Implement the encryption algorithm

Assignment Help Computer Network Security
Reference no: EM131272964

Information Security - Project Symmetric Cipher

Symmetric Cipher / Implement the encryption algorithm

• Consider the following encryption algorithm

- Key size: 32 bits
- Block size: 48 bits
- Structure: SP-Network with 10 rounds
- S-box is the same as AES
- M: Linear Transition
• M is a 3x3 matrix in GF(28)
• GF(28) is the same field in AES

1592_Figure.jpg

-p(x) = x8 + x4 + x3 + x1 +1

105_Figure1.jpg

• Consider the following encryption algorithm (cont.)
- Key Schedule

• Rotl(x, n): n-bit circular left-shift of x

• Generate W (544-bit length) from a master key K

W = K || K0 || k1 || .... || k15

= K || Rotl(K,5) || Rotl(K,10) || Rotl(K,15) || ... || Rotl(K,11) || Rotl(K,16)

• Generate rk0, rk1, rk10 by extracting leftmost 48-bit from W

- Use only 11 (528-bit) keys and throw out the rest 16-bit

487_Figure2.jpg

1. Implement the encryption algorithm
- Express the matrix multiplication as a linear combination of vectors
- Define three tables and store them in advance

Takes as input a byte value and produces a column vector that is a function of the S-box entry for that byte value

- Implement using the table lookup operations, XOR operations per column per round

2. Find the key K
- E(K, 0x0123456789AB) = 0xFBD040D6DB9C and
- E(K, 0x9A6BCC10E84A) = 0xE5CBFFF7E08B

Reference no: EM131272964

Questions Cloud

State the reasons for applying to the philanthropy : Revise the given document.- Given the document is about:- State the reasons for applying to the Philanthropy and Voluntary Service, and what you would gain personally, professionally and academically be attending.
Describe the data breach incident of the data breach : Describe the data breach incident and the primary causes of the data breach. Assess if there are deficiencies in the regulatory requirements and whether they need to be changed, and how they need to be changed.
Describe one evidence claim for and claim against : Describe one (1) evidence claim for and one(1) evidence claim against your chosen topic. The topic is "What are the unconstructive and constructive impacts of technology on the teenagers"?
Explain the power of social influence based on the findings : Explain the power of social influence based on the findings of Milgram's experiment. Provide one (1) example of a situation you have been in where you felt you had to conform to someone or something. Indicate whether you felt you had to conform be..
Implement the encryption algorithm : Implement the encryption algorithm and - Express the matrix multiplication as a linear combination of vectors and Define three tables and store them in advance
Identify two human and technological protective measures : Identify two to three human and technological protective measures that you would use as security safeguards and enforcement actions in order to address the ethics issue that you have chosen.
Is there a maturational or developmental aspect to it : Is there a historical or cultural context to this? (I.e. Freud was his mothers favorite, as well as living and writing during repressed Victorian tines and WWI and WWII; Behavioral and CBT approaches evolved during a time that people wanted to mak..
What types of goals are suitable for diversity training : What types of goals are suitable for diversity training and How might a complete performance management system differ from our annual performance appraisals.
Critical importance of an executive : The market trend towards escalating executive compensation reflects the critical importance of an executive to an organization's long-term viability.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd