Explain the bit-level encryption, Computer Networking

Assignment Help:

Q. Explain the Bit-Level Encryption?

Bit-Level Encryption

- Data is divided into blocks of bits then altered by encoding/decoding, permutation, substitution, exclusive OR, rotation, and so on

- Encoding/decoding - decoder changes an input of n bits into an output of 2n bits; encoder has 2n outputs and only n outputs

551_Explain the Bit-Level Encryption.png

- Permutation - transposition at the bit level

- Straight permutation - number of bits in input and output are preserved

- Compressed permutation - number of bits is reduced

- Expanded permutation - number of bits is increased

- May be implemented in hardware circuitry to be performed very quickly (referred to as P-boxes)


Related Discussions:- Explain the bit-level encryption

What is bookmark, What is Bookmark A list of pages a user likes to f...

What is Bookmark A list of pages a user likes to frequently visit. Netscape® Navigator and Explorer® have a "bookmark" menu item which allows users to add favourite sites vi

What are some drawbacks of implementing a ring topology, What are some draw...

What are some drawbacks of implementing a ring topology? In case one workstation on the network varies a malfunction, it can bring down the whole network. Another drawback is t

How do you disable cdp on the whole router, By using this command Router(c...

By using this command Router(config)# no cdp run we can disable CDP on the entire Router

Describe about cryptography, Q. Describe about Cryptography? - Some med...

Q. Describe about Cryptography? - Some media cannot be protected from unauthorized reception (or interception) - Encryption involves transforming the original information in

Ospf - open shortest path first , OSPF ( open Shortest Path First) Open...

OSPF ( open Shortest Path First) Open shortest  path first  is a routing  protocols  developed for internet protocols networks by the  interior  gateway protocols working group

Network layer of the osi responsible for, What is the Network Layer of the ...

What is the Network Layer of the OSI responsible for? Ans) The Network Layer routes data from single node to another sends data from the source network to the destination networ

Authentication in ppp - point to point , Authentication in PPP PPP can ...

Authentication in PPP PPP can support  authentication operations at the  beginning of a connection. In some  cases reauthentication is also  possible  during  a session.  Endpo

Concurrently read concurrently write (crcw), It is one of the models based ...

It is one of the models based on PRAM. In this model, the processors access the memory locations concurrently for reading as well as writing operations. In the algorithm, which use

Dns spoofing - domain name server, DNS spoofing This process is genera...

DNS spoofing This process is generally refers to the process of responding a DNS request that was supposed to implement for another server. This can be in the case where the s

Write examples of the transport layer, Example of transport layer are:- ...

Example of transport layer are:- a) TCP is connection oriented. b) UDP is connectionless

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd