Computers and Technology

This problem provides a numerical example of encryption using a one-round version of DES. We start with the same bit pattern for the key and the plaintext, namely: Hexadecimal notation: 0 1 2 3 4 5 6 7 8 9 A B C D E F
Binary notation: 0000 0001 0010 0011 0100 0101 0110 0111
1000 1001 1010 1011 1100 1101 1110 1111

Derive K1, the first-round sub-key. You need to do the following steps
`Perform the Permuted Choice One (PC-1) in Table 3.4(a) to reduce the key from 64 bits to 56 bits.
`Apply the Left Circular Shift (Please refer Table 3.4(d) for the schedule of left shifts)
`Apply the Permuted Choice Two (PC-2) to derive K1.

Derive L0 and R0.

Expand R0 to get E[R0] (which is 48 bits), where is the expansion permutation of Table 3.2(c).

Calculate A = E[R0] βŠ• K1.

Group the 48-bit result of (d) into sets of 6 bits and evaluate the corresponding S-box substitutions. Make sure to use the corresponding S-box in Table 3.3 for each set of 6 bits.

Concatenate the results of (e) to get a 32-bit result,

Apply the permutation in Table 3.2(d) to get P(B).

Calculate R1 = P(B) βŠ• L0.

Write down the ciphertext L1 and R1 in binary format and hexadecimal format.

answer
Answers: 2

Other questions on the subject: Computers and Technology

image
Computers and Technology, 22.06.2019 06:00, isalita
Pthe price of tickets in a group when a purchased in bulk can be found with the equation c=px+24 were c is the cost, p is the number of people, and x is the price per ticket. what is price of of each ticket if it costs $189 to buy tickets for 15 people ? a $8 b $24c $9d $11 show work
Answers: 1
image
Computers and Technology, 22.06.2019 23:30, ansonhunter8891
What are listed in the vertical columns across the top of the event editor? a. file names b. conditions c. check marks d. action types
Answers: 1
image
Computers and Technology, 23.06.2019 03:30, natalie2sheffield
Hashtags serve to identify the topic of a given tweet true false
Answers: 2
image
Computers and Technology, 23.06.2019 09:30, ranmmm
The place where the extended axis of the earth would touch the celestial sphere is called the celestial
Answers: 1
Do you know the correct answer?
This problem provides a numerical example of encryption using a one-round version of DES. We start w...

Questions in other subjects: