Implement the encryption algorithm

Assignment Help Computer Network Security
Reference no: EM131272964

Information Security - Project Symmetric Cipher

Symmetric Cipher / Implement the encryption algorithm

• Consider the following encryption algorithm

- Key size: 32 bits
- Block size: 48 bits
- Structure: SP-Network with 10 rounds
- S-box is the same as AES
- M: Linear Transition
• M is a 3x3 matrix in GF(28)
• GF(28) is the same field in AES

1592_Figure.jpg

-p(x) = x8 + x4 + x3 + x1 +1

105_Figure1.jpg

• Consider the following encryption algorithm (cont.)
- Key Schedule

• Rotl(x, n): n-bit circular left-shift of x

• Generate W (544-bit length) from a master key K

W = K || K0 || k1 || .... || k15

= K || Rotl(K,5) || Rotl(K,10) || Rotl(K,15) || ... || Rotl(K,11) || Rotl(K,16)

• Generate rk0, rk1, rk10 by extracting leftmost 48-bit from W

- Use only 11 (528-bit) keys and throw out the rest 16-bit

487_Figure2.jpg

1. Implement the encryption algorithm
- Express the matrix multiplication as a linear combination of vectors
- Define three tables and store them in advance

Takes as input a byte value and produces a column vector that is a function of the S-box entry for that byte value

- Implement using the table lookup operations, XOR operations per column per round

2. Find the key K
- E(K, 0x0123456789AB) = 0xFBD040D6DB9C and
- E(K, 0x9A6BCC10E84A) = 0xE5CBFFF7E08B

Reference no: EM131272964

Questions Cloud

State the reasons for applying to the philanthropy : Revise the given document.- Given the document is about:- State the reasons for applying to the Philanthropy and Voluntary Service, and what you would gain personally, professionally and academically be attending.
Describe the data breach incident of the data breach : Describe the data breach incident and the primary causes of the data breach. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed.
Describe one evidence claim for and claim against : Describe one (1) evidence claim for and one(1) evidence claim against your chosen topic. The topic is "What are the unconstructive and constructive impacts of technology on the teenagers"?
Explain the power of social influence based on the findings : Explain the power of social influence based on the findings of Milgram's experiment. Provide one (1) example of a situation you have been in where you felt you had to conform to someone or something. Indicate whether you felt you had to conform be..
Implement the encryption algorithm : Implement the encryption algorithm and - Express the matrix multiplication as a linear combination of vectors and Define three tables and store them in advance
Identify two human and technological protective measures : Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
Is there a maturational or developmental aspect to it : Is there a historical or cultural context to this? (I.e. Freud was his mothers favorite, as well as living and writing during repressed Victorian tines and WWI and WWII; Behavioral and CBT approaches evolved during a time that people wanted to mak..
What types of goals are suitable for diversity training : What types of goals are suitable for diversity training and How might a complete performance management system differ from our annual performance appraisals.
Critical importance of an executive : The market trend towards escalating executive compensation reflects the critical importance of an executive to an organization's long-term viability.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe best practices in cybersecurity

Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity.

  Describe how it applies to the realm of data communication

Write one to two paragraphs on each topic below, and describe how it applies to the realm of data communication. Also discuss what type of damage these computer infections can do to data in a computer.

  Describe the mandatory policies and processes

Describe the mandatory policies, processes, and procedures you would implement in order to maintain the lab environment and preserve evidence

  Temporary assistance for needy families

TANF is the public program responsible for offering cash assistance to low-income families with children. However, the sector has been challenged by numerous laws and limitations as to how the industry carries on it functions.

  Finding decryption function and recovered plaintext

If you receive the ciphertext message YPHDCRPBEQTAA, decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Trust computation in computer systems

Select and summarise an article from the University of Liverpool online library that addresses trust computation in computer systems. Analyse how trust is used in controlling access to resources. Evaluate the proposed solution used in emergent enviro..

  How does security play a major role in todays network design

How does security play a major role in today's network design? What is the biggest concern thread to data security? What is the best way to secure your network from data breaches?

  Theft of logins and passwords

Theft of logins and passwords

  Describe the packet-filtering router firewall system

Describe the Packet-filtering router firewall system, Screened host firewall system and Screened-Subnet firewall system.

  Difference between packet-filter firewalls and proxy filters

Explain at least two differences between packet-filter firewalls and proxy filters. Provide one example of a situation where you might need to use each type (two examples total).

  Access and read e-mail from government web sites

He wants to utilize a variety of electronic tablets to access and read e-mail from government web sites (Note: Coast Guard is dual-hatted -Department of Defense and Department of Homeland Security). He has been briefed on a variety of mobile devic..

  Define the concepts of symmetric key encryption

Define the concepts of symmetric key encryption, public key encryption, and hashing and explain which of these techniques are used for confidentiality and authentication.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd