Question

In: Computer Science

1) How large are the blocks that get fed through the AES Encryption algorithm? 2) What...

1) How large are the blocks that get fed through the AES Encryption algorithm?

2) What are the three possible key sizes for AES? How many rounds are there for each key size? How large is the keyspace?

3) List five distinct differences between the AES and DES algorithms.

4) List the 16 elements of GF(16) as polynomials. What is 3x^2+6x+1 equal to in GF(16), when the coefficients are reduced appropriately?

5) Use the table on slide 17 of the Chapter 4 slides to compute the inverse of x^4+x^3+1 in GF(256). Then verify that the product of x^4+x^3+1 and the inverse you computed is, in fact, 1 modulo the polynomial indicated in red on slide 17.

6) List three separate known attacks on AES. Include the weakness(es) of AES that they exploit and include the year in which the attack was first discovered

#understanding cryptography

#asap

Solutions

Expert Solution

1. The AES has three fixed 128-bit block ciphers with the cryptographic size of 128, 192 and 256 bits, the maximum block size that gets fed through the AES Encryption Algorithm is 256 bits.

----------------------------------------------------------------------------------------------------------------------------------------------------------------------

2. Three possible key sizes of AES are 128, 192 and 256 bits.

Round can be defined as that convert the input, called the plaintext, into the final output, called the ciphertext. The number of rounds is as follows:  

  • 10 rounds for 128-bit keys.
  • 12 rounds for 192-bit keys.
  • 14 rounds for 256-bit keys.

AES can use a symmetric key of 256 bits, resulting in a keyspace containing 2256 (or 1.1579 × 1077) possible keys.

---------------------------------------------------------------------------------------------------------------------------------------------------------------------

3.

5 Difference between AES and DES

AES DES
AES works on Substitution and Permutation Principle. DES work on Feistel Cipher structure.
AES has larger key size as compared to DES DES in comparison to AES has smaller key size
10 rounds for 128-bit algo
12 rounds for 192-bit algo
14 rounds for 256-bit algo
16 rounds
AES has large secret key comparatively hence, more secure. DES has a smaller key which is less secure.
AES is faster. DES is comparatively slower.

--------------------------------------------------------------------------------------------------------------------------------------------------------------------


Related Solutions

2) What are some toolboxes and blocks of Altair Embed? What are compound blocks and how...
2) What are some toolboxes and blocks of Altair Embed? What are compound blocks and how are they configured. Please included some example from your installation and experimentation.
What are the two modes of encryption that allow random access to the ciphertext blocks. Specifically,...
What are the two modes of encryption that allow random access to the ciphertext blocks. Specifically, if a hacker has the information about i-th cyphertext block Ci and it can find the plaintext Pi without having any other cyphertext blocks.
What cryptographic transport algorithm is considered to be significantly more secure than SSL? A. AES B....
What cryptographic transport algorithm is considered to be significantly more secure than SSL? A. AES B. HTTPS C. DES D. TLS
1. What is the purpose of Rete algorithm? Describe how it works. 2. What is a...
1. What is the purpose of Rete algorithm? Describe how it works. 2. What is a linearly separable classification problem? Give one example that is not linearly separable.
explain what an encryption algorithm is and what it can do to provide increased computer security...
explain what an encryption algorithm is and what it can do to provide increased computer security ?
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with...
what are the Vulnerabilites of honey encryption algorithm in cryptography? please give a detailed list with descritpions.
2.) What are the Tools of The FED that The FED uses? What is (define) The...
2.) What are the Tools of The FED that The FED uses? What is (define) The Discounted Rate? What is the purpose of The FED's Discounted rate?
1. What is A-Star (A*) Algorithm in Artificial Intelligence? 2. A* Algorithm Steps 3. Why is...
1. What is A-Star (A*) Algorithm in Artificial Intelligence? 2. A* Algorithm Steps 3. Why is A* Search Algorithm Preferred? 4. A* and Its Basic Concepts 5. What is a Heuristic Function? 6. Admissibility of the Heuristic Function 7. Consistency of the Heuristic Function 8. Find an Implementation in Java, C or Python just choose in which programming language you prefer only select one.
1.Storing all blocks of a large file on consecutive disk blocks would minimize seeks during sequential...
1.Storing all blocks of a large file on consecutive disk blocks would minimize seeks during sequential file reads. Why is it impractical to do so? What do operating systems do instead, to minimize the number of seeks during sequential reads? 2. Some databases use magnetic disks in a way that only sectors in outer tracks are used, while sectors in inner tracks are left unused. What might be the benefits of doing so? 3. A database administrator can choose how...
1.) What is (define) The Fed? When was The Fed created? What does The Fed. Consist...
1.) What is (define) The Fed? When was The Fed created? What does The Fed. Consist of? What are the services that The Fed. provides for the Macro-economy?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT