Description of des encryption feistel structure algorithm

Assignment Help Computer Network Security
Reference no: EM13310184

Let DES(x, K) represent the encryption of plaintext x with key K using the DES cryptosystem. Suppose y = DES(x, K) and y’ = DES(c(x), c(K)), where c(·) denotes the bitwise complement of its argument [i.e. changing all the 1’s to 0’s and all the 0’s to 1’s. 

For example, if t = 10000110, then c(t) = 01111001; equivalently, c(t) = t ? 11111111]. 

Prove that y’ = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented). [This is Question 3.3 of the textbook. Hint: this can be proved using the “high-level” description of DES encryption Feistel structure algorithm.

Reference no: EM13310184

Questions Cloud

Design continuous slab showin using aci moment coefficients : The slabs are to be built integrally with the end supports, which are spandrel beams. fy = 60,000 psi, fc' = 4000psi normal-weight concrete. Clear spans are 15 feet, 18 feet and 15 feet. with the longitudal span of 38 feet.
Compute the weight of the configuration : A sample consisting offive molecules has a total energy 5£. Each molecule is able to occupy states of energy j£,with j= 0,1,2,···,oo. (a) Calculate the weight of the configuration in which the molecules are distributed evenly over the available st..
Find the rms current in the primary coil : A transformer has 5.00 E4 turns in its primary coil and 7.00 E3 turns in its secondary coil. find the rms current in the primary coil
Were the rumble strips effective in reducing average speeds : A before-and after speed study was conducted to determine the effectiveness of a series of rumble strips installed approaching a toll plaza to reduce approach speeds to 40 mi/h.
Description of des encryption feistel structure algorithm : Prove that y’ = c(y) (i.e., if we complement the plaintext and the key, then the ciphertext is also complemented). [This is Question 3.3 of the textbook. Hint: this can be proved using the “high-level” description of DES encryption Feistel structure ..
Estimate the gas pressure : 2.90 mol of gas is at a temperature of -180 C and fills a 3.90 L container. What is the gas pressure
Determine what are the discharge and the flow veloctiy : An 18in. diameter sewer is placed on a grade of 1.5ft/1000ft. What are the discharge and the flow veloctiy when the pipe is full
Compute the temperature of the solution after the cacl2 : calculate the temperature of the solution after the CaCl2 dissolves. (Assume no heat is lost to the container or the surroundings and the specific heat of the solution is the same as that of water.)
Calculate the angular velocity w of the cylinder : The solid circular disk of uniform thickness is released from rest on the 60-degree incline. Calculate the angular velocity w of the cylinder and the magnitude v of the velocity of its center C after it has moved 10 ft down the incline.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explaining ethical issues and the abuse of privacy

Search the Internet for good examples of cases that involve ethical issues and the abuse of privacy. Provide a review and analysis of your findings.

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  How would you divide up your network to satisfy requirements

You are an ISP that has been assigned a class B network with the address 145.34.0.0. You know you will service 200 to 250 small companies.

  What is the single most important new technology

Need a research paper on "What is the single most important new technology that has affected digital forensics in the last five years and why?" The paper has to be well referenced.

  Show strategies to prevent such cyber warfare attack

Need a 1000 word paper on the various recent/news on the United States (particular the group known as Anonymous and Lulzsec). Also need the various strategies to prevent such cyber warfare attacks and prevention techniques.

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Explain advantages about solution of type of key

At ABC Institute, researchers are unsure about type of key (Asymmetric or Symmetric) to be used. Formulate possible solution and explain advantages and disadvantages of any solution employed.

  Dealing with computer security

Computer Security is very important for organizations and if not impliedproperly it may have a very big impact on its overall working system.

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  How the database and web services can be protected

Study how the database and web services can be protected against unauthorized use while maintaining access for authorized users by using firewall and VPN techniques

  Encryption and decryption of the vigenere cipher

Implement both encryption AND decryption of the Vigenere cipher with 26 English letters and 1 space character "_" in its tableau as shown in class.

  How must one-s privacy be legally protected or secured

What does privacy mean to you? Is privacy a right or a privilege? How should one's privacy be legally protected or secured, especially when using the Internet?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd