Denote the des encryption of the plain text

Assignment Help Computer Network Security
Reference no: EM13186358

a) Let DESk(P) denote the DES encryption of the plain text P by the key K.

i) If we set K to be the key consisting of all zeroes, explain why encrypting twice with this key for DES has the same effect as encrypting then decrypting. Equivalently, account for the following property when using the all-zero key

DESk(DESk(P) = P

ii) Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.

b) Let b' denote the complement of a sequence of bits, so that for 780_DES encryption.png example. Then considering the round structure of DES, show that

251_DES encryption1.png

In other words, complementing the key, plaintext and ciphertext produces the same ciphertext as when none of these values is complemented.Hint: Use the following property of the XOR function x + x = 0.

Reference no: EM13186358

Questions Cloud

Find the volume of the solid whose base is the region : Find the volume of the solid whose base is the region bounded by y=x^{6}, y=1, and the y-axis and whose cross-sections perpendicular to the y axis are equilateral triangles.
How many players were there : After winning the championships, all Detroit Pistons teammates exchanged "high-fives."Altogether there were 66 high-fives. How many players were there?
What happens to the price of u.s. goods in mexico : Why would a country (for example, China) choose to keep their currency relatively pegged to the U.S. dollar. If the U.S. dollar were to appreciate considerably against most currencies, what would be the effect on Chinese exports to countries othe..
What are the dimensions and maximum area : A rectangular is to be fenced off and divide in two by another fence parallel to one side of the playground. 720 feet of fencing is used. what are the dimensions and maximum area.
Denote the des encryption of the plain text : Find another key that also has this property, and explain the structure of the DES key schedule that permit such keys to exist.
Real gdp rose by what percent : Suppose nominal GDP in 2005 was $15 trillion, and in 2006 it was $16 trillion. The general price index in 2005 was 100, and in 2006 it was 103. Between 2005 and 2006, real GDP rose by what percent
What is the maximum voltage produced by the system : The electrical signal created by a piece of test equipment at a specific point in time is described by the function Vinst(t) = 12 × sin(360 × 60 × 6.3 + 79). What is the maximum voltage produced by the system.
What is the standard deviations : A factory employs several thousand workers, of whom 20% are Hispanic. If the 20 members of the union executive committee were chosen from the workers at random, the number of Hispanics on the committee would have the binomial distribution with n =..
A textile manufacturer concerned : A textile manufacturer concerned about its survival in the world marketplace has set as its goal, "To increase training and educational opportunities for its employees during the next twenty-four months." Why is this corporate objective ineffective

Reviews

Write a Review

Computer Network Security Questions & Answers

  Anti-virus applications

Should an organization's anti-virus policy specify that anti-virus applications will be configured to quarantine infected files instead of deleting them automatically? Why or why not?

  New technologies using sophisticated anti-copying measures

Which is more probably to be effective in protecting intellectual property in digital media like CDs and DVDs: tougher copyright laws or new technologies incorporating more sophisticated anti-copying measures?

  Attributes of company organizational culture

Some attributes of a corporation's organizational culture are so obvious that even an independent observer can feel them. Provide an example of such an observation and describe what cultural phenomenon it defines.

  Commutative and ecb mode

Give an example to show that the group of permutations S5 is not commutative and ECB mode with block length 3 and the permutation cipher for the given operation

  Cost-of-use issues are of client-dominant local area network

What technology and cost-of-use issues are associated with a client-dominant local area network? Think about what happens as the network grows in size.

  Methods to combat technical-nontechnical attacks in wan

Explain a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks.

  Computer security incident

Locard's Exchange Principle, electronic crime scene, modules or DLLs a process, router forensics, Configuration and user, Local logs process and memory, Network Information, File system, Portray the NTP vulnerability of some Cisco IOS routers

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Describe how to select public and private keys

Describe the RSA Public Key Encryption Scheme in detail. In particular, how do encryption and decryption algorithms work? Describe also how you select public and private keys.

  Strategies and recommendations to the cio

Explain in detail why you believe the risk management, control identification, and selection processes are so important, specifically in this organization and draft a one page Executive Summary that details your strategies and recommendations to t..

  Generates alternative message that has hash value

Generates an alternative message that has a hash value that collides with Bob's original hash value. Show a message that Alice may have spoofed, and demonstrate that its hash value collides with Bob's original hash."

  Security infrastructure and protocols

Compare and contrast the trust models for public keys used in PKI and PGP, and assess the statement that a PKI is a "top-down" approach to trust and PGP is a "bottom-up" approach to trust.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd