0 evaluări0% au considerat acest document util (0 voturi)
92 vizualizări4 pagini
1. The document discusses various topics related to computer and IT security including cryptographic systems, symmetric cipher models, and the Feistel cipher structure.
2. Cryptographic systems can be categorized by the type of encryption operation used (e.g. substitution, transposition, product), the number of keys used (single or double key systems), and how plaintext is processed (block or stream ciphers).
3. The symmetric cipher model involves five basic elements - plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. It uses the same secret key during both encryption and decryption.
1. The document discusses various topics related to computer and IT security including cryptographic systems, symmetric cipher models, and the Feistel cipher structure.
2. Cryptographic systems can be categorized by the type of encryption operation used (e.g. substitution, transposition, product), the number of keys used (single or double key systems), and how plaintext is processed (block or stream ciphers).
3. The symmetric cipher model involves five basic elements - plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. It uses the same secret key during both encryption and decryption.
1. The document discusses various topics related to computer and IT security including cryptographic systems, symmetric cipher models, and the Feistel cipher structure.
2. Cryptographic systems can be categorized by the type of encryption operation used (e.g. substitution, transposition, product), the number of keys used (single or double key systems), and how plaintext is processed (block or stream ciphers).
3. The symmetric cipher model involves five basic elements - plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. It uses the same secret key during both encryption and decryption.
1|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
Department of Computer Science and Computer Engineering
NSW Assignment Stage 06 (Prac 06) Individual Submission: Hard copy/ Soft copy shown to the tutor/lecturer Deadline: End of this lab session Worth: 1% for lab work + 0.5% BONUS for at least 1 hour attendance
Objectives: (1) To understand and learn more about computer and IT security based on lecture notes and internet sources. Exercise 1 1. Explain the ways by which the cryptographic systems are categorized. Ans: Mainly in three ways: a. type of encryption operations used i. substitution (for example, in case of alphabet as well twenty replace t by z and w by a y) ii. transposition ,changing the position of the data or the character iii. product, multiply data with secret code. b. number of keys used i. single-key or private(same key for encryption and decryption) ii. two-key or public (different key for encryption and decryption) c. way in which plaintext is processed i. block (take a known sized block of data to encrypt) ii. stream (encryption is performed on each byte or word sequentially)
2. Explain the following: i. Plain text: Original message that needed to be sent. 2|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
ii. Cipher text: When the plain text is converted in to a coded message using the encryption operations. iii. Cipher: Cipher Algorithm is used to execute the cryptographic systems. Key iv. Encipher-The procedure of converting plain text to cipher text. v. Decipher: recovering/ retrieving the plain text from cipher. vi. Cryptography: study of encryption principles/methods. vii. Cryptanalysis: (code breaking) - study of principles/ methods of deciphering cipher text without knowing key.
3. Explain the Symmetric Cipher Model. Detail the five ingredients of the symmetric cipher model, shown in Stallings Figure
Plaintext - original message
Encryption algorithm performs substitutions/transformations on plaintext
Secret key control exact substitutions/transformations used in encryption algorithm
ciphertext - scrambled message
Decryption algorithm inverse of encryption algorithm
Recover Plaintext - original message
Its requirements a strong encryption algorithm a secret key known only to sender / receiver
Transmitting end Receiving end 3|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
Exercise 2 1. Explain Feistel Cipher Structure for implementing symmetric encryption with the help of a diagram. Feistel Cipher Structure : used for Multiple encryption
Design elements of Feistel Cipher 4|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
The exact realization of a Feistel network depends on the choice of the following parameters & design features: Block size key size - increasing size improves security, makes exhaustive key searching harder, but may slow cipher number of rounds - increasing number improves security Sub-key generation algorithm - greater complexity can make analysis harder, but slows cipher Round function - greater complexity can make analysis harder, but slows cipher fast Software en/decryption - more recent concern for practical use Ease of analysis - for easier validation & testing of strength
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging