0 оценок0% нашли этот документ полезным (0 голосов)
92 просмотров4 страницы
1. The document discusses various topics related to computer and IT security including cryptographic systems, symmetric cipher models, and the Feistel cipher structure.
2. Cryptographic systems can be categorized by the type of encryption operation used (e.g. substitution, transposition, product), the number of keys used (single or double key systems), and how plaintext is processed (block or stream ciphers).
3. The symmetric cipher model involves five basic elements - plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. It uses the same secret key during both encryption and decryption.
1. The document discusses various topics related to computer and IT security including cryptographic systems, symmetric cipher models, and the Feistel cipher structure.
2. Cryptographic systems can be categorized by the type of encryption operation used (e.g. substitution, transposition, product), the number of keys used (single or double key systems), and how plaintext is processed (block or stream ciphers).
3. The symmetric cipher model involves five basic elements - plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. It uses the same secret key during both encryption and decryption.
1. The document discusses various topics related to computer and IT security including cryptographic systems, symmetric cipher models, and the Feistel cipher structure.
2. Cryptographic systems can be categorized by the type of encryption operation used (e.g. substitution, transposition, product), the number of keys used (single or double key systems), and how plaintext is processed (block or stream ciphers).
3. The symmetric cipher model involves five basic elements - plaintext, encryption algorithm, secret key, ciphertext, and decryption algorithm. It uses the same secret key during both encryption and decryption.
1|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
Department of Computer Science and Computer Engineering
NSW Assignment Stage 06 (Prac 06) Individual Submission: Hard copy/ Soft copy shown to the tutor/lecturer Deadline: End of this lab session Worth: 1% for lab work + 0.5% BONUS for at least 1 hour attendance
Objectives: (1) To understand and learn more about computer and IT security based on lecture notes and internet sources. Exercise 1 1. Explain the ways by which the cryptographic systems are categorized. Ans: Mainly in three ways: a. type of encryption operations used i. substitution (for example, in case of alphabet as well twenty replace t by z and w by a y) ii. transposition ,changing the position of the data or the character iii. product, multiply data with secret code. b. number of keys used i. single-key or private(same key for encryption and decryption) ii. two-key or public (different key for encryption and decryption) c. way in which plaintext is processed i. block (take a known sized block of data to encrypt) ii. stream (encryption is performed on each byte or word sequentially)
2. Explain the following: i. Plain text: Original message that needed to be sent. 2|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
ii. Cipher text: When the plain text is converted in to a coded message using the encryption operations. iii. Cipher: Cipher Algorithm is used to execute the cryptographic systems. Key iv. Encipher-The procedure of converting plain text to cipher text. v. Decipher: recovering/ retrieving the plain text from cipher. vi. Cryptography: study of encryption principles/methods. vii. Cryptanalysis: (code breaking) - study of principles/ methods of deciphering cipher text without knowing key.
3. Explain the Symmetric Cipher Model. Detail the five ingredients of the symmetric cipher model, shown in Stallings Figure
Plaintext - original message
Encryption algorithm performs substitutions/transformations on plaintext
Secret key control exact substitutions/transformations used in encryption algorithm
ciphertext - scrambled message
Decryption algorithm inverse of encryption algorithm
Recover Plaintext - original message
Its requirements a strong encryption algorithm a secret key known only to sender / receiver
Transmitting end Receiving end 3|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
Exercise 2 1. Explain Feistel Cipher Structure for implementing symmetric encryption with the help of a diagram. Feistel Cipher Structure : used for Multiple encryption
Design elements of Feistel Cipher 4|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
The exact realization of a Feistel network depends on the choice of the following parameters & design features: Block size key size - increasing size improves security, makes exhaustive key searching harder, but may slow cipher number of rounds - increasing number improves security Sub-key generation algorithm - greater complexity can make analysis harder, but slows cipher Round function - greater complexity can make analysis harder, but slows cipher fast Software en/decryption - more recent concern for practical use Ease of analysis - for easier validation & testing of strength
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging
Hacking: A Beginners Guide To Your First Computer Hack; Learn To Crack A Wireless Network, Basic Security Penetration Made Easy and Step By Step Kali Linux
Evaluation of Some Websites that Offer Virtual Phone Numbers for SMS Reception and Websites to Obtain Virtual Debit/Credit Cards for Online Accounts Verifications
Palo Alto Networks: The Ultimate Guide To Quickly Pass All The Exams And Getting Certified. Real Practice Test With Detailed Screenshots, Answers And Explanations
Computer Networking: The Complete Beginner's Guide to Learning the Basics of Network Security, Computer Architecture, Wireless Technology and Communications Systems (Including Cisco, CCENT, and CCNA)