Question

In: Computer Science

Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and...

Cryptography***

Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2 respectively. Is this method more secure than the regular single DES encryption? Please explain your reason.

Solutions

Expert Solution

Data encryption standard (DES) uses 56 bit key to encrypt any plain text which can be easily be cracked by using modern technologies. To prevent this from happening double DES and triple DES were introduced which are much more secured than the original DES because it uses 112 and 168 bit keys respectively. They offer much more security than DES.

Double DES is a encryption technique which uses two instance of DES on same plain text. In both instances it uses different keys to encrypt the plain text. Both keys are required at the time of decryption. The 64 bit plain text goes into first DES instance which than converted into a 64 bit middle text using the first key and then it goes to second DES instance which gives 64 bit cipher text by using second key

Double encryption is not equivalent to single encryption. Security does increase by double encryption, but it does not increase much. The security of DES depends on its having a large key space


Related Solutions

Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2...
Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2 respectively. Is this method more secure than the regular single DES encryption? Please explain your reason.
Cryptography- Run S-DES with key: 1000100111 and plaintext: 01010101
Cryptography- Run S-DES with key: 1000100111 and plaintext: 01010101
Cryptography*** For DES, what is the probability that two different keys will encrypt atleast 1 plaintext...
Cryptography*** For DES, what is the probability that two different keys will encrypt atleast 1 plaintext message to the same ciphertext output?
In this lab you will be encrypting a message. It is a simple encryption described in...
In this lab you will be encrypting a message. It is a simple encryption described in the problem. To program it remember that the ASCII code for ‘A’ is 65 and the other capital letters are in order 66, 67, 68, … The ASCII code for ‘a’ is 97 and the lowercase continues 98, 99, and so on. The hint is that a if a user type in a char with an ASCII code between 65 and 90, or 97...
Let’s say you have the ciphertext for the given plaintext. Plaintext: it was disclosed yesterday that...
Let’s say you have the ciphertext for the given plaintext. Plaintext: it was disclosed yesterday that several informal but direct contacts have been made with political representatives of the viet cong in Moscow Ciphertext: UZQSOVUOHXMOPVGPOZPEVSGZWSZOPFPESXUDBMETSXAIZVUEPHZHMDZSHZOWSFPAPPDTSVPQUZWYMXUZUHSXEPYEPOPDZSZUFPOMBZWPFUPZHMDJUDTMOHMQ Can you determine the cipher used? If yes, name the cipher. Explain why. Can you determine all/part of the key. If yes, give the key or part of the key. Explain how you deduced it.
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 2 positions to the left. a.What is the key? (The Key is 5A) b. Using the key and the above algorithm, decrypt the following message which contains a name (given in hex): BD 7D FA BC 78 3C 3D. Remember that you’ll have...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system...
Now let’s look at a more modern symmetric encryption. Assume that the algorithm for this system is to rotate the bits in the message right 4 positions, XOR the bits with the key, and rotate the bits 2 positions to the left. a. The key is 5A b. Using the key and the above algorithm, decrypt the following message which contains a name (given in hex): BD 7D FA BC 78 3C 3D. Remember that you’ll have to reverse the...
2. Let’s assume that you do find movement utilizing cytoplasmic streaming. However, a new question is...
2. Let’s assume that you do find movement utilizing cytoplasmic streaming. However, a new question is now brought up. Is this movement dependent on cytoskeletal elements and motor proteins and if so, which ones? Describe how you could test to see which cytoskeletal elements/motor proteins were responsible for the movement of your protein. What would your data look like? Note you can’t knockout any motor proteins or cytoskeletal elements. They are essential to life; if you knock them out, the...
Why do you think Cryptography is important in IT companies? How are they implemented?
Why do you think Cryptography is important in IT companies? How are they implemented?
In another scenario (not related to part a or b), let’s assume that you prefer the...
In another scenario (not related to part a or b), let’s assume that you prefer the 10-year loan because you want to pay off the loan faster.   Now the bank also offers a 10-year variable-interest mortgage loan with the first 3 years locked with an APR of 3%. And after 3 years, the bank will use floating interest rate based on market condition. Somehow you believe that the floating interest rate is going to be within range of 1% to...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT