What are some benefit of a feistel structure

Assignment Help Computer Network Security
Reference no: EM13309600

1.a) Describe the high level steps involved for decryption using a Feistel cipher.

b) Modify the pseudo code provided in the lecture notes that describe encryption using a Feistel network to do decryption. You need to actually rewrite the code. Use different font colors and comments to highlight the areas of the code you have changed.

c) What are some benefit(s) of a Feistel structure?

2.Recall the 3DES encryption logic is: C = E (K3, D(K2,E(K1, P)))
Where:
E = Encryption
D = Decryption
Kn= Key n
P = Plain text
C = Cipher text

Write the symbolic logic for the 3DES decryption. Describe the logic in a few sentences.

3.Assuming an initial implementation of your encryption system was done using DES. What issues would need to be addressed if you decide to upgrade to the 3DES algorithm? There are several issues to consider.

4.Your manager is considering purchasing a message authentication system. She is considering 3 different systems. One system uses MD5 hashing, another uses SHA1 hashing and the other system uses a brand new hashing algorithm called VSH (Very Smooth Hash). You have been asked to prepare an executive summary (i.e. clear and concise) that describes the attributes of each algorithm and the pros and cons. What would your recommendation be?

5. How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

Reference no: EM13309600

Questions Cloud

Would a tuition increase raise the rate of unemployment : Labor Supply. Catholic priests take a vow of chastity, forgoing marriage and intimate non-marital relationships. This question relates to the article posted on Angel
Philosophical origins-assumptions : From what philosophical view point has the Piaget's theory arisen, and on what assumptions is it founded?
Explain the order of the reaction with respect to sucrose : The following data was obtained on the rate of hydrolysis of 17% sucrose in 0.099 M HCl aqueous solutions at 35 C. What is the order of the reaction with respect to sucrose and the value of the rate constant k
The minimum power rating for each resistor : We have a 15-V source and a load that absorbs power and requires a current varying between 0 and 100mA. The voltage across the load must remain between 4.7 and 5.0 V for all values of load current. Design a voltage-divider network to supply th..
What are some benefit of a feistel structure : How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.
Explain what other substance(s) found in chocolate bear : What other substance(s) found in chocolate bear(s) a strong structural resemblance to caffeine? Draw the structures of these substances and point out the similarities.
Draw a cross-section of the specified pavement design : The roadway to be constructed is 3 miles long and 60 feet wide. • The following pavement design specifications have been issued: - Base coarse: 6" DGA - Stabilized base: 4" - Bottom coarse of asphalt: 3" - Top coarse of asphalt: 2"
We give sinusoidal voltage across a capacitor the current : When we give sinusoidal voltage across a capacitor the current across it has 90 degree phase lag. Then this means as voltage increases(sine) the current decreases(cosine)[in 1st quadrant]....Whether this indicates capacitor exhibits negative r..
Explain how many ml of 0.450 m naoh are needed to titrate : How many mL of 0.450 M NaOH are needed to titrate 25.0 mL solution of 0.250 M FeCl3 solution? FeCl3 aq + 3NaOH arrow to Fe(OH)3 aq +3NaCl aq

Reviews

Write a Review

Computer Network Security Questions & Answers

  Responsibility of confidentiality to previous employer

You have taken a job with a software user who has contracted your previous employer to develop a system for them. However, you have also a responsibility of confidentiality to your previous employer.

  Attacking the devises by doing buffer overflow

Implement buffer overflow in c++ And attacking the devises by doing buffer overflow.

  Design a security plan that describes counter-measures

Design a security plan that describes counter-measures that will manage the threats that put the organisation's information assets at risk. The security plan should cover a full range of protection measures

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Use private key to decrypt the cipher text

Using blocks of 4 encrypt the message I AM AN MSC STUDENT MAJORING IN SECURITY using the public key above. Similarly use the private key above to decrypt the cipher text.

  Describe the security features available on a platform

Describe the security features available on a platform of your choice (for example, Linux/Android/Mac OS X/Windows/Apache/Java/Perl), to mitigate a specific type of attack (for example, adware/malware/SQL injection/spoofing/tampering).

  Scenario-based project

Authentic Assessment:   The scenario will be a realistic, enterprise-level situation encompassing diverse networking components, including Microsoft Windows, Linux, VoIP, security, wireless, and Cisco technologies.

  Selecting an expert for an expert witness opinion

Describe two IT certifications that may be considered when selecting an expert for an expert witness opinion.  Research and provide details on the hourly estimates for using these types of professional witnesses.   Then, discuss the typical backgroun..

  System enforcing bibas strict integrity policy

Consider the system enforcing Biba's strict integrity policy for a software vendor - defined integrity levels for an access class are released

  Theft of logins and passwords

Theft of logins and passwords

  Using biometric device at office and home easily and cheaply

ESSAYS a special requirement mentioned back in milestone 1, Jack millss wished the system to have "state-of-the-art-maybe some biometric device which can be used in office and at home easily and cheaply.

  What is virtualization

What is virtualization and what are the benefits and tradeoffs and explain at least three common virtual technologies that are used.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd