Part A: Content of Homework Should Start From This Page Only
Part A: Content of Homework Should Start From This Page Only
Part A
Ques 1) Why is it important to study the Feistel Cipher?
Ans:- Feistal cipher Is the concept of the product cipher which is the
performing of two or basic ciphers in sequence in such a way that the
final result is product is crptographacialy stronger than any other
component cipher.Feistel proposed the use of ciphers that alternates
substitution and permutation so feistal cipher.
Q2. Write one algorithm for encryption as well as decryption for DES?
Ans:-
Part B:-
Q4. Write down AES encryption algorithm and prove your algorithm with
help of an Example?
Ans:-
Q5. What is the need of Stream Cipher? Write an algorithm to generate a key
Stream?
Ans:- A stream cipher, also called a stream algorithm, combines plaintext bits
with a key stream. A key stream is a pseudorandom algorithm bit stream.
Plaintext digits are encrypted one at a time.
The stream cipher part of the RIM Cryptographic API is based on the common
stream interface in Java and uses similar read and write function calls to interact
with the stream. After a stream cipher is established, you don't need to write
code for what it does: all activity is automatically performed by the class on the
underlying stream.
Q6 What is the concept behind Asymmetric Key Cryptography? How is better
than Symmetric Key Cryptography?
Ans:-Asymmetric Encryption
The problem with secret keys is exchanging them over the Internet or a large
network while preventing them from falling into the wrong hands. Anyone who
knows the secret key can decrypt the message. One answer is asymmetric
encryption, in which there are two related keys--a key pair. A public key is
made freely available to anyone who might want to send you a message. A
second, private key is kept secret, so that only you know it.
Any message (text, binary files, or documents) that are encrypted by using the
public key can only be decrypted by applying the same algorithm, but by using
the matching private key. Any message that is encrypted by using the private
key can only be decrypted by using the matching public key.
This means that you do not have to worry about passing public keys over the
Internet (the keys are supposed to be public). A problem with asymmetric
encryption, however, is that it is slower than symmetric encryption. It requires
far more processing power to both encrypt and decrypt the content of the
message.
Part a
Ques3) Discuss the purpose of the S-box DES?
Ans:- The s- box in the function F is that the substitution consist of a set of eight
s-boxes, each of which accepts 6 bits as input and produce 4 bit as fallow. The
first and last bit Of the input to box Si from a 2-bit binary number to select one
of four substitution defined by the four rows in the table for Si. The middle four
bit selects one or sixteen columns. The decimal value in the cell selected byrow
and column is then converted into 4-bit representation to produce the output.