Key generation of the simplified des algorithm

Assignment Help Computer Network Security
Reference no: EM13190763

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data, which you studied briefly in T215B. This task aims to assist you in learning more about the DES. Your answer should be as report which starting with introduction and ending with conclusion, the report should be within 1000 - 1200 words (long report, you should adhere to word count), the report should include sections and sub suctions, and at least one figure or table, your report must have proper citations and references. The body of your report should answer the following questions:

1. Define DES?

2. What is the history of DES?

3. Describe the key generation of the Simplified DES algorithm? It is preferable to answer it as a list of points.

4. Describe Simplified DES algorithm? It is preferable to answer it as a list of points.

5. What are the advantages and disadvantages of DES - at least 2 advantages And 2 disadvantages?

6. Is DES secure mechanism to protect electronic data at the present time, justify your answer?

Reference no: EM13190763

Questions Cloud

The process of audience adaptation : The process of audience adaptation is over by the time a speaker starts delivering the speech.
What is the expected number of missiles that will fire : From a lot of 10 missiles, 4 are selected at random and fired. If the lot contains 3 defective missiles that will not fire, what is the probability that
Amphibolite is a foliated metamorphic rock : Amphibolite is a foliated metamorphic rock composed principally of hornblende and plagioclase. How does it form
What is the spot exchange rate : Suppose 90-day investments in Britain have a 6% annualized return and a 1.5% quarterly (90-day) return. In the U.S., 90-day investments of similar risk have a 4% annualized return and a 1% quarterly (90-day) return. In the 90-day forward market.
Key generation of the simplified des algorithm : What is the history of DES and describe the key generation of the Simplified DES algorithm
How many children admissions were collected : adult admission is $20 and children admission is $11. during one day, 1551 adult and children admissions was collected and $24,441 admission fees collected. how many children admissions were collected?
State the polyphenol and draw the mechanism arrows : Predict just the first step that might occur between the polyphenol shown below and Na2CO3
Find out how long the rocket will take to hit : Use the quadratic formula to find out how long the rocket will take to hit the ground after it is launched. Round to the nearest tenth of a second.
Independent nation-states : What accounts for the rather late emergence of African countries as independent nation-states? Is there something peculiar about Africa that delayed its drive for independence? (Begin with a specific African country, and argue your case.)

Reviews

Write a Review

Computer Network Security Questions & Answers

  Owasp top 10 web application security risks

Reflected XSS and Stored XSS attack, threat Modeling methodologies, Extended Stack Pointer (ESP) and the Extended Base Pointer (EBP), Canary-based defense to buffer overflow attacks in C language, admin.aspx, Index hijacking, cross-site request fo..

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Expected time to find all users passwords

Assume that eight more characters were added to the password and that the DES algorithm was changed so as to use all 16 password characters. What would be the expected time to find all users' passwords using a dictionary attack?

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

  Report of network security

Report of network security solutions around 3 to 4 pages . Example and reasons for evertything thats needed for the sercurity.

  Discuss two drawbacks of steganography

Discuss two drawbacks of steganography Describe the operation of a Trojan Horse program. How can we protect our computer from such a program

  Explain main targets seem to be larger or smaller companies

Research three recent information security breaches. Do the main targets seem to be larger or smaller companies? Is there a particular industry that seems predominately targeted?

  The hr department has sensitive information

The HR department has sensitive information that can only be viewed by members of the HR department and executive offices. Each location has computers and printers for use within the individual departments but that not to be used by employees from an..

  Analyze specific potential malicious attacks

Analyze specific potential malicious attacks and / or threats that could be carried out against the network and organization and explain in detail the potential impact of the three selected malicious attacks

  Decisions on any changes that materially affect project

It has been recommended in some quarters that for large projects, decisions on any changes that materially affect assignment milestones

  Question on security infrastructure and protocols

Question on Security infrastructure and protocols

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd