Calculate the cipher text for the plaintexts provided

Assignment Help Computer Engineering
Reference no: EM131673075

Cryptography

Given the following S-Boxes:
S1 = [ 15 10 2 5
           8 4 11 6
           1 0 14 7
           9 3 12 13 ];
S2=  [ 4 0 15 10
           8 9 7 13
           5 1 6 11
           2 3 14 12 ];

Implement the following 16 bit cipher:

Plain text:

Key: P = [a1 a2 a3 a4] where a1..a4 are 4 bit each

K = [k1 k2 k3 k4] where k1..k4 are 4 bit each

Cipher text: C = E(p) = [ S1(a2⊕k1) S2(a4k3) S1(a1⊕k2) S2(a3⊕k4) ]

Example: P = [1000 1100 1101 0110], K = [0001 0011 0010 1111]

C = [S1(1101) S2(0100) S1(1011) S2(0010 ] = [6 0 12 5]

= [0110 0000 1100 0101]

1. Draw a chart which shows the relation between P, C, and K according to this cipher.

2. Implement the above mentioned cipher and calculate the cipher text for the plaintexts provided in Appendix I and the key provided in Appendix II.

3. Measure the avalanche effect for the encryption algorithm using the provided plaintexts. Change 1 bit in the input and calculate the % of how many bits are changed in the cipher text. Repeat this for the provided 10 plaintext inputs; this will give 10 x 16 rounds. Calculate the average avalanche effect.

4. Suggest a change to the encryption algorithm to enhance the avalanche effect. Repeat 3 and comment on your finding.

Attachment:- Appendix.rar

Verified Expert

This assignment deals with the avalanche effect and effect of change in the single bit in the percentage of the avalanche effect. It demonstrate the ciphering process in terms of the chart

Reference no: EM131673075

Questions Cloud

What are the assumptions for the one-way between-subjects : What are the assumptions for the one-way between-subjects ANOVA that the authors are referring to?
Explain the pairwise comparisons and effect size : Pairwise comparisons, effect size, and significance. Volker (2006) stated the following in an article describing recommendations for the use of effect size.
What populations or samples were studied : Was the research qualitative, quantitative, or mixed methods? Why and why not? How was the data collected?
Prepare the statement of stockholders equity at end of year : Prepare the statement of stockholders' equity at the end of the year (December 31). Prepare the income statement for Longhorn Corporation.
Calculate the cipher text for the plaintexts provided : INCS-741 Cryptography - Draw a chart which shows the relation between P, C, and K according to this cipher. Implement the above mentioned cipher
Problem-life satisfaction among sport coaches : Life satisfaction among sport coaches. Drakou, Kambitsis, Charachousou, and Tzetzis (2006) tested differences in life satisfaction among sport coaches.
Explain the impacts on policy brief health problem : Explain the Impacts on Policy Brief Health Problem.Discuss about the Environmental factors of water and food insecurity.
Was the sample size per group equal in all groups : Computer anxiety and usage frequency. Using a rating scale, Tekinarslan (2008) measured computer anxiety among university students who use the computer.
Describe the characteristic for each cover type : Discuss the spectra you generated in (6) in the following aspects: Describe the characteristic for each cover type

Reviews

len1673075

10/9/2017 7:11:17 AM

:Implementation of cipher along with the calculation of cipher text for plain text. Measuring the avalanche effect for the algorithm and the suggestion of encryption algorithm for enhancing avalanche effect. Providing answers to the questions provided in the document.

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd