Encryption algorithm to enhance the avalanche effect

Assignment Help Computer Network Security
Reference no: EM131216335

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document.

Cryptography

Assignment

Given the following S-Boxes:

S1= [ 15        10            2          5

8          4          11        12

1          0          14        7

9          3          6          13        ];

S2= [   4          5          15        10

8          9          7          13

0           1          6          11

2          3          14        12        ];

Implement the following 16 bit cipher:

Plain text:        P = [a1 a2 a3 a4] where a1..a4 are 4 bit each

Key:                K = [k1 k2 k3 k4] where k1..k4 are 4 bit each

Cipher text: C = E(p) = [ S1(a2⊕k1) S2(a4⊕k3) S1(a1⊕k2) S2(a3⊕k4) ]

Example: P = [1000 1100 1101 0110], K = [0001 0011 0010 1111]

C = [S1 (1101) S2 (0100) S1 (1011) S2 (0010]                   = [12 5 6 0]

                                                                                               = [1100 0101 0110 0000]

1. Draw a chart which shows the relation between P, C, and K according to this cipher.

2. Implement the above mentioned cipher and calculate the cipher text for the plaintext provided in Appendix I.

3. Measure the avalanche effect for the encryption algorithm using the provided plain text.

Change 1 bit in the input and calculate the % of how many bits are changed in the cipher text. Repeat this for the provided 10 plaintext inputs; this will give 10 x 16 rounds. Calculate the average avalanche effect.

4. Suggest a change to the encryption algorithm to enhance the avalanche effect. Repeat

3 and comment on your finding.

Appendix I: Test Plain Text

1001 0100 0110 0110

0010 1001 1100 0010

0101 1100 1110 0010

1001 1100 0010 0111

1011 1101 1101 1111

0001 1101 0001 0011

1110 0001 1100 0011

0011 1110 0000 0010

0101 0011 1101 1011

1100 0010 0111 0100

Appendix II: Test Keys

0101 0100 1001 1100

1010 0010 0011 1010

Verified Expert

The assignment was to implement a Caesar Cipher like block cipher. A 16-bit substitution cipher algorithm was implemented and the Avalanche effect was computed against the given plain texts. The assignment further required an enhancement of the given algorithm to increase the Average Avalanche Effect. The enhance was done using Multiple Encryption.

Reference no: EM131216335

Questions Cloud

The profit on consignments for the consignee is : The Petunia Corporation grows and consigns flowering plants to retailers. The consignee receives a sales commission of 20%. Also, he is paid to water and care for the plants in his possession. Dead plants are discarded but cannot exceed 15% of the pl..
Define a discrete time random process : Let Wn be an IID sequence of zero-mean Gaussian random variables- Define a discrete-time random process - Find the mean function. - Find the autocorrelation function.
What can you say about the location of the groups : If the Tukey HSD critical value is 18, what can you say about the location of the significant difference between the groups?
Interest on the weighted average capital balance : Adams, Brown, and Collins are partners in a sporting goods outlet. The business began operations on January 1, 19x1, with Adams investing $10,000, Brown $20,000, and Collins $26,000. Adams withdrew $4,000 on April1, Brown $6,000 on May 1 and $6,000 o..
Encryption algorithm to enhance the avalanche effect : Draw a chart which shows the relation between P, C, and K according to this cipher - Implement the above mentioned cipher and calculate the cipher text for the plaintext provided in Appendix I.
Describe three optimal decision rules for katrinas candies : Create three optimal decision rules for Katrina's Candies (e.g., whether to hire more staff or hire temporary workers to meet production schedules).
Preferred dividends-options and convertible debt : “Earnings per share” (EPS) is the most featured, single financial statistic about modern corporations. Daily published quotations of stock prices have recently been expanded to include for many securities a “times earnings” figure that is based on EP..
Net income is shared on basis of average capital balances : Tom and Jerry formed a partnership at the beginning of year 19x5 by investing $30,000 and $50,000, respectively, on January 1, 19x5. Tom invested an additional $15,000 on March 1, and Jerry invested an additional $5,000 on August 1. If net income is ..
Explain applications of the knowledge that you have learned : Propose two applications of the knowledge that you have learned in this course to your current or a future position. Provide a rationale for your response. Create a list of three best practices to follow in the field of managerial economics and gl..

Reviews

Write a Review

Computer Network Security Questions & Answers

  Kerberos authentication protocol

Describe 802.1x authentication and the steps that when a wireless client connects to a network using RADIUS server for authentication and Explain the PEAP protocol - how does it differ from EAP and what EAP deficiency does it address?

  Sarbanes oxley act and gramm leach bliley act

Provide an overview that will be delivered to senior management of regulatory requirements the agency needs to be aware of, including: FISMA, Sarbanes-Oxley Act and Gramm-Leach-Bliley Act

  How to calculate signatue for arbitrary integers

Describe how Trudy can now calculate your signature on (m1j m2k) mod n for arbitrary integers j and k. (you will also require to describe how she can also compute m1-1 mod n).

  Formulate a digital forensics process

Write a guide on how to load a VHD file and what strategies should you use? Which acquisition method should you use?

  Is the research informed by primary sources of theories

Is the research informed by primary sources of theories, concepts, principles and models in the field, and are they referred to specifically? Are methods of data collection appropriately explained - Is data analysis complete and presented logically..

  What steps would you advise to prevent such attacks

What steps would you advise to prevent such attacks? What limitations does this form of attack have - explain why the flag has been set and what it means for TCP connection.

  Discuss tools and techniques for removing malware

Discuss tools and techniques for removing Malware using the text Internet, and/or your job as reference for full credit. Discuss best practices for Microsoft Windows Group Policy using the text Internet and/or your job as reference for full credit.

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Research paper about data encryption techniques

Write a research paper about data encryption techniques. Your content should include the following: Business advantages and disadvantages of full disk encryption, compared to other types of encryption techniques.

  Develop a security plan for a threat detection system

Your task is to develop a Security Plan for a threat detection system employing relevant technologies. The Plan could be divided into the following sections: An overarching guideline.

  Redesign the university ip addressing space

Redesign the University IP addressing space. The University owns 2 x Class B (144.149.0.0 and 131.172.0.0) IPv4 Public IP addressing space and also utilizes IPv4 Private IP addresses

  Importance of maintaining the secure computing environment

Prepare a report providing categorical feature comparison for the three products in the chosen category and make recommendations about the products to assist purchasing decision.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd