Show that f-function of des is not reversible

Assignment Help Computer Networking
Reference no: EM13186333

a) The keyspace for a cipher is the set all of possible keys that can be used for the cipher. A DES key consists of 56 (independent) bits.

i) Express the size of the DES keyspaceto the nearest power of 10, and find three examples of physical quantities, or other known values, that are approximately the same size.

ii) Consider the collection of passwords defined by combinations of digits and letters (both upper and lower case). What password length would be required so that the number of possible passwords is at least the size of the DES keyspace?

b) Encryption is only useful if there is a matching reversible operation called decryption. In aFeistel cipher, the F-function or round function need not be reversible.

i) Show that F-function of DES is not reversible

ii) Explain how a Feistelcipher whose main component is not reversible can actually support decryption.

Reference no: EM13186333

Questions Cloud

Use the approximate operation counts : Use the approximate operation counts n2 /2 for back substitution and n3 /3 for elimination to estimate how long it will take to do a complete Gaussian elimination of this size. Round your answer to the nearest second.
Do companies have personalities and who shapes them : Why would an organization provide employee services beyond the minimum, especially when pressure for profits continue to mount? What does that communicate to you about the company? Do companies have personalities and who shapes them?
State consists of photons with an average wavelength : If the sunlight consists of photons with an average wavelength of 510.0 nm, how many photons strike a 3.20 cm2 area per second?
Indicate the importance of the major component of population : Discuss and indicate the importance of the major components of population growth from 1800 to the present. Give socio-economic explanations for the major changes in each component.
Show that f-function of des is not reversible : Show that F-function of DES is not reversible and explain how a Feistelcipher whose main component is not reversible can actually support decryption.
Persian empire was the mightiest empire at the time : The Persian Empire was the mightiest empire at the time and could amass armies of 200 00. The Greek cities were small, isolated, independent and not united, yet they managed to defeat the Persians. Suggest reasons why they were able to do this.
State how many moles of acid : During a titration, the following data were collected. A 25 mL portion of a solution of an unknown monoprotic acid was titrated with 1.0 M NaOH(aq).
How many balls are left in the barrel : After this process completes ( 1 full minute passes) how many balls are left in the barrel?
Favorable business climate means : Multinational corporations often funnel money to elites in the Least Industrialized Nations to create a "favorable business climate." This "favorable business climate" means the creation of ________ and ________.

Reviews

Write a Review

Computer Networking Questions & Answers

  What are differences between lans and wireless lans

The latest member of the 802.11 family is 802.11n. What are some immediately noticeable differences between LANs and Wireless LANs?

  Describe legal and ethical issues of expert system

Describe the legal and ethical issues of expert system providing incorrect information? Must Food and Drug Administration review and approve medical expert systems?

  Explain physical locations distributed across county

Corporation is expanding from single physical location to three physical locations distributed across county to better serve the requirements of their customers.

  The transmitter and receiver are separated

The transmitter and receiver are separated by a channel (medium of transmission). What types of channels are available?  Please keep it short and simple and please no copy and paste.

  Ciphertext which was encoded with a shift cipher

the following ciphertext which was encoded with a shift cipher: xultpaajcxitltlxaarpjhtiwtgxktghidhipxciwtvgtpilpitghlxiwiwtxgqadds.1. Perform an attack against the cipher based on a letter frequency count: How many letters do you have to identify th..

  Create duplicate scenarios-modify interarrival for ethernet

Create several duplicate scenarios and modify the interarrival times for all the Ethernet stations to 0.0008, 0.002, 0.003, 0.005, and 0.006, respectively.

  Write four addresses broadcast and network number

How many networks will be available? Write down the four addresses (broadcast and network number) for network starting at 131.204.18?

  Explaining algorithm which uses sequence numbers

Assume that sender sends silence suppressed RTP stream of G.711 audio to receiver (G.711 is the name of standard for 64Kbps PCM). Outline algorithm which uses sequence numbers and time stamps of RTP packets to find out beginning of new talk spurt?

  Explain methods of connecting to internet

Briefly explain the following three methods of connecting to Internet: Cable Internet service, digital subscriber line, and dial-up Internet service.

  Explain data communications and network infrastructure

Explain the data communications and network infrastructure which Dell must put to manage its internal communications and external communications with Intel.

  Write projected growth rates for forensics experts

Write down some projected growth rates for forensics experts and security roles over next five years? Explain which specific positions are in demand in business organizations?

  What allows the ip layer to determine where to send a packet

what allows the IP layer to determine where to send a packet next? What settings are used to make that decision?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd