All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
cryptography and network security
Questions and Answers of
Cryptography And Network Security
Show that DES decryption is, in fact, the inverse of DES encryption.
The 32-bit swap after the sixteenth iteration of the DES algorithm is needed to make the encryption process invertible by simply running the ciphertext back through the algorithm with the key order
Compare the initial permutation table (Table 3.2a) with the permuted choice one table (Table 3.4b). Are the structures similar? If so, describe the similarities. What conclusions can you draw from
When using the DES algorithm for decryption, the 16 keys \(\left(K_{1}, K_{2}, \ldots, K_{16}ight)\) are used in reverse order. Therefore, the right-hand side of Figure 3.5 is not valid for
a. Let \(X^{\prime}\) be the bitwise complement of \(X\). Prove that if the complement of the plaintext block is taken and the complement of an encryption key is taken, then the result of DES
Show that in DES the first 24 bits of each subkey come from the same subset of 28 bits of the initial key and that the second 24 bits of each subkey come from a disjoint subset of 28 bits of the
For any block cipher, the fact that it is a nonlinear function is crucial to its security. To see this, suppose that we have a linear block cipher EL that encrypts 128-bit blocks of plaintext into
Refer to Figure G.2, which depicts key generation for S-DES.a. How important is the initial P10 permutation function?b. How important are the two LS-1 shift functions?
The equations for the variables \(q\) and \(r\) for S-DES are defined in the section on S-DES analysis. Provide the equations for \(s\) and \(t\).
Using S-DES, decrypt the string (10100010) using the key (0111111101) by hand. Show intermediate results after each function (IP, \(\mathrm{F}_{K}, \mathrm{SW}, \mathrm{F}_{K}, \mathrm{IP}^{-1}\) ).
Create software that can encrypt and decrypt using a general substitution block cipher.
Create software that can encrypt and decrypt using S-DES. Test data: use plaintext, ciphertext, and key of Problem 3.18.Problem 3.18Using S-DES, decrypt the string (10100010) using the key
Briefly define a group.
Briefly define a ring.
Briefly define a field.
What does it mean to say that is a divisor of ?
What is the difference between modular arithmetic and ordinary arithmetic?
List three classes of polynomial arithmetic.
For the group \(S_{n}\) of all permutations of \(n\) distinct symbols,a. what is the number of elements in \(S_{n}\) ?b. show that \(S_{n}\) is not abelian for \(n>2\).
Does the set of residue classes \((\bmod 3)\) form a groupa. with respect to modular addition?b. with respect to modular multiplication?
Consider the set \(S=\{a, b\}\) with addition and multiplication defined by the following tables.Is \(S\) a ring? Justify your answer. + JB a b a b b a X JE a a b 26
Reformulate Equation (4.1), removing the restriction that \(a\) is a nonnegative integer. That is, let \(a\) be any integer. = qn + r a = 0 r
Draw a figure similar to Figure 4.1 for \(a
For each of the following equations, find an integer \(x\) that satisfies the equation.a. \(5 x \equiv 4(\bmod 3)\)b. \(7 x \equiv 6(\bmod 5)\)c. \(9 x \equiv 8(\bmod 7)\)
In this text, we assume that the modulus is a positive integer. But the definition of the expression \(a \bmod n\) also makes perfect sense if \(n\) is negative. Determine the following:a. \(5 \bmod
A modulus of 0 does not fit the definition but is defined by convention as follows: \(a\) mod \(0=a\). With this definition in mind, what does the following expression mean: \(a \equiv b(\bmod 0)\) ?
In Section 4.3, we define the congruence relationship as follows: Two integers \(a\) and \(b\) are said to be congruent modulo \(n\) if \((a \bmod n)=(b \bmod n)\). We then proved that \(a \equiv
What is the smallest positive integer that has exactly \(k\) divisors, for \(1 \leq k \leq 6\) ?
Prove the following:a. \(a \equiv b(\bmod n)\) implies \(b \equiv a(\bmod n)\)b. \(a \equiv b(\bmod n)\) and \(b \equiv c(\bmod n)\) imply \(a \equiv c(\bmod n)\)
Prove the following:a. \([(a \bmod n)-(b \bmod n)] \bmod n=(a-b) \bmod n\)b. \(\quad[(a \bmod n) \times(b \bmod n)] \bmod n=(a \times b) \bmod n\)
Find the multiplicative inverse of each nonzero element in \(Z_{5}\).
Show that an integer \(N\) is congruent modulo 9 to the sum of its decimal digits. For example, \(475 \equiv 4+7+5 \equiv 16 \equiv 1+6 \equiv 7(\bmod 9)\). This is the basis for the familiar
a. Determine \(\operatorname{gcd}(24140,16762)\).b. Determine \(\operatorname{gcd}(4655,12075)\).
The purpose of this problem is to set an upper bound on the number of iterations of the Euclidean algorithm.a. Suppose that \(m=q n+r\) with \(q>0\) and \(0 \leq rr\).b. Let \(A_{i}\) be the value of
The Euclidean algorithm has been known for over 2000 years and has always been a favorite among number theorists. After these many years, there is now a potential competitor, invented by J. Stein in
a. Show that if Stein's algorithm does not stop before the \(n\)th step, then\[C_{n+1} \times \operatorname{gcd}\left(A_{n+1}, B_{n+1}ight)=C_{n} \times \operatorname{gcd}\left(A_{n}, B_{n}ight)\]b.
Using the extended Euclidean algorithm, find the multiplicative inverse ofa. \(1234 \bmod 4321\)b. \(24140 \bmod 40902\)c. \(550 \bmod 1769\)
Develop a set of tables similar to Table 4.5 for \(\mathrm{GF}(5)\).
Demonstrate that the set of polynomials whose coefficients form a field is a ring.
Demonstrate whether each of these statements is true or false for polynomials over a field.a. The product of monic polynomials is monic.b. The product of polynomials of degrees \(m\) and \(n\) has
For polynomial arithmetic with coefficients in \(Z_{10}\), perform the following calculations.a. \((7 x+2)-\left(x^{2}+5ight)\)b. \(\left(6 x^{2}+x+3ight) \times\left(5 x^{2}+2ight)\)
Determine which of the following are reducible over GF(2).a. \(x^{3}+1\)b. \(x^{3}+x^{2}+1\)c. \(x^{4}+1\) (be careful)
Determine the gcd of the following pairs of polynomials.a. \(x^{3}+x+1\) and \(x^{2}+x+1\) over \(\mathrm{GF}(2)\)b. \(x^{3}-x+1\) and \(x^{2}+1\) over \(\mathrm{GF}(3)\)c.
Develop a set of tables similar to Table 4.7 for \(\mathrm{GF}(4)\) with \(m(x)=x^{2}+x+1\). Table 4.7 Polynomial Arithmetic Modulo (x 000 001 010 011 100 101 110 111 + 0 1 x x + 1 x x + 1 x + z x +
Determine the multiplicative inverse of \(x^{3}+x+1\) in \(\mathrm{GF}\left(2^{4}ight)\) with \(m(x)=x^{4}+x+1\)
Develop a table similar to Table 4.9 for \(\mathrm{GF}\left(2^{4}ight)\) with \(m(x)=x^{4}+x+1\). Table 4.9 Generator for GF(2) using x + x + 1 Power Polynomial Representation Representation 0 1 g 0
Write a simple four-function calculator in \(\mathrm{GF}\left(2^{4}ight)\). You may use table lookups for the multiplicative inverses.
Write a simple four-function calculator in \(\operatorname{GF}\left(2^{8}ight)\). You should compute the multiplicative inverses on the fly.
What was the original set of criteria used by NIST to evaluate candidate AES ciphers?
What was the final set of criteria used by NIST to evaluate candidate AES ciphers?
What is the difference between Rijndael and AES?
What is the purpose of the State array?
How is the S-box constructed?
Briefly describe SubBytes.
Briefly describe ShiftRows.
How many bytes in State are affected by ShiftRows?
Briefly describe MixColumns.
Briefly describe AddRoundKey.
Briefly describe the key expansion algorithm.
What is the difference between SubBytes and SubWord?
What is the difference between ShiftRows and RotWord?
What is the difference between the AES decryption algorithm and the equivalent inverse cipher?
In the discussion of MixColumns and InvMixColumns, it was stated that b(x) = a-1(x)mod(x4 + 1) where a(x) = {03}x3 + {01}x2 + {01}x + {02} and b(x) = {0B}x3 + {0D}x2 + {09}x + {0E}. Show that this
a. What is {01}-1 in GF(28)?b. Verify the entry for {01} in the S-box.
Show the first eight words of the key expansion for a 128-bit key of all zeros.
Given the plaintext {000102030405060708090A0B0C0D0E0F} and the key {01010101010101010101010101010101}:a. Show the original contents of State, displayed as a 4 × 4 matrix.b. Show the value of State
Verify Equation (5.11).That is, show that xi mod (x4 + 1) = xi mod4
Compare AES to DES. For each of the following elements of DES, indicate the comparableelement in AES or explain why it is not needed in AES.a. XOR of subkey material with the input to the f
In the subsection on implementation aspects, it is mentioned that the use of tables helps thwart timing attacks. Suggest an alternative technique.
In the subsection on implementation aspects, a single algebraic equation is developed that describes the four stages of a typical round of the encryption algorithm. Provide the equivalent equation
Compute the output of the MixColumns transformation for the following sequence of input bytes “67 89 AB CD”. Apply the InvMixColumns transformation to the obtained result to verify your
Use the key 1010 0111 0011 1011 to encrypt the plaintext “ok” as expressed in ASCII as 0110 1111 0110 1011. The designers of S-AES got the ciphertext 0000 0111 0011 1000. Do you?
Show that the matrix given here, with entries in GF(24), is the inverse of the matrix used in the MixColumns step of S-AES. (x + 1 X X EX [ + Ex 1,
Carefully write up a complete decryption of the ciphertext 0000 0111 0011 1000 using the key 1010 0111 0011 1011 and the S-AES algorithm.You should get the plaintext. Note that the inverse of the
Demonstrate that Equation (5.9) is equivalent to Equation (5.4).
Create software that can encrypt and decrypt using S-AES.Test data:A binary plaintext of 0110 1111 0110 1011 encrypted with a binary key of 1010 0111 0011 1011 should give a binary ciphertext of 0000
Implement a differential cryptanalysis attack on 1-round S-AES.
What is triple encryption?
What is a meet-in-the-middle attack?
How many keys are used in triple encryption?
Why is the middle portion of 3DES a decryption rather than an encryption?
Why do some block cipher modes of operation only use encryption while others use both encryption and decryption?
You want to build a hardware device to do block encryption in the cipher block chaining (CBC) mode using an algorithm stronger than DES. 3DES is a good candidate. Figure 6.11 shows two possibilities,
Can you suggest a security improvement to either option in Figure 6.11, using only three DES chips and some number of XOR functions? Assume you are still limited to two keys. K, K P EDE C-1 C (b)
The Merkle-Hellman attack on 3DES begins by assuming a value of A = 0 (Figure 6.1b). Then, for each of the 256 possible values of K1, the plaintext P that produces A = 0 is determined. Describe the
With the ECB mode, if there is an error in a block of the transmitted ciphertext, only the corresponding plaintext block is affected. However, in the CBC mode, this error propagates. For example, an
Is it possible to perform encryption operations in parallel on multiple blocks of plaintext in CBC mode? How about decryption?
CBC-Pad is a block cipher mode of operation used in the RC5 block cipher, but it could be used in any block cipher. CBC-Pad handles plaintext of any length. The ciphertext is longer then the
For the ECB, CBC, and CFB modes, the plaintext must be a sequence of one or more complete data blocks (or, for CFB mode, data segments). In other words, for these three modes, the total number of
If a bit error occurs in the transmission of a ciphertext character in 8-bit CFB mode, how far does the error propagate?
In discussing OFB, it was mentioned that if it was known that two different messages had an identical block of plaintext in the identical position, it is possible to recover the corresponding Oi
In discussing the CTR mode, it was mentioned that if any plaintext block that is encrypted using a given counter value is known, then the output of the encryption function can be determined easily
Padding may not always be appropriate. For example, one might wish to store the encrypted data in the same memory buffer that originally contained the plaintext. In that case, the ciphertext must be
Figure 6.12b shows an alternative to CTS for producing ciphertext of equal length to the plaintext when the plaintext is not an integer multiple of the block size.a. Explain the algorithm.b. Explain
Create software that can encrypt and decrypt in cipher block chaining mode using one of the following ciphers: affine modulo 256, Hill modulo 256, S-DES, DES. Test data for S-DES using a binary
Create software that can encrypt and decrypt in 4-bit cipher feedback mode using one of the following ciphers: additive modulo 256, affine modulo 256, S-DES;or8-bit cipher feedback mode using one of
Create software that can encrypt and decrypt in counter mode using one of the following ciphers: affine modulo 256, Hill modulo 256, S-DES. Test data for S-DES using a counter starting at 0000 0000.
Implement a differential cryptanalysis attack on 3-round S-DES.
Showing 400 - 500
of 498
1
2
3
4
5