Icon New game New game

Session06-Symmetric Encryption

Fill in the Blanks

Subject : Security and Privacy Risks in Computer & Internet Applications
Lecturer: Assoc. Prof. Dr. James Joshi
Faculty: Graduate School of Information Technology
Siam University, Bangkok, Thailand

Download the paper version to play

Recommended age: 21 years old
3 times made

Created by

Thailand

Top 10 results

There are still no results for this game. Be the first to stay in the ranking! to identify yourself.
Make your own free game from our game creator
Compete against your friends to see who gets the best score in this game

Top Games

  1. time
    score
  1. time
    score
time
score
time
score
 
game-icon

Fill in the Blanks

Session06-Symmetric EncryptionOnline version

Subject : Security and Privacy Risks in Computer & Internet Applications Lecturer: Assoc. Prof. Dr. James Joshi Faculty: Graduate School of Information Technology Siam University, Bangkok, Thailand

by Prince Parham
1

complex statistical Avalanche security bits ciphers decrypt cryptographic

1 . Block are among the most widely used types of cryptographic algorithms provide secrecy and / or authentication services .

2 . In 1949 Claude Shannon introduced idea of substitution - permutation ( S - P ) networks . S - P networks are based on the two primitive operations we have seen before :
substitution ( S - box ) and permutation ( P - box ) while they provide confusion and diffusion of message .

3 . diffusion ? dissipates structure of plaintext over bulk of ciphertext
confusion ? makes relationship between ciphertext and key as as possible

4 . Data Encryption Standard ( DES ) has been considerable controversy over its . DES has become widely used , especially in financial applications

5 . Initial Permutation IP :
first step of the data computation
IP reorders the input data
even bits to LH half , odd bits to RH half
quite regular in structure ( easy in h / w )
example : IP ( 675a6967 5e5a6b5a ) = ( ffb2194d 004df6fb )

6 . Effect :
key desirable property of an encryption algorithm
where a change of one input or key bit results in changing approx half output bits
making attempts to " home - in " by guessing keys impossible

7 . 3DES uses 3 keys and 3 DES executions :
( a ) using 3 keys 3DES has an effective key length of 168 bits ( 3 * 56 )
( b ) follows encrypt - - encrypt ( EDE )
( c ) the decryption phase is for backwards compatibility with single DE S

educaplay suscripción