Question

In: Computer Science

which is based on Feistal design AES or DES?

which is based on Feistal design AES or DES?

Solutions

Expert Solution

The DES working and design are based on Feistel Design :

1. In the DES design, there are a number of rounds each round as a design structure like Feistel Design.

2. For every round, in the DES, the input bits to each round is divided into two parts of equal size.

3. On part is called the Left(Le) part and the other part is called Right(Ri) Part.

4. For the computation of input to the network round with left and right part, following equation are used.

5. Consider the round k with Left part as Le(k) and Right Part as Ri(k) and the key for the kth round as Key(k)

6. The input values for the next round in DES cipher i.e for round k+1, equations are :

  • Le(k+1) = Ri(k)
  • Ri(k+1) = F(Key(k),Ri(k))  XOR Le(k)

7. Here, we have used the swapping function to find out the left part of the k+1 found . This type of design is the same as Feistel Cipher.

8. For the right part of the k+1 round, a function F takes the input as the right part of the kth round and the key fo kth round . The result of his function is XORed with the left part of the kth round.


Related Solutions

In what aspects is AES superior to DES? What are the disadvantages of AES compared to...
In what aspects is AES superior to DES? What are the disadvantages of AES compared to DES? Take into consideration factors such as efficiency, complexity, scalability, flexibility, computational needs, security, resistance to attacks, etc.
a) Which parts of DES uses permutation method? b) Which parts of DES uses the substitution...
a) Which parts of DES uses permutation method? b) Which parts of DES uses the substitution method? c) Explain why DES can be invertible (verify each round is   easy to inverse).   d) Does DES require that the function f is invertible? Why?
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES...
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES competition. (b) What are the main four layers (steps within each round) of the AES and what is their role in the encryption? (c) The recommended key sizes for the AES are 128, 192 and 256 bits. How many rounds of AES should be done for each of these sizes? (d) DES has 8 different S-boxes, AES has only 1. State briefly negative security...
Which of the 5 AES modes satisfies COA (Ciphertext only attack)
Which of the 5 AES modes satisfies COA (Ciphertext only attack)
DES (a) What does Lucifer have in common with the DES? (b) What are the sizes...
DES (a) What does Lucifer have in common with the DES? (b) What are the sizes of the block and key space of the DES? (c) What does EFF stand for and what does it have to do with the DES? (d) What is DESX? (e) What is the key size of DES? What is the block size of DES? How many rounds are there in DES?
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
Given the discussion on the comparison between the population based design and the exposure-based design, we...
Given the discussion on the comparison between the population based design and the exposure-based design, we can compare the case-control design with the population-based design of the same sample size following the same logic. Please argue that a) the most powerful choice of sample sizes in case-control study is nD = nD(bar) = n/2. b)case-control study with equal sample sizes of cases and controls always leads to more powerful test than a population-based design of the same sample size
What are the sources of background signals in ICP-AES
What are the sources of background signals in ICP-AES
What are the advantages and disadvantages of implementing Design of Experiment based on factorial design and...
What are the advantages and disadvantages of implementing Design of Experiment based on factorial design and One Factor at a Time (OFAT)? Give examples to your answer!
Design; produce an outline of a design for energy storage system based on existing the technology...
Design; produce an outline of a design for energy storage system based on existing the technology that will deliver 0.5 MVA on a short-term basis (you can choose the short term period based on an evaluation of the constraints that would be in place) to a 50 Hz grid system. please note; do not copy load leveling from the online website please, build your own design, build a block diagram of the intended design, the cost, the output power, and...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT