What are some benefit of a feistel structure

Assignment Help Computer Network Security
Reference no: EM13309600

1.a) Describe the high level steps involved for decryption using a Feistel cipher.

b) Modify the pseudo code provided in the lecture notes that describe encryption using a Feistel network to do decryption. You need to actually rewrite the code. Use different font colors and comments to highlight the areas of the code you have changed.

c) What are some benefit(s) of a Feistel structure?

2.Recall the 3DES encryption logic is: C = E (K3, D(K2,E(K1, P)))
Where:
E = Encryption
D = Decryption
Kn= Key n
P = Plain text
C = Cipher text

Write the symbolic logic for the 3DES decryption. Describe the logic in a few sentences.

3.Assuming an initial implementation of your encryption system was done using DES. What issues would need to be addressed if you decide to upgrade to the 3DES algorithm? There are several issues to consider.

4.Your manager is considering purchasing a message authentication system. She is considering 3 different systems. One system uses MD5 hashing, another uses SHA1 hashing and the other system uses a brand new hashing algorithm called VSH (Very Smooth Hash). You have been asked to prepare an executive summary (i.e. clear and concise) that describes the attributes of each algorithm and the pros and cons. What would your recommendation be?

5. How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

Reference no: EM13309600

Questions Cloud

Would a tuition increase raise the rate of unemployment : Labor Supply. Catholic priests take a vow of chastity, forgoing marriage and intimate non-marital relationships. This question relates to the article posted on Angel
Philosophical origins-assumptions : From what philosophical view point has the Piaget's theory arisen, and on what assumptions is it founded?
Explain the order of the reaction with respect to sucrose : The following data was obtained on the rate of hydrolysis of 17% sucrose in 0.099 M HCl aqueous solutions at 35 C. What is the order of the reaction with respect to sucrose and the value of the rate constant k
The minimum power rating for each resistor : We have a 15-V source and a load that absorbs power and requires a current varying between 0 and 100mA. The voltage across the load must remain between 4.7 and 5.0 V for all values of load current. Design a voltage-divider network to supply th..
What are some benefit of a feistel structure : How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.
Explain what other substance(s) found in chocolate bear : What other substance(s) found in chocolate bear(s) a strong structural resemblance to caffeine? Draw the structures of these substances and point out the similarities.
Draw a cross-section of the specified pavement design : The roadway to be constructed is 3 miles long and 60 feet wide. • The following pavement design specifications have been issued: - Base coarse: 6" DGA - Stabilized base: 4" - Bottom coarse of asphalt: 3" - Top coarse of asphalt: 2"
We give sinusoidal voltage across a capacitor the current : When we give sinusoidal voltage across a capacitor the current across it has 90 degree phase lag. Then this means as voltage increases(sine) the current decreases(cosine)[in 1st quadrant]....Whether this indicates capacitor exhibits negative r..
Explain how many ml of 0.450 m naoh are needed to titrate : How many mL of 0.450 M NaOH are needed to titrate 25.0 mL solution of 0.250 M FeCl3 solution? FeCl3 aq + 3NaOH arrow to Fe(OH)3 aq +3NaCl aq

Reviews

Write a Review

Computer Network Security Questions & Answers

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Computer forensics investigation

After a computer forensics investigation, you require to meet with your section or group of fellow investigators and critique the case in an effort to improve your work.

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Calculate an rsa signature on a long message

Would it be reasonable to compute an RSA signature on a long message by ?rst computing what the message equals mod n, for some ?xed n and then signing this computed value only. Why or why not?

  Secure communication if organization uses symmetric cipher

An organization has 300 members. It is desired that each member of the organization be able to communicate securely with any other member. The organization uses a symmetric cipher.

  Internet working equipment

Discuss and explain any of the internet working equipment that you have experience with and the advantages and disadvantages of them.

  Find at least four sites that offer malware listings

Search a number of antivirus companies websites and find at least four sites that offer malware listings and compare their latest malware lists

  Network engineer, you are presented

As the network engineer, you are presented with the following, 172.16.0.0. / 18 IP addressing information and are asked to identify all of the possible subnet ID from the list below, assuming that the /18 subnet is used throughout the network. (Choos..

  Explain the fundamentals of packet switching

Explain the fundamentals of Packet Switching and how it works and explain the fundamentals of Circuit Switching and how it works.

  Project management to suppress the dissemination

The general method is to encourage timely communication of news to project stakeholders. However, can you envisage conditions where it may be necessary,

  Access control models

Compare and contrast access control models. Select an access control model that best prevents unauthorized access for each of the five scenarios given below

  Uniform law for computer information transactions

After more than ten years of proposals, revisions and re-revisions, the National Conference of Commissioners on Uniform State Laws at long last voted to adopt the Uniform Computer Information Transactions Act on July 29.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd