1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
SIZIF [17.4K]
4 years ago
9

a. The DES algorithm is based on the idea of the Feistel cipher. Explain how the Feistel cipher structure achieves substitution

and permutation. b. A secure block cipher must be able to achieve strong confusion and diffusion in order to be able to viably resist cryptoanalysis. Explain what these concepts mean and why they are important.

Computers and Technology
2 answers:
madam [21]4 years ago
8 0

Answer:

a. Feistel Cipher is basically a design model used in many block encryption algorithms one of them is DES. The Feistel structure has many rounds of substitution followed by permutation. In each round the plaintext is processed.

A Feistel Cipher comprise of;

1. Divide plaintext block into two parts

2. Perform multiple rounds of

a. Substitution on left half

b. Permutation by swapping halves

See attachment for the diagram of a feistel cipher.

B.

The concept of confusion and diffusion were identified by Claude Shannon in his paper Communication Theory of Secrecy Systems, published in 1949.

According to Shannon's definitions,

-Confusion means, making the relationship between the ciphertext and the key as complex and involved as possible.

It basically hides the relationship between the cipher text and the key. This property makes it difficult to find the key even tough there are many plaintext cipher text pairs created using the same key.

Diffusion is property that the non-uniformity which is much harder to detect. The distribution of the individual and pairs of neighbouring letters in the plaintext should be redistributed into the non-uniformity in the distribution of much larger structures of the ciphertext. The concept behind diffusion is to hide the relationship between the plaintext and the ciphertext. A cipher with good diffusion, should make sure that even if one bit in plaintext changes, then the ciphertext should change completely, in a manner such that its unpredictable.

Both Confusion and diffusion prevents the deduction of encryption key difficult. As a result this protects the original message or plaintext. Confusion and diffusion can be achieved using substitution and permutation.

Encryption methods use the principles of confusion and diffusion.

Confusion does the work of changing the data drastically from input to output by many ways like translate the data using a non-linear table created from the key.

Diffusion is used in encryption to make every bit of input affect every bit of the output which in tun makes the analysis difficult.

notka56 [123]4 years ago
5 0

Answer:

a. The encryption process uses the Feistel structure consisting multiple rounds of processing of the plaintext, each round consisting of a “substitution” step followed by a permutation step. The input block to each round is divided into two halves that can be denoted as L and R for the left half and the right half.

b. why

Confusion and diffusion In Shannon's original definitions, confusion refers to making the relationship between the key and the ciphertext as complex and involved as possible; diffusion refers to the property that the redundancy in the statistics of the plaintext is "dissipated" in the statistics of the ciphertext.

i. importance

Confusion and diffusion area unit the properties for creating a secure cipher. ... Confusion is employed for making uninformed cipher text whereas diffusion is employed for increasing the redundancy of the plain text over the foremost a part of the cipher text to create it obscure.

You might be interested in
What type of device does a computer turn to first when attempting to make contact with a host with a known IP address on another
mihalych1998 [28]

Answer: the DNS server

Explanation:

4 0
3 years ago
Read 2 more answers
What occurs when a company knows enough about a customer's likes and dislikes that it can fashion offers more likely to appeal t
Norma-Jean [14]

Answer:

Personalization

Explanation:

Recommendation systems are becoming a powerful tool in our times today, from only shopping to healthcare provision. One major aspect of Recommender systems is Personalization.

Personalization is a concept of adjusting a service or product to greatly suit the customer. Personalization can be drawn by the information provided by the individual such as location, gender, marital status, etc. or drawn from other inferences retrieved from the customer, such as:

  1. the most clicked service category of a customer,
  2. customer browsing patterns or
  3. services or products previously obtained by a customer.

These inferences retrieved from customers can greatly improve customer satisfaction and get them drawn to the system.

5 0
4 years ago
One of your coworkers downloaded several, very large video files for a special project she's working on for a new client.
Anika [276]

Answer:

B. Top listeners

Explanation:

Top listeners gives a detailed information about the user who received the most data, downloads the largest size of data or user streaming from the internet.

Hence, when you run your network monitor, your coworker's computer will likely show up on top listeners list.

3 0
4 years ago
Following program use in coding
storchak [24]

Hmmmmmm..... I think its java if I'm correct

7 0
3 years ago
Which decision maker is the most desirable to have in a workplace
Leni [432]
Team decision I believe
5 0
4 years ago
Other questions:
  • What special identity group specifically includes any user account (except the Guest) logged into a computer or domain with a va
    14·1 answer
  • Answer all of the questions correctly and you will be amazing. Fill in Blanks
    8·1 answer
  • Write a function "nonRepeatings" that takes a string "s3" and returns the non-repeating characters in this string. Sample Input
    11·1 answer
  • What is the problem with paying only your minimum credit card balance each month​
    5·2 answers
  • On the seventh day of the iteration, the team realizes that they will not complete 5 of the 13 stories. the product owner says s
    12·1 answer
  • In the Word 2016 window, where is the Status bar located?
    11·1 answer
  • CHALLENGE ACTIVITY 7.3.1: Functions: Factoring out a unit-conversion calculation. Write a function so that the main() code below
    11·1 answer
  • Indicates the beginning and ending of your code written in HTML
    12·1 answer
  • Why Do You Need to Set Goals for a LinkedIn Automation Campaign?
    15·1 answer
  • Testing a website includes visiting every web page on the site and selecting every link, tab, and button available.
    11·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!