1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
9

a. The DES algorithm is based on the idea of the Feistel cipher. Explain how the Feistel cipher structure achieves substitution

and permutation. b. A secure block cipher must be able to achieve strong confusion and diffusion in order to be able to viably resist cryptoanalysis. Explain what these concepts mean and why they are important.

Computers and Technology
2 answers:
madam [21]3 years ago
8 0

Answer:

a. Feistel Cipher is basically a design model used in many block encryption algorithms one of them is DES. The Feistel structure has many rounds of substitution followed by permutation. In each round the plaintext is processed.

A Feistel Cipher comprise of;

1. Divide plaintext block into two parts

2. Perform multiple rounds of

a. Substitution on left half

b. Permutation by swapping halves

See attachment for the diagram of a feistel cipher.

B.

The concept of confusion and diffusion were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

According to Shannon's definitions,

-Confusion means, making the relationship between the ciphertext and the key as complex and involved as possible.

It basically hides the relationship between the cipher text and the key. This property makes it difficult to find the key even tough there are many plaintext cipher text pairs created using the same key.

Diffusion is property that the non-uniformity which is much harder to detect. The distribution of the individual and pairs of neighbouring letters in the plaintext should be redistributed into the non-uniformity in the distribution of much larger structures of the ciphertext. The concept behind diffusion is to hide the relationship between the plaintext and the ciphertext. A cipher with good diffusion, should make sure that even if one bit in plaintext changes, then the ciphertext should change completely, in a manner such that its unpredictable.

Both Confusion and diffusion prevents the deduction of encryption key difficult. As a result this protects the original message or plaintext. Confusion and diffusion can be achieved using substitution and permutation.

Encryption methods use the principles of confusion and diffusion.

Confusion does the work of changing the data drastically from input to output by many ways like translate the data using a non-linear table created from the key.

Diffusion is used in encryption to make every bit of input affect every bit of the output which in tun makes the analysis difficult.

notka56 [123]3 years ago
5 0

Answer:

a. The encryption process uses the Feistel structure consisting multiple rounds of processing of the plaintext, each round consisting of a “substitution” step followed by a permutation step. The input block to each round is divided into two halves that can be denoted as L and R for the left half and the right half.

b. why

Confusion and diffusion In Shannon's original definitions, confusion refers to making the relationship between the key and the ciphertext as complex and involved as possible; diffusion refers to the property that the redundancy in the statistics of the plaintext is "dissipated" in the statistics of the ciphertext.

i. importance

Confusion and diffusion area unit the properties for creating a secure cipher. ... Confusion is employed for making uninformed cipher text whereas diffusion is employed for increasing the redundancy of the plain text over the foremost a part of the cipher text to create it obscure.

You might be interested in
Which risk management framework does the organization of standardization publish
olga2289 [7]

Answer:

ISO 31000:2009 publishes principles and generic guidelines on risk management.

Explanation:

ISO 31000:2009 can be applied to any public, private or community company, organization, society or individual. Hence, ISO 31000:2009 is not particular to either business or area.

ISO 31000:2009 can be implemented during the period of an industry and to a broad variety of actions, including policies and judgments, guidance, methods, functions, plans, goods, services, and assets.

ISO 31000:2009 can be implemented to any type of danger, whatever its kind, whether possessing positive or negative outgrowths.

3 0
4 years ago
________ sets up a point-to-point connection between two computer systems over an Internet Protocol (IP) network. A. Point-to-Po
nlexa [21]

Answer:

The correct answer is PPTP.

Explanation:

PPTP is the protocol that is used to create a connection which is referred to as tunnel and it transports data between two systems over the internet while also securing it with encryption. I hope this answer helps.

4 0
3 years ago
What is the meaning of 4 8 15 16 23 42?
Delicious77 [7]
The Numbers. ...The numbers 4<span>, </span>8<span>, </span>15<span>, </span>16<span>, </span>23<span> and </span>42<span> frequently recurred in Lost. Each corresponded with one of the final candidates to replace Jacob as protector of the Island. The numbers also formed the coefficients in an equation that predicted mankind's extinction.</span>
5 0
3 years ago
Who is typically considered to be the father of computing
Tanzania [10]
Charles Babbage is most often considered to be the father of computing after his invention of the  Analytical Engine in 1837 which contained <span>Arithmetic Logic Unit (ALU), basic flow control, and integrated memory which served as a general-purpose computer concept (and also very ahead of time in 1837).</span>
7 0
3 years ago
Which statement is true?
Alexeev081 [22]

Answer:

Bjarne Stroustrop published the first reference guide for C++

Explanation:

Bjarne Stroustrop is a computer scientist who created the C++ programming language while working at the AT&T Bell laboratory. He also published the first reference guide for the programming language.

In October 1985, the book, The C++ Programming Language, was published. It describes the c++ programming language and was the only documentation and reference guide for the programming language at the time. Newer editions have since been published.

7 0
3 years ago
Read 2 more answers
Other questions:
  • What makes a distributed denial of service attack "distributed"? It involves many ip addresses. It attacks multiple systems. It
    9·1 answer
  • 1. Caches are important to providing a high-performance memory hierarchy to processors. Below is a list of 32-bit memory address
    7·1 answer
  • Which element appears within the top margin of the document but does not form the part of the body of the text?
    15·1 answer
  • You want to establish the validity of a test designed for computer technicians using a predictive criterion-related validation s
    9·1 answer
  • What is information associated with a document to help describe that document called?
    14·1 answer
  • What is application software? A computer language for accessing data in a database. A character string used to identify the loca
    10·1 answer
  • Agile Software Development is based on Select one: a. Iterative Development b. Both Incremental and Iterative Development c. Inc
    11·1 answer
  • What is wrong with this code and correct it.
    12·1 answer
  • Could someone please help?​
    10·1 answer
  • The process of sending a result back to another part of the program is
    14·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!