Question

In: Computer Science

which is based on Feistal design AES or DES?

which is based on Feistal design AES or DES?

Solutions

Expert Solution

The DES working and design are based on Feistel Design :

1. In the DES design, there are a number of rounds each round as a design structure like Feistel Design.

2. For every round, in the DES, the input bits to each round is divided into two parts of equal size.

3. On part is called the Left(Le) part and the other part is called Right(Ri) Part.

4. For the computation of input to the network round with left and right part, following equation are used.

5. Consider the round k with Left part as Le(k) and Right Part as Ri(k) and the key for the kth round as Key(k)

6. The input values for the next round in DES cipher i.e for round k+1, equations are :

  • Le(k+1) = Ri(k)
  • Ri(k+1) = F(Key(k),Ri(k))  XOR Le(k)

7. Here, we have used the swapping function to find out the left part of the k+1 found . This type of design is the same as Feistel Cipher.

8. For the right part of the k+1 round, a function F takes the input as the right part of the kth round and the key fo kth round . The result of his function is XORed with the left part of the kth round.


Related Solutions

In what aspects is AES superior to DES? What are the disadvantages of AES compared to...
In what aspects is AES superior to DES? What are the disadvantages of AES compared to DES? Take into consideration factors such as efficiency, complexity, scalability, flexibility, computational needs, security, resistance to attacks, etc.
AES has a larger block and key length compared to DES. If we ever had to...
AES has a larger block and key length compared to DES. If we ever had to do multiple encryptions with AES because we had computers fast enough to brute force a 128-bit key, would we need to move to Two-AES or Triple-AES?
a) Which parts of DES uses permutation method? b) Which parts of DES uses the substitution...
a) Which parts of DES uses permutation method? b) Which parts of DES uses the substitution method? c) Explain why DES can be invertible (verify each round is   easy to inverse).   d) Does DES require that the function f is invertible? Why?
Show that AES decryption is, in fact, the inverse of AES encryption
Show that AES decryption is, in fact, the inverse of AES encryption
What are the weaknesses of DES? Why triple DES is better than Double DES? What is...
What are the weaknesses of DES? Why triple DES is better than Double DES? What is Trusted Third Party (TTP)? What are the problems with TTP? Using Caesar cipher algorithm and key value = 4, encrypt the plain text “Network Security”. Show your work Using the following Polybius Square encrypt the plaintext “CRYPTOGRAPHY”. Show your work
Which of the 5 AES modes satisfies COA (Ciphertext only attack)
Which of the 5 AES modes satisfies COA (Ciphertext only attack)
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES...
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES competition. (b) What are the main four layers (steps within each round) of the AES and what is their role in the encryption? (c) The recommended key sizes for the AES are 128, 192 and 256 bits. How many rounds of AES should be done for each of these sizes? (d) DES has 8 different S-boxes, AES has only 1. State briefly negative security...
Arithmetic in the AES MixColumns operation (22 marks) Recall that the MixColumns operation in AES performs...
Arithmetic in the AES MixColumns operation Recall that the MixColumns operation in AES performs arithmetic on 4-byte vectors using the polynomial M(y) = y4 + 1. In this arithmetic, we have M(y) = 0, so y4 = 1. (a) In this part of the problem, we consider multiplication of 4-byte vectors (viewed as polyno- mials of degree ≤ 3 whose coefficients are bytes) by powers of y. i. Formally prove that in this arithmetic, multiplication of any 4-byte vector by...
DES (a) What does Lucifer have in common with the DES? (b) What are the sizes...
DES (a) What does Lucifer have in common with the DES? (b) What are the sizes of the block and key space of the DES? (c) What does EFF stand for and what does it have to do with the DES? (d) What is DESX? (e) What is the key size of DES? What is the block size of DES? How many rounds are there in DES?
Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is...
Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem. Your response must include the type of Algorithm used, the size of data blocks that can be processed, and the lengths of the cipher keys.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT