Implement the encryption algorithm

Assignment Help Computer Network Security
Reference no: EM131272964

Information Security - Project Symmetric Cipher

Symmetric Cipher / Implement the encryption algorithm

• Consider the following encryption algorithm

- Key size: 32 bits
- Block size: 48 bits
- Structure: SP-Network with 10 rounds
- S-box is the same as AES
- M: Linear Transition
• M is a 3x3 matrix in GF(28)
• GF(28) is the same field in AES

1592_Figure.jpg

-p(x) = x8 + x4 + x3 + x1 +1

105_Figure1.jpg

• Consider the following encryption algorithm (cont.)
- Key Schedule

• Rotl(x, n): n-bit circular left-shift of x

• Generate W (544-bit length) from a master key K

W = K || K0 || k1 || .... || k15

= K || Rotl(K,5) || Rotl(K,10) || Rotl(K,15) || ... || Rotl(K,11) || Rotl(K,16)

• Generate rk0, rk1, rk10 by extracting leftmost 48-bit from W

- Use only 11 (528-bit) keys and throw out the rest 16-bit

487_Figure2.jpg

1. Implement the encryption algorithm
- Express the matrix multiplication as a linear combination of vectors
- Define three tables and store them in advance

Takes as input a byte value and produces a column vector that is a function of the S-box entry for that byte value

- Implement using the table lookup operations, XOR operations per column per round

2. Find the key K
- E(K, 0x0123456789AB) = 0xFBD040D6DB9C and
- E(K, 0x9A6BCC10E84A) = 0xE5CBFFF7E08B

Reference no: EM131272964

Questions Cloud

State the reasons for applying to the philanthropy : Revise the given document.- Given the document is about:- State the reasons for applying to the Philanthropy and Voluntary Service, and what you would gain personally, professionally and academically be attending.
Describe the data breach incident of the data breach : Describe the data breach incident and the primary causes of the data breach. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed.
Describe one evidence claim for and claim against : Describe one (1) evidence claim for and one(1) evidence claim against your chosen topic. The topic is "What are the unconstructive and constructive impacts of technology on the teenagers"?
Explain the power of social influence based on the findings : Explain the power of social influence based on the findings of Milgram's experiment. Provide one (1) example of a situation you have been in where you felt you had to conform to someone or something. Indicate whether you felt you had to conform be..
Implement the encryption algorithm : Implement the encryption algorithm and - Express the matrix multiplication as a linear combination of vectors and Define three tables and store them in advance
Identify two human and technological protective measures : Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
Is there a maturational or developmental aspect to it : Is there a historical or cultural context to this? (I.e. Freud was his mothers favorite, as well as living and writing during repressed Victorian tines and WWI and WWII; Behavioral and CBT approaches evolved during a time that people wanted to mak..
What types of goals are suitable for diversity training : What types of goals are suitable for diversity training and How might a complete performance management system differ from our annual performance appraisals.
Critical importance of an executive : The market trend towards escalating executive compensation reflects the critical importance of an executive to an organization's long-term viability.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyse the security attacks involved in a given scenario

The purpose of this assignment is to analyse the security attacks involved in a given scenario- BrightIdea is in the file storage business. They provide file storage to free and paid clients all over the world

  Provide a historical timeline of homeland security events

Provide a historical timeline of homeland security incidents along with the call for improved preparedness, response and recovery needs that lead to the creation of National Incident Management Systems and the National Response Framework documents..

  Describe application of network security and management

Evaluate the ethical concerns that communication networks raise in a global context. Describe the application of network security and network management in communication technology environments.

  Explain what technologies will you implement to mitigate

Each progress report should contain a review of the project, summarizing work completed since the last report -

  Question about systems analysis

The owners of a store are looking for a lighted sign that could be mounted outside the store. The lights in the sign should be turned on when the outdoor light level falls given below a level defined through the owners.

  Targets of security breaches can be larger-smaller companies

Study three recent information security breaches. Do the key targets appear to be larger or smaller companies? Is there particular industry which appears predominately targeted?

  Compare two-tier client-server system configuration

Compare 2-tier and 3-tier client/server system configurations and analyze how they are different. Based on your comparison, suggest the real life scenarios which are suitable for each of them and justify your reasoning.

  Complete annotated bibliography on your assigned about iran

Complete an annotated bibliography on your assigned about Iran. The annotated bibliography must contain at least 20 entries. You may use Internet sources, but please include at least 5 academic journal articles in the assignment.

  Write a program for recursive algorithm

Consider the following recursive algorithm

  Automated digital job application system

List down advantages that come about having an automated digital job application system

  Explain the benefits of the proposed network solution

Explain the benefits of the proposed network solution. Identify the risks and risk mitigation strategies associated with the proposed network solution.

  How to design an improved interactive password system

Answer should be original, and similarity (plagiarism) not more than 10% this is very important otherwise I will be in trouble.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd