Key generation of the simplified des algorithm

Assignment Help Computer Network Security
Reference no: EM13190763

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data, which you studied briefly in T215B. This task aims to assist you in learning more about the DES. Your answer should be as report which starting with introduction and ending with conclusion, the report should be within 1000 - 1200 words (long report, you should adhere to word count), the report should include sections and sub suctions, and at least one figure or table, your report must have proper citations and references. The body of your report should answer the following questions:

1. Define DES?

2. What is the history of DES?

3. Describe the key generation of the Simplified DES algorithm? It is preferable to answer it as a list of points.

4. Describe Simplified DES algorithm? It is preferable to answer it as a list of points.

5. What are the advantages and disadvantages of DES - at least 2 advantages And 2 disadvantages?

6. Is DES secure mechanism to protect electronic data at the present time, justify your answer?

Reference no: EM13190763

Questions Cloud

The process of audience adaptation : The process of audience adaptation is over by the time a speaker starts delivering the speech.
What is the expected number of missiles that will fire : From a lot of 10 missiles, 4 are selected at random and fired. If the lot contains 3 defective missiles that will not fire, what is the probability that
Amphibolite is a foliated metamorphic rock : Amphibolite is a foliated metamorphic rock composed principally of hornblende and plagioclase. How does it form
What is the spot exchange rate : Suppose 90-day investments in Britain have a 6% annualized return and a 1.5% quarterly (90-day) return. In the U.S., 90-day investments of similar risk have a 4% annualized return and a 1% quarterly (90-day) return. In the 90-day forward market.
Key generation of the simplified des algorithm : What is the history of DES and describe the key generation of the Simplified DES algorithm
How many children admissions were collected : adult admission is $20 and children admission is $11. during one day, 1551 adult and children admissions was collected and $24,441 admission fees collected. how many children admissions were collected?
State the polyphenol and draw the mechanism arrows : Predict just the first step that might occur between the polyphenol shown below and Na2CO3
Find out how long the rocket will take to hit : Use the quadratic formula to find out how long the rocket will take to hit the ground after it is launched. Round to the nearest tenth of a second.
Independent nation-states : What accounts for the rather late emergence of African countries as independent nation-states? Is there something peculiar about Africa that delayed its drive for independence? (Begin with a specific African country, and argue your case.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  What is the ciphertext generated by encryption of character

What is the ciphertext (in binary form) generated by the encryption of character D? How is plaintext for this encrypted D recovered?

  Expected time to find user passwords by dictionary attack

Suppose that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  How to protect communications by eavesdropper

Assume that evil Charlie eavesdropped on Bob's message to server. How can he with the help of his equally evil buddy Don, extract key K that Alice and Bob are using to protect their communications?

  Eulers theorem problem

Any cipher system that needs to avoid encrypting certain messages should be avoided like the plague - what do you have to say for yoursel

  Desktop publishing system used to produce documents

Consider a desktop publishing system used to produce documents for various organizations. Give an example in which system availability is the most impotent requirement. Please be very brief.

  Benefits of an information system

Suppose monetary advantages of an information system of $50,000 the 1st year and increasing benefits of $5000a year of the next four years year 1=$50,000;

  What is the value of shared secret key

You have secretly picked the value SA = 17. You begin the session by sending Bob your calculated value of TA. Bob responds by sending you the value TB = 291. What is the value of your shared secret key?

  Write vulnerabilities and methods of securing rpc

TCO C states "Given a computer network for data transmission, identify and analyze possibilities for loss or modification of data. Write down the vulnerabilities of RPC? What are the present methods of securing RPC?

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  It infrastructure groups

Information Technology infrastructure groups are often responsible for direct customer interaction and associated customer service.

  Importance of presentation and content in presentation

There has been a discussion for years on which is more important, content or presentation. This is very important when thinking about creating a PowerPoint slideshow.

  What password protection measures taken system administrator

What password protection measures are normally implemented by system administrators, operating systems, and security services? Describe the pros and cons of enabling audits of resource accesse

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd