Encryption algorithm to enhance the avalanche effect

Assignment Help Computer Network Security
Reference no: EM131216335

Any Encryption algorithm (like caesar cipher algorithm)should be used and implemented for the information given in the document.

Cryptography

Assignment

Given the following S-Boxes:

S1= [ 15        10            2          5

8          4          11        12

1          0          14        7

9          3          6          13        ];

S2= [   4          5          15        10

8          9          7          13

0           1          6          11

2          3          14        12        ];

Implement the following 16 bit cipher:

Plain text:        P = [a1 a2 a3 a4] where a1..a4 are 4 bit each

Key:                K = [k1 k2 k3 k4] where k1..k4 are 4 bit each

Cipher text: C = E(p) = [ S1(a2⊕k1) S2(a4⊕k3) S1(a1⊕k2) S2(a3⊕k4) ]

Example: P = [1000 1100 1101 0110], K = [0001 0011 0010 1111]

C = [S1 (1101) S2 (0100) S1 (1011) S2 (0010]                   = [12 5 6 0]

                                                                                               = [1100 0101 0110 0000]

1. Draw a chart which shows the relation between P, C, and K according to this cipher.

2. Implement the above mentioned cipher and calculate the cipher text for the plaintext provided in Appendix I.

3. Measure the avalanche effect for the encryption algorithm using the provided plain text.

Change 1 bit in the input and calculate the % of how many bits are changed in the cipher text. Repeat this for the provided 10 plaintext inputs; this will give 10 x 16 rounds. Calculate the average avalanche effect.

4. Suggest a change to the encryption algorithm to enhance the avalanche effect. Repeat

3 and comment on your finding.

Appendix I: Test Plain Text

1001 0100 0110 0110

0010 1001 1100 0010

0101 1100 1110 0010

1001 1100 0010 0111

1011 1101 1101 1111

0001 1101 0001 0011

1110 0001 1100 0011

0011 1110 0000 0010

0101 0011 1101 1011

1100 0010 0111 0100

Appendix II: Test Keys

0101 0100 1001 1100

1010 0010 0011 1010

Verified Expert

The assignment was to implement a Caesar Cipher like block cipher. A 16-bit substitution cipher algorithm was implemented and the Avalanche effect was computed against the given plain texts. The assignment further required an enhancement of the given algorithm to increase the Average Avalanche Effect. The enhance was done using Multiple Encryption.

Reference no: EM131216335

Questions Cloud

The profit on consignments for the consignee is : The Petunia Corporation grows and consigns flowering plants to retailers. The consignee receives a sales commission of 20%. Also, he is paid to water and care for the plants in his possession. Dead plants are discarded but cannot exceed 15% of the pl..
Define a discrete time random process : Let Wn be an IID sequence of zero-mean Gaussian random variables- Define a discrete-time random process - Find the mean function. - Find the autocorrelation function.
What can you say about the location of the groups : If the Tukey HSD critical value is 18, what can you say about the location of the significant difference between the groups?
Interest on the weighted average capital balance : Adams, Brown, and Collins are partners in a sporting goods outlet. The business began operations on January 1, 19x1, with Adams investing $10,000, Brown $20,000, and Collins $26,000. Adams withdrew $4,000 on April1, Brown $6,000 on May 1 and $6,000 o..
Encryption algorithm to enhance the avalanche effect : Draw a chart which shows the relation between P, C, and K according to this cipher - Implement the above mentioned cipher and calculate the cipher text for the plaintext provided in Appendix I.
Describe three optimal decision rules for katrinas candies : Create three optimal decision rules for Katrina's Candies (e.g., whether to hire more staff or hire temporary workers to meet production schedules).
Preferred dividends-options and convertible debt : “Earnings per share” (EPS) is the most featured, single financial statistic about modern corporations. Daily published quotations of stock prices have recently been expanded to include for many securities a “times earnings” figure that is based on EP..
Net income is shared on basis of average capital balances : Tom and Jerry formed a partnership at the beginning of year 19x5 by investing $30,000 and $50,000, respectively, on January 1, 19x5. Tom invested an additional $15,000 on March 1, and Jerry invested an additional $5,000 on August 1. If net income is ..
Explain applications of the knowledge that you have learned : Propose two applications of the knowledge that you have learned in this course to your current or a future position. Provide a rationale for your response. Create a list of three best practices to follow in the field of managerial economics and gl..

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd