Question

In: Computer Science

which is based on Feistal design AES or DES?

which is based on Feistal design AES or DES?

Solutions

Expert Solution

The DES working and design are based on Feistel Design :

1. In the DES design, there are a number of rounds each round as a design structure like Feistel Design.

2. For every round, in the DES, the input bits to each round is divided into two parts of equal size.

3. On part is called the Left(Le) part and the other part is called Right(Ri) Part.

4. For the computation of input to the network round with left and right part, following equation are used.

5. Consider the round k with Left part as Le(k) and Right Part as Ri(k) and the key for the kth round as Key(k)

6. The input values for the next round in DES cipher i.e for round k+1, equations are :

  • Le(k+1) = Ri(k)
  • Ri(k+1) = F(Key(k),Ri(k))  XOR Le(k)

7. Here, we have used the swapping function to find out the left part of the k+1 found . This type of design is the same as Feistel Cipher.

8. For the right part of the k+1 round, a function F takes the input as the right part of the kth round and the key fo kth round . The result of his function is XORed with the left part of the kth round.


Related Solutions

In what aspects is AES superior to DES? What are the disadvantages of AES compared to...
In what aspects is AES superior to DES? What are the disadvantages of AES compared to DES? Take into consideration factors such as efficiency, complexity, scalability, flexibility, computational needs, security, resistance to attacks, etc.
AES has a larger block and key length compared to DES. If we ever had to...
AES has a larger block and key length compared to DES. If we ever had to do multiple encryptions with AES because we had computers fast enough to brute force a 128-bit key, would we need to move to Two-AES or Triple-AES?
a) Which parts of DES uses permutation method? b) Which parts of DES uses the substitution...
a) Which parts of DES uses permutation method? b) Which parts of DES uses the substitution method? c) Explain why DES can be invertible (verify each round is   easy to inverse).   d) Does DES require that the function f is invertible? Why?
What are the weaknesses of DES? Why triple DES is better than Double DES? What is...
What are the weaknesses of DES? Why triple DES is better than Double DES? What is Trusted Third Party (TTP)? What are the problems with TTP? Using Caesar cipher algorithm and key value = 4, encrypt the plain text “Network Security”. Show your work Using the following Polybius Square encrypt the plaintext “CRYPTOGRAPHY”. Show your work
Show that AES decryption is, in fact, the inverse of AES encryption
Show that AES decryption is, in fact, the inverse of AES encryption
Which of the 5 AES modes satisfies COA (Ciphertext only attack)
Which of the 5 AES modes satisfies COA (Ciphertext only attack)
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES...
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES competition. (b) What are the main four layers (steps within each round) of the AES and what is their role in the encryption? (c) The recommended key sizes for the AES are 128, 192 and 256 bits. How many rounds of AES should be done for each of these sizes? (d) DES has 8 different S-boxes, AES has only 1. State briefly negative security...
DES (a) What does Lucifer have in common with the DES? (b) What are the sizes...
DES (a) What does Lucifer have in common with the DES? (b) What are the sizes of the block and key space of the DES? (c) What does EFF stand for and what does it have to do with the DES? (d) What is DESX? (e) What is the key size of DES? What is the block size of DES? How many rounds are there in DES?
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
Given the discussion on the comparison between the population based design and the exposure-based design, we...
Given the discussion on the comparison between the population based design and the exposure-based design, we can compare the case-control design with the population-based design of the same sample size following the same logic. Please argue that a) the most powerful choice of sample sizes in case-control study is nD = nD(bar) = n/2. b)case-control study with equal sample sizes of cases and controls always leads to more powerful test than a population-based design of the same sample size
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT