Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Information security. Based on cryptography and network security book chapter 4 Answer the following and explain your answer with each step. Especially b and e.

Information security.
Based on cryptography and network security book chapter 4
Answer the following and explain your answer with each step. Especially b and e.
image text in transcribed
uld want the the final 32-bit swap in the enci following equality to hold: Does it? The following problems refer to details of DES that are dese Consider the substitution defined by row 1 of S-box S. in diagram similar to Figure 4.2 that corresponds to this su Note: 9 45 at the output of the first round of the DES of all ones and the exter- 4.10 Com decryption, assuming that the ciphertext block is compose er 4, 17,41, and nal key is composed of all ones. This problem provides a numerical example of encryption using a of DES. We start with the same bit pattern for the key K and the pa one-round version plaintext, namely 4.11 . Hexadecimal notation: Binary notation: 0123456789ABCDEF 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 a. Derive Ki, the first-round subkey. b. Derive Lo,Ro c. Expand Ro to get E[Ro], where E[ ] is the expansion function of Table S.1. d. Calculate A = E[RJKi. e. Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding 0- S-box substitutions. t. Concatenate the results of (e) to get a 32-bit result, B. 9.4PPlu permutation to PB net PUB) 9 aPPlu permutation to (i)wright cipher text h-clculate R.- RN9 L uld want the the final 32-bit swap in the enci following equality to hold: Does it? The following problems refer to details of DES that are dese Consider the substitution defined by row 1 of S-box S. in diagram similar to Figure 4.2 that corresponds to this su Note: 9 45 at the output of the first round of the DES of all ones and the exter- 4.10 Com decryption, assuming that the ciphertext block is compose er 4, 17,41, and nal key is composed of all ones. This problem provides a numerical example of encryption using a of DES. We start with the same bit pattern for the key K and the pa one-round version plaintext, namely 4.11 . Hexadecimal notation: Binary notation: 0123456789ABCDEF 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111 a. Derive Ki, the first-round subkey. b. Derive Lo,Ro c. Expand Ro to get E[Ro], where E[ ] is the expansion function of Table S.1. d. Calculate A = E[RJKi. e. Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding 0- S-box substitutions. t. Concatenate the results of (e) to get a 32-bit result, B. 9.4PPlu permutation to PB net PUB) 9 aPPlu permutation to (i)wright cipher text h-clculate R.- RN9 L

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database Processing

Authors: David M. Kroenke, David Auer

11th Edition

B003Y7CIBU, 978-0132302678

More Books

Students also viewed these Databases questions