New Activity
Play Fill in the Blanks Game
1 . Block ____________________ are among the most widely used types of cryptographic algorithms provide secrecy and / or authentication services .

2 . In 1949 Claude Shannon introduced idea of substitution - permutation ( S - P ) networks . S - P networks are based on the two primitive ____________________ operations we have seen before :
substitution ( S - box ) and permutation ( P - box ) while they provide confusion and diffusion of message .

3 . diffusion ? dissipates ____________________ structure of plaintext over bulk of ciphertext
confusion ? makes relationship between ciphertext and key as ____________________ as possible

4 . Data Encryption Standard ( DES ) has been considerable controversy over its ____________________ . DES has become widely used , especially in financial applications

5 . Initial Permutation IP :
first step of the data computation
IP reorders the input data ____________________
even bits to LH half , odd bits to RH half
quite regular in structure ( easy in h / w )
example : IP ( 675a6967 5e5a6b5a ) = ( ffb2194d 004df6fb )

6 . ____________________ Effect :
key desirable property of an encryption algorithm
where a change of one input or key bit results in changing approx half output bits
making attempts to ? home - in ? by guessing keys impossible

7 . 3DES uses 3 keys and 3 DES executions :
( a ) using 3 keys 3DES has an effective key length of 168 bits ( 3 * 56 )
( b ) follows encrypt - ____________________ - encrypt ( EDE )
( c ) the decryption phase is for backwards compatibility with single DE S