In Figure 31.9, we have two straight permutation operations: initial permutation and final permutation. Experts believe these
Question:
In Figure 31.9, we have two straight permutation operations: initial permutation and final permutation. Experts believe these operations are useless and do not help to make the cipher stronger. Can you find the reason for this statement?
Figure 31.9
Transcribed Image Text:
64-bit plaintext DES 32 bits 32 bits Initial permutation K1 Round I 48-bit f( R1. K; ) K; Round i 56-bit 48-bit cipher key K16 Round 16 48-bit Final permutation 32 bits 32 bits Each round 64-bit ciphertext
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Answer rating: 71% (7 reviews)
Both operations are keyless ...View the full answer
Answered By
Albert Kinara
i am an expert research writer having worked with various online platform for a long time. i also work as a lecturer in business in several universities and college part time and assure you well researched and articulate papers. i have written excellent academic papers for over 5 year and have an almost similar experience experting many clients in different units. bachelor of commerce (finance)
masters in strategic management
phd finance
4.60+
26+ Reviews
48+ Question Solved
Related Book For
Question Posted:
Students also viewed these Computer science questions
-
In Figure 31.10 in the text, why do we need an expansion P-box? Why cant we use a straight or a compression P-box? Figure 31.10 In 32 bits Expansion P-box 48 bits XOR 4 - K; (48 bits) [48 bits f(R1....
-
A permutation block (P-box) in a modern block cipher is an example of a keyless transposition cipher. What does this statement mean? (See Figure 31.8 in the text.) Figure 31.8 2 3. 2 Straight...
-
We define the Josephus problem as follows. Suppose that n people form a circle and that we are given a positive integer m n. Beginning with a designated first person, we proceed around the circle,...
-
In a perpetual inventory system: (a) LIFO cost of goods sold will be the same as in a periodic inventory system. (b) average costs are a simple average of unit costs incurred. (c) a new average is...
-
Players in the marketing communications industry's agencies and firms need to address what clients want and client-driven change. Discuss this notion using examples to illustrate.
-
One companys bottles of grapefruit juice are filled by a machine that is set to dispense an average of 180 milliliters (ml) of liquid. The company has been getting negative feedback from customers...
-
Consider the all-possible-regressions analysis of Hald's cement data in Example 10.1. If the objective is to develop a model to predict new observations, which equation would you recommend and why?...
-
1. How did Allegro significantly improve click-through rates with Web analytics? 2. What were the challenges, the proposed solution, and the obtained results?
-
An underground fire service main in a methanol plant consists of glass reinforced plastic material. The piping is rated for 200 psi. The pump's churn pressure is rated at 280 psi. Numerous leaks have...
-
GLMH Shipping is a start-up company that plans to offer same-day shipping services between 20 major cities in the U.S. In order to provide this service, GLMH needs to build hubs at airports in...
-
The key in DES is 56 bits. Assume Eve, the intruder, tries to find the key using a brute-force attack (tries all of the keys one by one). If she can try one million keys (almost 2 20 ) in each second...
-
A permutation block (P-box) in a modern block cipher has five inputs and five outputs. This is a _____ permutation? a. Straight b. Compression c. Expansio
-
The U.S. Patent and Trademark Office (PTO) denied Raymond Gianelli's application for a patent for a "Rowing Machine"-an exercise machine on which a user pulls on handles to perform a rowing motion...
-
Explain the meaning of SST, SSR, and SSE, and how they are related to \(R^{2}\).
-
The owners of a motel discovered that a defective product was used during construction. It took seven months to correct the defects during which approximately 14 rooms in the 100 -unit motel were...
-
Define the elasticity of \(y\) with respect to \(x\) and explain its computation in the simple linear regression model when \(y\) and \(x\) are not transformed in any way, and when \(y\) and/or \(x\)...
-
A swift blow with the hand can break a pine board. As the hand hits the board, the kinetic energy of the hand is transformed into elastic potential energy of the bending board; if the board bends far...
-
Explain, intuitively and technically, why predictions for \(x\) values further from \(\bar{x}\) are less reliable.
-
A computer system uses passwords that contain exactly eight characters, and each character is one of the 26 lowercase letters (az) or 26 uppercase letters (AZ) or 10 integers (09). Assume all...
-
During the month, services performed for customers on account amounted to $7,500 and collections from customers in payment of their accounts totaled $6,000. At the end of the month, the Accounts...
-
What is the key capability of the web?
-
What is the key vision of Microsofts .NET initiative?
-
How does the .NET Framework Class Library facilitate the development of .NET apps?
-
Assume that a robot systems constant failure and repair rates are 0.0004 failures per hour and 0.002 repairs per hour, respectively. Calculate the robot system steady-state unavailability and...
-
March 6, 2018 David Beckham's Latest Pitch: Men's Cosmetics. By Robert Williams Men of the world, David Beckham has a message for you: Moisturize. "It's the biggest thing," he says in a London...
-
3. On January 1, an investment fund was opened with an initial balance of 5000. Just after the balance grew to 5200 on July 1, an additional 2600 was deposited. The annual effective yield rate for...
Study smarter with the SolutionInn App