0% found this document useful (0 votes)
137 views

What Are The Advantages and Disadvantages of Triple DES? List The Important Design Criteria For Stream Cipher

This document contains review questions and problems related to symmetric encryption techniques. It covers topics such as symmetric encryption, cryptanalysis, block ciphers vs stream ciphers, the DES algorithm, AES, triple DES, stream cipher design and cipher block chaining mode. Example problems are provided to encrypt plaintext using stream and block ciphers, analyze the DES algorithm, and investigate error propagation in cipher block chaining mode.

Uploaded by

Maaz Mahboob
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
137 views

What Are The Advantages and Disadvantages of Triple DES? List The Important Design Criteria For Stream Cipher

This document contains review questions and problems related to symmetric encryption techniques. It covers topics such as symmetric encryption, cryptanalysis, block ciphers vs stream ciphers, the DES algorithm, AES, triple DES, stream cipher design and cipher block chaining mode. Example problems are provided to encrypt plaintext using stream and block ciphers, analyze the DES algorithm, and investigate error propagation in cipher block chaining mode.

Uploaded by

Maaz Mahboob
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

WQD7010

Assignment 1 (Symmetric Encryption)

Review Questions:

1. What is symmetric encryption? What are the essential ingredients of symmetric


encryption? What are the two requirements for secure use of symmetric encryption?
2. What is cryptanalysis? Summarize the various types of cryptanalytic attacks on encrypted
messages?
3. What is the difference between a block cipher and a stream cipher?
4. What is a block cipher?
5. List the parameters of a symmetric block cipher for greater security.
6. Describe the Data encryption algorithm for 64-bit length plaintext and 56-bit length key of
DES.
7. How big can be the key in AES, how many rounds have AES for each key, and how big
is the block?
8. What are the advantages and disadvantages of triple DES?
9. List the important design criteria for stream cipher.

Problems

1. Stream cipher: P (plaintext message) has been encrypted using stream cipher with key K
to obtain a ciphertext C. Given C = 10011010 and K=11001010, find the original plaintext
P. Show the calculation process.

2. Is the DES decryption the inverse of DES encryption? Justify your answer.

3. Let M (Plaintext) be MALAYSIA and K (private key) be the bit pattern


0123456789ABCDEF

a) Convert the Hexadecimal representation (M and K) to binary number. Note that you
have to convert plaintext M to ASCII code.
b) Write down the first round subkey, K1.
c) Write down L0, R0 from plaintext.
d) Expand R0, which is represented as E[R0], using the expansion P-box function
e) Calculate A = E[R0] ⊕ K1.
f) Group the 48-bit result of (e) into sets of 6 bits and write down the corresponding S-
Box substitutions output.
g) Apply the straight permutation function to get P(B).
h) Calculate R1 = P(B) ⊕ L0
i) Write down the output of Round 1 ciphertext
4. AES: Given the plaintext {000102030405060708090A0B0C0D0E0F} and the key
{01010101010101010101010101010101}.

a) Show the original contents of State, displayed as a 4 x 4 matrix.


b) Show the value of State after initial AddRoundKey
c) Show the value of State after SubBytes.
d) Show the value of State after ShiftRows.

5. Calculate the MixColumns transformation output for the following hex input; 67 89 AB
CD". Next, change the first byte of the input from '67' to '77' and perform the function of
MixColumns again to the new input, and explain the difference between both MixColumns
output.

6. If ciphertext is transmitted using Electronic Codebook Mode (ECB) with an error in any
of the block, it will only affect the corresponding plaintext block. In contrast, if CBC mode
is used, this error will disseminate to other block.

For instance, in the Figure 6.1, if transmitted C1 produce an error, P1 and P2 will also be
affected.

a) Are blocks beyond P2 also affected? Explain your answer.


b) Let say that a bit error occurred in the source version of plaintext from block 1. Through
how many ciphertext blocks is this error propagated? Is the receiver affected with this
error?

Figure 6.1: Cipher Block Chaining Mode

You might also like