Details of the f routine of the des algorithm

Assignment Help Basic Computer Science
Reference no: EM13935487

Question 1

In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.

Question 2
Using Figure 1, write the algorithm of the DES encryption (including the missing step in Q1) in pseudocode.

Question 3
Figure 1 also shows three routines/modules (IP, F and FP) with input (plaintext) and output (ciphertext) in the main DES cryptosystem. Write the algorithm for: IP and FP.

Question 4
Figure 2 shows the details of the F routine of the DES algorithm. Write the algorithm of the F routine in pseudocode; 6

Question 5
The F routine consists of Question 1 (1%; not more than 0.5 page)
In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.

Question 2 
Using Figure 1, write the algorithm of the DES encryption (including the missing step in Q1) in pseudocode.

Question 3
Figure 1 also shows three routines/modules (IP, F and FP) with input (plaintext) and output (ciphertext) in the main DES cryptosystem. Write the algorithm for: IP and FP.

Question 4
Figure 2 shows the details of the F routine of the DES algorithm. Write the algorithm of the The F routine consists of 3 lookup tables:E-table, S-Box and P-Box. Using the Internet/Library resources, find these tables and summarise in a few lines what the tables are all about. For each lookup table, give an example of input and the resulting output.

Question 6
However, Figure 2 does not show how Subkey (48 bits) is generated from the key-mixing(also known as subkey generation) stage. Use the Internet/Library Resources to find more about the key-mixing stage and write in pseudocode steps the algorithm of this key-mixing
stage.

Question 7
Deriving from Figure 1 (including the missing step from Q1), show the steps in pseudocode how DES decryption works.

Reference no: EM13935487

Questions Cloud

Inherently insecure for sensitive professional : Networks are inherently insecure for sensitive professional and personal data. Still we use networks for sharing data. How to deal with protecting data in an insecure network environment that is the topic of discussion of this report. In this repo..
Organisations operating in a global market : What trends do you think are impacting HR today for organisations operating in a global market?
What motivates a government to establish in credit markets : Government programmes. What motivates a government to establish/intervene in the credit markets? Impact of a financial crisis. What steps should Brunch take if a crisis occurs in country X which is a major exporting destination for Brunch Ltd?
Create a trade crisis between the uk and russian firms : Explain how the cancellation of the L/C could create a trade crisis between the UK and Russian firms. how an irrevocable L/C would normally facilitate the business transaction between the Russian importer and Channel Traders.
Details of the f routine of the des algorithm : In Figure 1, there is one step missing between the F routine and the FP routine. Find out and explain what the missing step is.
How does the fungi benefit by being saprophytic or parasitic : Explain why fungi are characterized as being either saprophytic or parasitic. How does the fungi benefit by being saprophytic or parasitic?
How many generations will it take for culture to contain : How many generations will it take for the culture to contain more than 30,000 cells/ml? How long, in hours, will it be before the culture contains more than 30,000 cells/ml? Show your calculations.
What is the expected effective yield of investment portfolio : What is the expected effective yield of the investment portfolio? Based on the expected effective yield for the portfolio and the initial investment amount of £15 million, determine the annual interest to be earned on the portfolio.
Determine financing portfolio composition for kents branch : Determine the financing portfolio composition for Kent's southern branch that would minimize the expected effective financing rate while satisfying the restriction imposed by the parent.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use bcd to encode the decimal number

Find the decimal integer that corresponds to each interpretation and Perform the subsequent operations:

  Create method that prints a rectangle of characters console

Create a method that prints a rectangle of characters to the console. The method should use a character set that parameter to the method.

  It managing organizational risk

No longer than a decade ago, IT security professionals had to work hard to persuade organizational leaders about the importance of developing effective risk management plans.

  Find a simplified expression for function

find a simplified expression for F = A?BC?D + A?B?D + A?CD + ABD + ABC - Assuming that the inputs ABCD = 0101, BCD = 1001, ABCD = 1011 never occur,

  Characterizing data types

Characterizing Data Types Please respond to the following: Justify characterizing data types according to task taxonomy.

  The average and how many scored below

Professor Merlin has asked you to help him. He has 100 total students in his four classes but he is not sure that all of them took his last exam. He wants to average the grades for his last exam in four sections of his medieval literature course and ..

  Write a method named longestsortedsequence

Write a method named longestSortedSequence that accepts an array of integers as a parameter and that returns the length of the longest sorted (nondecreasing) sequence of integers in the array.

  Write a declaration for an enumerated data type

A pet store sells dogs, cats, birds, and hamsters. Write a declaration for an enumerated data type that can represent the types of pets the store sells.

  How has the industry changed to adapt?

How has the industry changed to adapt?

  Combinatorics-passing by reference

Create a new project (called, for example, "homework05"), for this assignment. Do not use spaces in the name. Follow the same process as you did in the first assignment; if you need a refresher, please refer back to Homework 1.

  Write bash shell script filestatic to examine number files

Write bash shell script filestatic. Script should examine the number files in directories given as arguments (parameters) to this script.

  Provide stronger security

Widgets Incorporated's computer network was recently attacked. The Chief Information Officer (CIO) wants IT to implement a log management system to allow them to monitor suspicious activities. You have been hired to implement a security plan. Discuss..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd