Your work should be based on the following DES Triple in Hexadecimal notation (for conversion between...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Your work should be based on the following DES Triple in Hexadecimal notation (for conversion between Hexadecimal notation and Binary notation, refer to Problem 3.11 in page 83 of the textbook): 9f4f190e284c81cf 2e8c0bba428c5016 cce688d45aa07b0f (Key) (Plaintext) (Ciphertext) For this part, you will use the key and plaintext values from this triple in the DES Calculator. With this triple, you are asked to do the following tasks: (1) Encrypt the plaintext using the key given in your triple, with tracing of the round values. Note how the bits in X (the left and right halves of the data) change from round to round. What is the value of your X at the start of round 5? (2) Change DES bit 12 of the PLAINTEXT in your triple (i.e., change the 0 to 1, or 1 to 0 as appropriate), assuming DES bit numbering from left (MSB) bit 1 to right (LSB) bit 64. Encrypt this new plaintext value using the DES Calculator. Using the trace output, after each of the first four rounds list in a table how many bits of X differ from the corresponding values in (1) (you will have to convert between hexadecimal & binary and compare the relevant bits to do this). (3) Briefly describe how the subkeys used in each of the four rounds above were derived from the original 64 key bits specified. (4) Describe which characteristics of a good block cipher design have been illustrated by this exercise, and how they are demonstrated. Your work should be based on the following DES Triple in Hexadecimal notation (for conversion between Hexadecimal notation and Binary notation, refer to Problem 3.11 in page 83 of the textbook): 9f4f190e284c81cf 2e8c0bba428c5016 cce688d45aa07b0f (Key) (Plaintext) (Ciphertext) For this part, you will use the key and plaintext values from this triple in the DES Calculator. With this triple, you are asked to do the following tasks: (1) Encrypt the plaintext using the key given in your triple, with tracing of the round values. Note how the bits in X (the left and right halves of the data) change from round to round. What is the value of your X at the start of round 5? (2) Change DES bit 12 of the PLAINTEXT in your triple (i.e., change the 0 to 1, or 1 to 0 as appropriate), assuming DES bit numbering from left (MSB) bit 1 to right (LSB) bit 64. Encrypt this new plaintext value using the DES Calculator. Using the trace output, after each of the first four rounds list in a table how many bits of X differ from the corresponding values in (1) (you will have to convert between hexadecimal & binary and compare the relevant bits to do this). (3) Briefly describe how the subkeys used in each of the four rounds above were derived from the original 64 key bits specified. (4) Describe which characteristics of a good block cipher design have been illustrated by this exercise, and how they are demonstrated.
Expert Answer:
Related Book For
Auditing A Business Risk Approach
ISBN: 978-0538476232
8th edition
Authors: Karla Johnstone, Audrey Gramling, Larry Rittenberg
Posted Date:
Students also viewed these programming questions
-
The Crazy Eddie fraud may appear smaller and gentler than the massive billion-dollar frauds exposed in recent times, such as Bernie Madoffs Ponzi scheme, frauds in the subprime mortgage market, the...
-
(i) Write down the linear program relaxation for the vertex cover problem and solve the linear program. [6 marks] (ii) Based on the solution of the linear program in (b)(i), derive an integer...
-
From the work sheet, prepare the following: 1. Closing entries for Gimbel's Gifts and Gadgets in a general journal. 2. A post-closing trialbalance. Gimbel's Gifts and Gadgets Work Sheet For Year...
-
Using the income and expense account information for Tri-Mark Products Inc. listed below, construct an income statement for the year ended 31st December, 2014. Shares outstanding: 16,740,000 Tax...
-
From the diagrams of 2p and 3p orbitals in Fig.19 and Fig.20, respectively, draw a rough graph of the square of the wave function for these orbitals in the direction of one of the lobes. Figure 12.19...
-
Comment on the statement that the essential purpose of the user interface is to enable the user and the system to exchange messages. Provide two examples.
-
Boxes A and B are at rest on a conveyor belt that is initially at rest. The belt is suddenly started in an upward direction so that slipping occurs between the belt and the boxes. Knowing that the...
-
Define and discuss the terms 'privacy' in the context of web analytics by drawing on an example.
-
A. Compute the mean return and variance of return for each stock in Problem 1 using (1) The single-index model (2) The historical data In Problem 1 B. Compute the covariance between each possible...
-
How would you employ the decisionmaking process in a business environment Recommend picking a business and discuss the following areas Define the problem, Identity the alternatives, determine the...
-
Lisa, Steve, and Chen were feeling triumphant. Just 3 months ago, their company, Ryan Project Systems, had merged with Gierig Strategien AG, a consulting firm headquartered in Germany. At the time,...
-
Historic Philadelphia is a booming travel destination. Among the many sites tourists visit while in one of the nations oldest cities is the Granovetter Church, a partially restored building nearly...
-
Search the Internet for a U.S. 801(k) plan. Explain what it is.
-
Sengupta died on February 1, 20X14, and bequeathed two different assets to a beneficiary, Roberts. Asset One was distributed to Roberts on April 24, 20X14; Asset Two was distributed to Roberts on...
-
Aaron, age 55, has an adjusted gross income in 20X4 of $30,000. His expenses are as follows: What is Aarons itemized deduction for medical expenses? a. $0 b. $1,500 c. $2,000 d. $4,500...
-
Suppose the figure to the right represents the market for cotton. To help reduce debt, the government decides to levy a tax on cotton of $0.60 per pound to be paid by cotton farmers. 2.40- 2.20- What...
-
Select a mass spectrometric technique with the highest mass resolution for identifying an unknown compound being eluted from a liquid chromatography column
-
Fraud continues to occur at smaller organizations at a rate higher than that of larger organizations. Explain why this is the case.
-
Grant, G., Miller, K., & Alali, F. (2008). The Effect of IT Controls on Financial Reporting. Managerial Auditing Journal 23(8): 247-271. i. What is the issue being addressed in the paper? ii. Why is...
-
The auditor for ABC Wholesaling Company has just begun to perform preliminary analytical procedures as part of planning the audit for the coming year. ABC Wholesaling is in a competitive industry,...
-
What is the current ratio? A. 0.2 B. 2.0 C. 1.7 D. 0.8 E. 1.2 Using the following balance sheet and income statement Balance sheet m Property 200 Trade payables Plant and equipment 300 Tax due Other...
-
What is the quick (acid test) ratio? A. 0.9 B. 4.8 C. 0.8 D. 0.2 E. 1.7 Using the following balance sheet and income statement Balance sheet m Property 200 Trade payables Plant and equipment 300 Tax...
-
What is the receivables holding period? A. 21.6 days. B. 8 times. C. 19.4 days. D. 4.7 times. E. 28.2 days. Using the following balance sheet and income statement Balance sheet m Property 200 Trade...
Study smarter with the SolutionInn App