Design and implement modified des cipher

Assignment Help Basic Computer Science
Reference no: EM13935866

Design and implement Modified DES cipher as mentioned below and observe the Avalanche effect. The number of rounds allowed from one to five only. Observe the Avalanche effect by c hanging the bits of the plain text. That is Once the first round is completed, change 1 bit of the plain text and observe the change in cipher text bits. Continue the analysis by changing half of the bits in the plain text. Module: Decryption Phase Task 1: Generate an input sequence 64-bit input number for decryption Task 2: Implementing IP-1 Inverse Initial Permutation function on 64-bit number Task 3: Implementing Expansion function on 32 bit number to get 48-bit number Task 4: Implementing XOR on 48 bit with Round 1 key Task 5: Implementing S- Box function on 48 bit number to get 32 - bit number Task 6: Implementing Permutation function on 32- bit Task 7: Generate the output from Decryption phase

Reference no: EM13935866

Replay television programs received from cable

Personal Video Recorders (PVRs): Personal video recorders (PVRs) are digital video recorders used to record and replay television programs received from cable, satellite, or

Discuss the advantages that large multinationals

Discuss the benefits / advantages of Asset accounting in SAP Financials. General discussion and then show how 2 Multi-Nationals have benefited based on these advantages/bene

Given the churn data for training and test

Given the churn data for training and test, develop models using different techniques i.e. "Logistic Regression", "Decision Trees", "Random Forests" and "Neural Networks".

Descriptor describes a memory segment

The above segment descriptor describes a memory segment in terms of its start address, its size and whether it is ALLOCATED or FREE. This descriptor is part of a list (conta

Use the resources from careers, enterprise

You are required to carry out secondary research on a specific topic for your award using the University's Learning Centre resources, with the objective of writing a short r

Methodology and system analysis

I have uploaded the assignment I have done n I need you to continue writing a research report on it.i am attaching a sample report for your reference Report length: 5000word

According to the lecture topics and materials

Select a particular network security or associated topic according to the lecture topics and materials. You need to conduct extensive reading, then write a report based on y

Report on the security implementation

Assignemnt 3 -- Research report/Project report needs a assignment of final research report on the network security topic Privacy Information Management . Have uploaded the

Reviews

Write a Review

 
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd