Question: Feistels cipher (software implementation with 2 ciphering modes ECB and CBC) show how feistels cipher implements and use 7 test cases to prove DOCUMENTATION: Description

"Feistels cipher (software implementation with 2 ciphering modes ECB and CBC)"

show how feistels cipher implements and use 7 test cases to prove

DOCUMENTATION:

Description of the used algorithm (short theory)

Functional description of the application (input data format, output text on console, format of output data etc.)

Description of designed code structure (for example, mixing functions, shifting, main round function etc. with indication of input/output arguments, short description of each block etc.)

Test that were done with comments about the correctness of the results (own implementation and reference one) please indicate the source of reference values and compare them with your implementation (important) -> MINIMUM 7 TEST cases (with different values etc.)

CODE: write in Python

CANNOT use standard cryptographic libraries the main algorithm needs to be implemented by yourself

Comments in code are required for example short descriptions of used functions

The code should be divided into functional blocks representing parts of an algorithm (not everything in one function)

Some simple user interface needs to be provided (console mode for example)

TESTS: in python

Selected reference values for tests provided externally (depends bit on a project) upon selection e.g. from reference algorithms documentations, Linux embedded functions or trusted application that can provide results based on input-output scheme

MINIMUM 7 TEST cases (with different values etc.)

Procedure of tests (should be provided at least few tests): o Run designed ECRYP application with selected input o Compare the output from the designed application with corresponding trusted output value (reference value

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Programming Questions!