Calculate the average avalanche effect

Assignment Help Computer Network Security
Reference no: EM131680215

Assignment

Given the following S-Boxes:

S1= [    15        10        2

5

 

            8          4          11

6

 

           1          0          14

7

 

           9          3          12

13

];

S2= [    4          0          15

 

10

 

            8          9          7

13

 

           5           1         6

11

 

           2          3          14

12

];

Implement the following 16 bit cipher:

Plain text:

Plain text:

Key:

P = [a1 a2 a3 a4] where a1..a4 are 4 bit each

K = [k1 k2 k3 k4] where k1..k4 are 4 bit each

 

Cipher text:

C = E(p) = [ S1(a2k1) S2(a4k3) S1(a1k2)

S2(a3k4)

]

Example: P = [1000 1100 1101 0110], K = [0001 0011 0010 1111]

               C = [S1(1101) S2(0100) S1(1011) S2(0010 ] = [6 0 12 5]

                                                                                      = [0110 0000 1100 0101]

1. Draw a chart which shows the relation between P, C, and K according to this cipher.

2. Implement the above mentioned cipher and calculate the cipher text for the plaintexts provided in Appendix I and the key provided in Appendix II.


3. Measure the avalanche effect for the encryption algorithm using the provided plaintexts. Change 1 bit in the input and calculate the % of how many bits are changed in the cipher text. Repeat this for the provided 10 plaintext inputs; this will give 10 x 16 rounds. Calculate the average avalanche effect.

4. Suggest a change to the encryption algorithm to enhance the avalanche effect. Repeat 3 and comment on your finding.

Appendix I: Test Plain Text

1001 0100 0110 0110

0010 1001 1100 0010

0101 1100 1110 0010

1001 1100 0010 0111

1011 1101 1101 1111

0001 1101 0001 0011

1110 0001 1100 0011

0011 1110 0000 0010

0101 0011 1101 1011

1100 0010 0111 0100

Appendix II: Test Key

1010 0010 0011 1010

Verified Expert

This assignment deals with the avalanche effect and effect of change in the single bit in the percentage of the avalanche effect.It also include the program that describe the entire functionality of avalanche effect

Reference no: EM131680215

Questions Cloud

How the information systems function supports a business : What major features of a business are important for understanding the role of information systems?
Find the probability that no kings appear before first ace : A deck of cards is shuffled well. The cards are dealt one by one, until the first time an Ace appears. Find the probability that no kings, queens, or jacks.
What is personal daily fiber recommendation : a. What is your personal daily fiber recommendation? b. What is the current average daily intake of fiber for adults according to the research?
Calculate the amount of depreciation expense recorded : Calculate the amount of depreciation expense recorded in Rose Company's 2021 income statement related to the machine. Do not use decimals in your answer
Calculate the average avalanche effect : INCS-741 Cryptography - Draw a chart which shows the relation between P, C, and K according to this cipher - Implement the above mentioned cipher and calculate
Find probability that the hand contains cards of every suit : A random 13-card hand is dealt from a standard deck of cards. What is the probability that the hand contains at least 3 cards of every suit?
Calculate the book value of the equipment at december : On January 1, 2017, ABC Company purchased a large piece of equipment for $285,000. Calculate the book value of the equipment at December
Find the probability of each of the given possibilities : A random 5-card poker hand is dealt from a standard deck of cards. Find the probability of each of the following possibilities (in terms of binomial coecients).
Explain why employees resist organisational change : Explain why employees resist organisational change. Discuss ways Golden Sun can alleviate employee resistance to change

Reviews

inf1680215

1/17/2018 4:48:51 AM

Money is not the criteria.just share the news about assignmnt..so you guys deliverng the solution between 12 to 20hrs,right?..sorry for asking too many questions,i totally denpended on u.so i dont had choice everything is good,so u guys used 2 similar keys & encrypted the plain text with key and after getting cipher text,encrypted again this cipher with the same key.is it right?? Thanks you so much for your help, you guys are super helper. hahaha thanks

inf1680215

12/18/2017 5:19:15 AM

[C= Ep(Ep(P, K1), k2)] everything is good, so u guys used 2 similar keys & encrypted the plaintext with key and after getting cypher text, encrypted again this cypher with the same key.is it right?? why don't u write the code for 3rd question too..just adding extra lines of code to which was given.which is the calculation of avalanche effect of bits changed in every plain text(16rounds of every plaintext) Yes, you can use either use the same key or different key The code for 3rd and 4th are similar. You just need to comment out the key part.

len1680215

10/14/2017 6:40:26 AM

I just need answer for 4th ques & program which output has to calculate avalanche effect Implement the above mentioned cipher and calculate the cipher text for the plaintexts provided in Appendix I and the key provided in Appendix II.

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd