Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1) Determine the expanded key length (in terms of the number of words) for AES when we use key of length 256 bits. Also, draw the overall structure of AES for a 256-bit key. Show all the inputs and outputs (similar to the overall structure shown for AES with a 128-bit key).
2) Derive the 32-bit output for the 48-bit input using the S-Box table given for DES

48-bit input


1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

0

0

1

1

1

0

1

1

0

1

0

0

1

1

1

0

0

1

0

0

0

1

1

1

 

25

26

27

28

29

30

31

32

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

1

1

0

0

0

1

0

0

1

0

1

1

0

0

0

1

1

0

1

1

1

0

0

0

 

6-bit input

Row value

Column value

S-box result

4-bit output

S-Box S1

 

 

 

 

 

S-Box S2

 

 

 

 

 

S-Box S3

 

 

 

 

 

S-Box S4

 

 

 

 

 

S-Box S5

 

 

 

 

 

S-Box S6

 

 

 

 

 

S-Box S7

 

 

 

 

 

S-Box S8

 

 

 

 

 

 

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

32

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3) Would it be possible to reduce the key search space for 56-bit key-based DES from O(256) to O(255) using a "known plaintext attack" and the bit-wise complement property of DES? Why or why not? Justify your answer.

4 Suppose the DES f function (Feistel function) maps every 32-bit input R (regardless of the value of the input K) to 32-bit string of 1s. Given that the input to a round j is Lj-1 and Rj-1, determine what would DES compute after every two rounds and after every four rounds? [Hint: Use the XOR properties - A A = 0; A 1 = A′; A 0 = A]

5)Given the following state array (in hex.) for an AES encryption round:

52        6b        7c        8d

74        99        14        2a

fb         a2        b3        c2

54        8d        1c        93

(a) Perform the Sub Bytes step followed by the Shift Rows step and write the output array (in hex.)

(b) When the output array of (a) is subjected to the AES Mix Columns step, write the output value of the byte in the third row and second column of the product array. Show all the steps.

 

 

 

 

 

 

 

 

 

 

 

 


6) (25 pts) RSA Algorithm: Let p = 7 and q = 11.
a) Determine the encryption and decryption keys. Your encryption key of choice (e) should be above 6.
b) Show the decryption for a ciphertext 9. You should use the decryption key found using the Extended Euclid's algorithm in step (a).

 

 

 

 

 

 

 

 

 

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91421951
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Computer Engineering

System analysis and design1 explain the difference between

System Analysis and Design 1) Explain the difference between too much feedback and too little feedback and provide a scenario for each one (two scenarios are needed - one for a lot of feedback and one for too much) and w ...

Systems analysis projectpersonal trainer inc owns and

Systems analysis project Personal Trainer, Inc. owns and operates fitness centers in a dozen Midwestern cities. The centers have done well, and the company is planning an international expansion by opening a new "superce ...

What is the difference between dekkers algorithm and igloo

What is the difference between Dekkers Algorithm and Igloo approach? Please provide examples that can explain this.

Review questionsrq web server environment kroenke book chap

Review Questions(RQ) Web Server Environment Kroenke Book Chap 11 The Review Questions (RQ) listed below can also be found in the Kroenke textbook, starting on page 526. This is NOT the entire list of Review Questions, bu ...

What type of economic system does norway have explain some

What type of economic system does Norway have? Explain some of the benefits of this system to the country and some of the drawbacks,

Software engineeringeach of the following heuristics helps

Software Engineering: Each of the following heuristics helps make a good module according to some modularity principle. Identify the principle for each letter. Modularity principles: Principle of Small Modules Principle ...

Question advanced microprocessors amp labdirect addressing

Question: Advanced Microprocessors & Lab Direct Addressing and Initializing the Stack Directions: Please answer BOTH of the questions. About 50-75 words per question. Plagiarism will be disputed, so please be 100% origin ...

The system development team at the xyz company is working

The system development team at the XYZ Company is working on developing a new customer order entry system. In the process of designing the new system, the team has identified the following data entity attributes: Invento ...

Please tell me how to use the open system interconnection

Please tell me how to use the Open System Interconnection (OSI) model to troubleshoot network performance issues

A survey is taken of people in the class of favorite flavor

A survey is taken of people in the class of favorite flavor of ice cream among a forced choice of chocolate, vanilla, or strawberry. 70% prefer chocolate, 20% prefer vanilla, and 10% prefer strawberry. a) What is the ent ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As