Question

3. For DES, what is the probability that two different keys will encrypt at least 1...

3. For DES, what is the probability that two different keys will encrypt at least 1 plaintext message to the same ciphertext output?

Homework Answers

Answer #1

Getting same ciphertext output from the same plaintext with two different keys is called as key clustering.

Semi weak keys which are the keys that are inverse to each other is a key cluster. Ek2 (Ek1 (P)) = P, wher k1 is key 1, k2 is key 2.

Key domain of DES = 256

The total number of weak keys =4

The total number of semi weak keys =12

The total number of possible weak keys =48

The total number of keys resulting same ciphertext = 64 (4 + 12 + 48)

The probability of choosing the clustered keys = Key domain of DES / total number of keys resulting same ciphertext

= ( 64 (4 + 12 + 48) ) / 256

= (64(64)) / 256

= 4096 / 256

= 5.6843189 * 10-16

The probability of choosing the clustered keys is 5.6843189 * 10-16 which is nearly zero and highly impossible.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
DES uses a 56-bit key. Let's say you encrypt a message using single DES. With a...
DES uses a 56-bit key. Let's say you encrypt a message using single DES. With a 56-bit key there are 2^56 possible different keys. On average an attacker would only need to try half this number of keys to guess the correct key and break the system. If a cryptanalyst can try 1,000,000 keys per second, how long on average would it take to discover the key and recover the plaintext?
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
You want to encrypt a message using RSA using your private key of d=3,n=35. Your message...
You want to encrypt a message using RSA using your private key of d=3,n=35. Your message is 15. What is your ciphertext?
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the...
Discrete Math In this problem, we will implement the RSA algorithm to encrypt and decrypt the message ”148”.For this exercise, you may want to use some kind of calculator that can compute the mod function. 1. Set the primes p and q as follows:p=31 and q=47. What are the values for N and φ? 2.The value for e is chosen to be 11. Use Euclid’s algorithm to verify that e and φ are relatively prime and to find d, the...
1) Make a substitution table corresponding for the Monoalphabetic Substitution corresponding to the key (G, Twelfth...
1) Make a substitution table corresponding for the Monoalphabetic Substitution corresponding to the key (G, Twelfth Night). Enter the bottom row of your substitution (called the cipher alphabet) below. Your input should be 26 capital letters with no spaces. 2) Encrypt the following message with Monoalphabetic Substitution using key (Q, As You Like It). Enter your ciphertext in 4-grams in capital letters. Message: If music be the food of love play on. 3) Decrypt the following ciphertext created with Monoalphabetic...
Please answer as soon as possible. No explanation needed. 1. Fill in the blank part blank...
Please answer as soon as possible. No explanation needed. 1. Fill in the blank part blank mode block ciphers encrypt each block of equivalent plaintext into the same ciphertext. 2. Fill in the blank part Intrusion Detection and Prevention Systems use blank to detect viruses or malware on a network. 3. Multiple Choice: Fill in the blank part Alice wants to send a message (using the GPG implementation of public key cryptography) to Bob. She will encrypt the message using...
If there are N people in a room, What is the probability that at least two...
If there are N people in a room, What is the probability that at least two of them share the same birthday (the same day of the same month) a year = 365 days? How many people are needed such that the probability is better than even? 

If 6 dice are thrown, what is the probability of rolling two triples? (3 dice of...
If 6 dice are thrown, what is the probability of rolling two triples? (3 dice of one same face, and 3 dice of a different same face)
In a group of 5 people, what is the probability that at least two were born...
In a group of 5 people, what is the probability that at least two were born on the same day of the week?  Give your answer to three decimal places.
Applied Cryptograph Program - Find a cryptographic key from Ciphertexts. Then decode the last ciphertext. In...
Applied Cryptograph Program - Find a cryptographic key from Ciphertexts. Then decode the last ciphertext. In this programming assignment, you will be responsible for determining a cryptographic key that is used to encrypt the 10 ciphertexts provided. In order to complete this programming assignment, you need to understand the problems inherent to the use of a single key to encrypt multiple messages The objective of the project is to demonstrate, from an attacker's perspective, how insecure the use of a...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT