Consider a Feistel cipher with r rounds and n = 128 (half the block length); =...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider a Feistel cipher with r rounds and n = 128 (half the block length); = 256 (the key bit size). Then M {0, 126 (the plaintext space), C = {0, 13256 (the ciphertext space), and K= {0, 13256 (the key space). A key scheduling algorithm determines subkeys k₁, k₂ from a key KEK = {0, 13256. Each subkey k, determines a function f {0, 13128 (0,1}128, Encryption takes r rounds: : Plaintext is m = (mo, m₁) with mo, m₁ € {0, 1}128, Round 1: (mo, m₁)→ (m₁, m₂) with m₂ = mg Round 2: (m₁, m₂)→ (m₂, ma) with my = my ⠀ fi(m₁). fa(m₂). Round r: (m,-1, m,)→ (me, me+1) with m41 = mr-1 fr(mr). The ciphertext is c = (mr, mr+1). For the Feistel cipher described above: 1. Describe an algorithm for the decryption process for a ciphertext input c = (m,,mr+1). You should use a notation similar to the encryption procedure as described above. 2. Draw a figure for your decryption algorithm. Exercise 2 (Security of Feistel ciphers (4+4 marks)) 1. Consider the above Feistel cipher with r= 2 rounds. Is this Feistel cipher secure against an exhaustive key search attack, in the known-plaintext attack model? What does the complexity of such an attack depend on? Explain. 2. Consider the above Feistel cipher with r = 2 rounds. Imagine a key scheduling algorithm that works as follows. Given KEK = {0, 1) 256, set k₁ to be the leftmost 128 bits of K, and k₂ to be the rightmost 128 bits of K, then define f(x)=zk. Show that this block cipher is totally insecure that is, given a single plaintext-ciphertext pair (m, c), the secret key K can be easily recovered. Hint: linearity is the problem here. Consider a Feistel cipher with r rounds and n = 128 (half the block length); = 256 (the key bit size). Then M {0, 126 (the plaintext space), C = {0, 13256 (the ciphertext space), and K= {0, 13256 (the key space). A key scheduling algorithm determines subkeys k₁, k₂ from a key KEK = {0, 13256. Each subkey k, determines a function f {0, 13128 (0,1}128, Encryption takes r rounds: : Plaintext is m = (mo, m₁) with mo, m₁ € {0, 1}128, Round 1: (mo, m₁)→ (m₁, m₂) with m₂ = mg Round 2: (m₁, m₂)→ (m₂, ma) with my = my ⠀ fi(m₁). fa(m₂). Round r: (m,-1, m,)→ (me, me+1) with m41 = mr-1 fr(mr). The ciphertext is c = (mr, mr+1). For the Feistel cipher described above: 1. Describe an algorithm for the decryption process for a ciphertext input c = (m,,mr+1). You should use a notation similar to the encryption procedure as described above. 2. Draw a figure for your decryption algorithm. Exercise 2 (Security of Feistel ciphers (4+4 marks)) 1. Consider the above Feistel cipher with r= 2 rounds. Is this Feistel cipher secure against an exhaustive key search attack, in the known-plaintext attack model? What does the complexity of such an attack depend on? Explain. 2. Consider the above Feistel cipher with r = 2 rounds. Imagine a key scheduling algorithm that works as follows. Given KEK = {0, 1) 256, set k₁ to be the leftmost 128 bits of K, and k₂ to be the rightmost 128 bits of K, then define f(x)=zk. Show that this block cipher is totally insecure that is, given a single plaintext-ciphertext pair (m, c), the secret key K can be easily recovered. Hint: linearity is the problem here.
Expert Answer:
Answer rating: 100% (QA)
Here are the stepbystep calculations for each question 1 Consider the above Feistel cipher with r2 r... View the full answer
Related Book For
Understanding Basic Statistics
ISBN: 9781111827021
6th Edition
Authors: Charles Henry Brase, Corrinne Pellillo Brase
Posted Date:
Students also viewed these accounting questions
-
Why do you think asymmetric-key cryptography is used only with small messages.
-
1- Public-key cryptography can be used for encryption and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by symmetric key cryptography. So why do we...
-
1) Public-key cryptography can be used for encryption and key exchange. Furthermore, it has some properties (such as nonrepudiation) which are not offered by symmetric key cryptography. So why do we...
-
Given a sorted array of Comparable items, write functions floor () and ceiling () that return the index of the largest (or smallest) item not larger (or smaller) than an argument item in logarithmic...
-
Some audit firms develop very specific guidelines, either through quantitative guidelines or in tables, relating planning materiality to the size of sales or assets for a client. Other audit firms...
-
After an annual checkup, you leave your physicians office, where you weighed 683 N. You then get into an elevator that, conveniently, has a scale. Find the magnitude and direction of the elevators...
-
Airhead Oil Companys balance sheet includes three assets: Natural Gas, Oil, and Coal. Suppose Airhead Oil Company paid $1,900,000 cash for the right to work a mine with an estimated 200,000 tons of...
-
For the following situations, would you collect information using a sample or a population? Why? a. Statistics 201 is a course taught at a university. Professor Rauch has taught nearly 1,500 students...
-
Following are transactions for Ridge Company. March 21 Accepted a $11,100, 180-day, 10% note from Tamara Jackson in granting a time extension on her past-due account receivable. September 17 Jackson...
-
On January 1, 2024, Tennessee Harvester Corporation issued debenture bonds that pay interest semiannually on June 30 and December 31. Portions of the bond amortization schedule appear below:...
-
Describe the role of second messengers, such as cAMP and calcium ions, in signal transduction pathways. How do these molecules facilitate the transmission of extracellular signals to intracellular...
-
What two key values are identified for each performance parameter in the Capability Development Document (CDD) to bind the design of the system, yet provide the Program Manager with flexibility to...
-
The short-term financing policies can be flexible or restrictive. Discuss THREE (3) advantages and TWO (2) disadvantages of the Restrictive policy.
-
A neutral friendly nation has expressed interest in improving its national security and defense relationship with the US. The Office of SecDef has asked all of the DoD Components to expand their...
-
Alpha Mechanical Corporation (AMC) is a calendar year, accrual method, C Corporation. AMC is engaged in the business of selling and servicing specialized manufacturing equipment in the Aerospace...
-
Inventory management can help to optimize customers satisfaction, supplier capability, and production scheduling. Poor inventory management will cause insufficient raw materials for daily operations....
-
Moya is a baby Alien who accidentally reached earth. He is stuck in his spaceship which will get activated by a unique passcode. The spaceship shows a string S . . If Moya correctly tells the...
-
Kims Konstructions has assembled the following data for a proposed straw-reinforced brick maker (SRBM): SRBM Cost: $26,000 Life: 5 years Revenue (p.a.) $11,000 Operating Expenses (p.a.) $3,000...
-
This problem is based on information regarding productivity in leading Silicon Valley companies. In large corporations, an intimidator is an employee who tries to stop communication, sometimes...
-
Consumer Reports gave information about the ages at which various household products are replaced. For example, color TVs are replaced at an average age of μ = 8 years after purchase,...
-
Consider the students in your statistics class as the population and suppose they are seated in four rows of 10 students each. To select a sample, you toss a coin. If it comes up heads, you use the...
-
Burgers \& Fries, Inc., is authorized to issue an unlimited number of common shares and 10,000 preferred shares. During its first year, the business completed the following share issuance...
-
Citadel Sporting Goods is authorized to issue 5,000 preferred shares and 10,000 common shares. During a two-month period, Citadel completed these share-issuance transactions: Prepare the...
-
Sagebrush Software Lid. had the following selected account balances at December 31, 2020 (in thousands). Prepare the shareholders' equity section of Sagebrush Software's balance sheet (in thousands)....
Study smarter with the SolutionInn App