Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Homework Help/Study Tips Expert

Data Encryption Standard DES

The Data Encryption Standard (DES) specifies a FIPS accepted cryptographic algorithm as essential by FIPS 140-1. This publication provides a complete description of a mathematical algorithm for decrypting (deciphering) and encrypting (enciphering) binary coded information. Enciphering data converts it to an unintelligible form called cipher. Deciphering cipher converts the data back to its original form called plaintext. The algorithm described in this standard specifies both enciphering and deciphering operations which are based on a binary number called a key.

A key consists of 64 binary digits ("O"s or "1"s) of which 56 bits are erratically used and generated directly by the algorithm. The other 8 bits, which are not used by the algorithm, are used for error finding. The 8 error detecting bits are set to make the parity of every 8-bit byte of the key odd, i.e., there is an odd number of "1"s in every 8-bit byte1. Approved users of encrypted computer data must have the key that was used to encrypt the data in order to decrypt it. The encryption algorithm particular in this standard is generally known among those using the standard. The unique key chosen for use in a particular application makes the results of enciphering data using the algorithm unique.

Range of a different key causes the cipher that is formed for any known set of inputs to be different. The cryptographic security of the data depends on the security provided for the key used to encrypt and decrypt the data.

Data can be recovered from secret message only by using accurately the same key used to encipher it. Illegal receiver of the secret message who know the algorithm but do not have the correct key cannot obtain the original data algorithmically. Though, anyone who does have the algorithm and the key can easily decode the cipher and obtain the original data. A usual algorithm based on a secure key thus provides a basis for exchanging encrypted computer data by issuing the key used to encipher it to those certified to have the data.

Data that is measured sensitive by the liable authority, data that has a high value, or data that represents a high value should be cryptographically confined if it is susceptible to unauthorized exposé or unnoticed modification during transmission or while in storage. A risk analysis should be performed under the way of a responsible authority to determine potential threats. The costs of providing cryptographic security using these standard as well as substitute methods of provided that this protection and their relevant costs should be projected. An accountable authority then should make a choice, based on these analyses, whether or not to use cryptographic security and this standard.

Homework Help/Study Tips, Others

  • Category:- Homework Help/Study Tips
  • Reference No.:- M9511197

Have any Question?


Related Questions in Homework Help/Study Tips

You are to conduct a breaching experiment for this

You are to conduct a "breaching experiment." For this assignment you will need to violate a minor social norm and then analyze the reactions of others who observed your "deviant" act. You may need to repeat your norm vio ...

Answer the following question 1 design a community justice

Answer the following Question : 1. Design a community justice strategy using Clear's argument. Thoroughly describe the elements of the strategy, and explain why your proposed strategy is consistent with Clear's ideas in ...

Question 1 what are the four major-government sponsored

Question: 1) What are the four major-government sponsored insurance programs and who do they serve? 2) Name and describe three methods used by most healthplans to create their fee schedule that they use to pay physicians ...

Quesiton directions for this assignment you are required to

Quesiton: Directions: For this assignment you are required to write a paper exploring the history of developmental disabilities using the "Parallels in Time: A History of Developmental Disabilities" website. Be sure to u ...

Question refer back to the week 2 company hoosier media inc

Question: Refer back to the Week 2 company, Hoosier Media, Inc. Your consulting firm is now ready to present suggestions regarding the strategic plan of Hoosier Media, Inc. In a 10- to 20-slide presentation with speaker ...

Question the swot analysis must be done on the medical

Question: The SWOT Analysis must be done on the Medical University of South Carolina in Charleston, S.C. SWOT Analysis This week's assignment will allow you to generate content that you will incorporate into the Market A ...

Question identify two areas of nursing practice which

Question: Identify two areas of nursing practice, which evidence-based practice has improved patient outcomes. State the study and its impact on patient care. How have these findings changed your nursing practice? Please ...

Technology your text shares many negative effects of

Technology Your text shares many negative effects of technology and the media's influence on children. Regardless, technology is increasing rapidly and is only becoming a larger portion of our children's lives. After rea ...

Cultural and linguistic differenceslisten to the cultural

Cultural and Linguistic Differences Listen to the Cultural and Linguistic Differences podcast from The IRIS Center, or read the transcript. Consider what Donna Ford has to say about prejudice and stereotyping. Then, read ...

Using a least developed country as an example do some

Using a least developed country as an example, do some research on the distribution and use of IMF and World Bank funds. Can you find any evidence that monetary assistance to this developing country was misused or stolen ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As