Chapter 3
Chapter 3
Chapter 3
Alice’s Bob’s
K encryption K decryption
A
key Bkey
m plaintext message
KA(m) ciphertext, encrypted with key KA
m = KB(KA(m))
plaintext: abcdefghijklmnopqrstuvwxyz
ciphertext: mnbvcxzasdfghjklpoiuytrewq
C0 = 1111000011001100101010101111
D0 = 0101010101100110011110001111
C1 = 1110000110011001010101011111
D1 = 1010101011001100111100011110
Prepared by: DR. OLIVER 39
Example:
For the first key we have C1D1 = 1110000 1100110
0101010 1011111 1010101 0110011 0011110 0011110
which, after we apply the permutation PC-2, becomes
Example:
Applying the initial permutation to the block of text M, given previously, we
get
M = 0000 0001 0010 0011 0100 0101 0110 0111 1000
1001 1010 1011 1100 1101 1110 1111
Ln = Rn-1
Rn = Ln-1 + f(Rn-1,Kn)
Last login When you log in, the system may display the date and time of
message your last login. Many systems also display the number of
unsuccessful login attempts since the time of your last successful
login.
Minimum Because short passwords are easier to guess than long ones,
length some systems require that passwords be a certain length,
usually six to eight characters, but longer is better.