Problem on encryption using a one-round version of des

Assignment Help Computer Engineering
Reference no: EM132381

Question

This problem supplies a arithmetical example encryption using a one-round version of DES. We start with the similar bit pattern for the key K and plaintext, namely-

in hexadecimal notation: 0 1 2 3 4 5 6 7 8 9 A B C D E F
in binary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 0100 1101 1110 1111

(1) obtain K1, the first-round subkey.

(2) Obtain L0, R0.

(3) Expand R0 to get E[R0], where E[.] is expand function of DES. (Refer to Term Project)

(4) Analyse A = E[R0] K1 .

(5) Group 48-bit result of (4) into sets of 6 bits and evaluate corresponding Sbox substitutions.

(6) Concatenate results of (5) to get a 32-bit result, B.

(7) concern the permutation to get P(B).

(8) Calculate R1 = P(B) L0

(9) Write down ciphertext.

Reference no: EM132381

Questions Cloud

Write proper sequence in design of a video rental database : Write proper sequence in design of a video rental database
Write c program ''myls'' that functions like unix command ''ls'' : Write C program 'myls' that functions like unix command 'ls'.
Is it right that rbac functionality is complicated : Is it right that RBAC functionality is complicated
What is meant by user cantered design : What is meant by ‘user cantered design'
Problem on encryption using a one-round version of des : Problem on encryption using a one-round version of DES.
How to concern about personal privacy, efficiency : How to concern about personal privacy, efficiency
Propose a wiring plan for network servers : Propose a wiring plan for network servers.
Describe how controls and warning signs : How would you identify ergonomic problems associated with the use of visual display units? Describe the measures which can be taken to eliminate these problems. What is a Job Safety Analysis? Describe briefly the steps which should be taken to c..
Classify the use and location of firewalls : Classify the use and location of Firewalls Categorize the use and location of IPS or IDS where necessary.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Find minimal cover and identify all possible candidate keys

Find minimal cover and identify all possible candidate keys - Functional Dependencies

  Write pseudo code - program and draw flow chart

Write pseudo code, program and draw flow chart for programs

  Implement needham-schroeder protocol using python

Implement Needham-Schroeder protocol using python

  What will be the exercise ratio of men and women

What will be the exercise ratio of men and women? Results indicated that women averaged 2 hours per week and men averaged 1.25 hour per week.

  Calculate average time in a linear search

Calculate average time in a linear search

  How to enlarge the size of the array

How to enlarge the size of the array? Enlarge the size of the array to 25. Driver will start with 10 objects in it other than has provision for up to 15 new objects. You can use java any API.

  Calculate the component voltages

Input voltage will be a step voltage that is 0 volt before time t = 0 and V in

  Explain how an enterprise would use 3g, 4g and wwan

Explain how an enterprise would use 3G, 4G and WWAN Use at least three quality resources in this project.

  Explain networking of cis 505

Explain networking of CIS 505? 1. Network Neutrality 2. Web2.0

  How to run and modify marie program

How to run and modify marie program Include a decision before storing and outputing result. If  value of the result is not positive (so zero or negative), set  Result value to the value ZERO (0)

  What are prospect trends for healthcare informatics

What are prospect trends for healthcare informatics.

  What are three goals of safety in computing?

What are three goals of safety in computing?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd