1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
3 years ago
9

a. The DES algorithm is based on the idea of the Feistel cipher. Explain how the Feistel cipher structure achieves substitution

and permutation. b. A secure block cipher must be able to achieve strong confusion and diffusion in order to be able to viably resist cryptoanalysis. Explain what these concepts mean and why they are important.

Computers and Technology
2 answers:
madam [21]3 years ago
8 0

Answer:

a. Feistel Cipher is basically a design model used in many block encryption algorithms one of them is DES. The Feistel structure has many rounds of substitution followed by permutation. In each round the plaintext is processed.

A Feistel Cipher comprise of;

1. Divide plaintext block into two parts

2. Perform multiple rounds of

a. Substitution on left half

b. Permutation by swapping halves

See attachment for the diagram of a feistel cipher.

B.

The concept of confusion and diffusion were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

According to Shannon's definitions,

-Confusion means, making the relationship between the ciphertext and the key as complex and involved as possible.

It basically hides the relationship between the cipher text and the key. This property makes it difficult to find the key even tough there are many plaintext cipher text pairs created using the same key.

Diffusion is property that the non-uniformity which is much harder to detect. The distribution of the individual and pairs of neighbouring letters in the plaintext should be redistributed into the non-uniformity in the distribution of much larger structures of the ciphertext. The concept behind diffusion is to hide the relationship between the plaintext and the ciphertext. A cipher with good diffusion, should make sure that even if one bit in plaintext changes, then the ciphertext should change completely, in a manner such that its unpredictable.

Both Confusion and diffusion prevents the deduction of encryption key difficult. As a result this protects the original message or plaintext. Confusion and diffusion can be achieved using substitution and permutation.

Encryption methods use the principles of confusion and diffusion.

Confusion does the work of changing the data drastically from input to output by many ways like translate the data using a non-linear table created from the key.

Diffusion is used in encryption to make every bit of input affect every bit of the output which in tun makes the analysis difficult.

notka56 [123]3 years ago
5 0

Answer:

a. The encryption process uses the Feistel structure consisting multiple rounds of processing of the plaintext, each round consisting of a “substitution” step followed by a permutation step. The input block to each round is divided into two halves that can be denoted as L and R for the left half and the right half.

b. why

Confusion and diffusion In Shannon's original definitions, confusion refers to making the relationship between the key and the ciphertext as complex and involved as possible; diffusion refers to the property that the redundancy in the statistics of the plaintext is "dissipated" in the statistics of the ciphertext.

i. importance

Confusion and diffusion area unit the properties for creating a secure cipher. ... Confusion is employed for making uninformed cipher text whereas diffusion is employed for increasing the redundancy of the plain text over the foremost a part of the cipher text to create it obscure.

You might be interested in
Differentiate between Scope and Linkage
Lera25 [3.4K]

Answer: The difference between the scope and linkage is as follows:-

  • Scope of the variable is defined as the variable view from different program parts whereas the linkage is described as the link that is made between the variable and the declaration function having the common name.
  • Scope of variable describes about the existing time of the variable in the program whereas linkage is defined for the name of variable present in the program is available at all time .

6 0
3 years ago
A malicious user in your organization was able to use the Trinity Rescue Kit to change the password on a department manager's co
netineya [11]

Answer:

The answer is "The PC should be kept in a physically secure location".

Explanation:

In general, malicious users are hackers as well as malicious users. This user indicates that even a rogue worker, contractor, student, and another consumer who uses his sensitive rights is indeed a common word of violation of information in security circles and the headlines, and to manage the data from the theft the system should be on the physically secure location, that refers to any place, a room or a group of room within facilities of physical or staff security protocols that are sufficient to support the AI-based on LEIN and related Is a physically safe room.

7 0
3 years ago
Write code statements that prompt for and read a double value from the user, and then print the result of raising that value to
andriy [413]

Answer:

Following are the code in Java Language:

Scanner sc = new Scanner(System.in); // create a instance of scanner class

DecimalFormat frmt = new DecimalFormat("0.###"); // create a instance of                // DecimalFormat class

System.out.println ("Enter the value: ");

double number = scan.nextDouble(); // Read the value by thje user

System.out.println (fmmt.format(Math.pow(number, 4))); // display the value

Explanation:

Following are the description of the code

  • Create an instance scanner class i.e "sc".
  • Create an instance of DecimalFormat class i.e "frmt".
  • Read the value by the user in the "number" variable of type double by using the nextDouble()method.
  • Finally, display the value by using System.out.println method. In this, we call the method format. The Math.pow() function is used to calculating the power up to the fourth value.

5 0
3 years ago
What protein is found in hair and nails
Yuliya22 [10]

Keratin is found in both hair and nails.

Hope this helps!

4 0
3 years ago
Read 2 more answers
Name three output devices
san4es73 [151]

Monitor

Printers

Plotters.

8 0
3 years ago
Other questions:
  • A(n) ____________________ defines the number and type of daemons that are loaded into memory and executed by the kernel on a par
    12·1 answer
  • What is the key benefit of using RAM in a computer?
    12·1 answer
  • Interest accumulated on the principle of a loan must also be paid. The accumulated interest is known as which of the following?
    7·1 answer
  • 2
    11·1 answer
  • The function of the file server is to : 1. store data and software programs that can be used by client computers on the network.
    12·1 answer
  • Consider the following code segment. int[] seq = {3, 1, 8, 4, 2, 5}; for (int k = 1; k < seq.length; k++) { if (seq[k] >=
    5·1 answer
  • Name the application used for creating Presentations___
    5·2 answers
  • Which information can you apply to every page of your document with the page layout options?
    9·1 answer
  • Give an idea of a law u would like to create
    5·2 answers
  • write an assembly program that uses the output compare function of a timer to toggle an led every second
    6·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!