Question

Suppose the DES F function mapped every 32-bit input R, regardless of the value of the...

Suppose the DES F function mapped every 32-bit input R, regardless of the value of the input K, to
a) 32-bit string of ones,
b) bitwise complement of R.

1. What function would DES then compute?
2. How would the decryption look like?

3. Show that DES decryption is, in fact, the inverse of DES encryption.

Hint:

Use the following properties of the XOR operation:

(A XOR B) XOR C = A XOR (B XOR C)

A XOR A = 0

A XOR 0 = A

A XOR 1 = bitwise complement of A

where

A, B, C are n-bit strings of bits
0 is an n-bit string of zeros
1 is an n-bit string of ones

Homework Answers

Answer #1

Figure 1:

Figure 2:

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Programming Challenge B write a simple program that takes as input 2 16-bit strings of 0's...
Programming Challenge B write a simple program that takes as input 2 16-bit strings of 0's and 1's. (For example one string is assigned X and on string is assigned Y). Compute and and display the bitwise AND, bitwise OR, and bitwise XOR of the two string, (For example, the resultant string is Z). You may use the programming language of your choice. Alternatively, if you do not know a programming language, you may describe your algorithm in plain text...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
Ques.3: Consider the addition of n-bit numbers on a machine of width n-bits. Specifically, the two...
Ques.3: Consider the addition of n-bit numbers on a machine of width n-bits. Specifically, the two n-bit 2’s complement numbers A=an-1,an-2,…a1,a0 and B=bn-1,bn-2,…b-1,b0 are added to get the n-bit sum C=cn-1,cn-2,…c1,c0. Provide a Boolean function F (defined in terms of the input variables ai and bi and output variables ci, where 0 <= i < n ) that determines if an overflow has occurred in this addition – the function should be expressed in terms of input variables. F should...
**please write code with function definition taking in input and use given variable names** for e.g....
**please write code with function definition taking in input and use given variable names** for e.g. List matchNames(List inputNames, List secRecords) Java or Python Please Note:    * The function is expected to return a STRING_ARRAY.      * The function accepts following parameters:      *  1. STRING_ARRAY inputNames      *  2. STRING_ARRAY secRecords      */ Problem Statement Introduction Imagine you are helping the Security Exchange Commission (SEC) respond to anonymous tips. One of the biggest problems the team faces is handling the transcription of the companies reported...
For a C program hangman game: Create the function int setup_game [int setup_game ( Game *g,...
For a C program hangman game: Create the function int setup_game [int setup_game ( Game *g, char wordlist[][MAX_WORD_LENGTH], int numwords)] for a C program hangman game. (The existing code for other functions and the program is below, along with what the function needs to do) What int setup_game needs to do setup_game() does exactly what the name suggests. It sets up a new game of hangman. This means that it picks a random word from the supplied wordlist array and...
Curve-Fit Function USING MATLAB Using the top-down design approach, develop a MATLAB function A8P2RAlastname.m that reads...
Curve-Fit Function USING MATLAB Using the top-down design approach, develop a MATLAB function A8P2RAlastname.m that reads data from a file and performs regression analysis using polyfit and polyval. The function shall have the following features: The input arguments shall include the file name (string), a vector of integers for the degrees of polynomial fits to be determined, and an optional plot type specifier (‘m’ for multiple plots, ‘s’ for a single plot - default). The data files will be text...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT