before the culture contains more than 30,000 cells/ml? Show your calculations.
What is the expected effective yield of investment portfolio : What is the expected effective yield of the investment portfolio? Based on the expected effective yield for the portfolio and the initial investment amount of £15 million, determine the annual interest to be earned on the portfolio.
Determine financing portfolio composition for kents branch : Determine the financing portfolio composition for Kent's southern branch that would minimize the expected effective financing rate while satisfying the restriction imposed by the parent.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd