Let M be the plaintext message M = MALAYSIA and the private key, K = ISSOGOOD Convert this plaintext and key message to Hexadecimal representation using the ASCII table. Convert the Hexadecimal representation to binary number. Represent your plaintext binary number as a form of a block, using the DES encryption technique (2 equal blocks). Using the initial permutation (table is provided below), please provide your plaintext output. Using the expansion P-box (table is provided below), show the plaintext output of this process. For the key: Using the key permutation table (provided below), show the output of this conversion process. Using the appropriate steps of DES operation, what is the final output of the key for round 1 (hint: you have to use the circular left shift and permutation compression (PC) table provided below). For round 1, please provide your output for the XOR operation of plaintext and the key, according to the DES operation. Based on the output of 4(h), explain the next process using the S-box table, and show the output from this operation. Based on the output of 4(i), explain the next process using a straight permu

Computer Networking: A Top-Down Approach (7th Edition)
7th Edition
ISBN:9780133594140
Author:James Kurose, Keith Ross
Publisher:James Kurose, Keith Ross
Chapter1: Computer Networks And The Internet
Section: Chapter Questions
Problem R1RQ: What is the difference between a host and an end system? List several different types of end...
icon
Related questions
Question

Let M be the plaintext message M = MALAYSIA and the private key, K = ISSOGOOD

  1. Convert this plaintext and key message to Hexadecimal representation using the ASCII table.
  2. Convert the Hexadecimal representation to binary number.
  3. Represent your plaintext binary number as a form of a block, using the DES encryption technique (2 equal blocks).
  4. Using the initial permutation (table is provided below), please provide your plaintext output.
  5. Using the expansion P-box (table is provided below), show the plaintext output of this process.
  6. For the key: Using the key permutation table (provided below), show the output of this conversion process.
  7. Using the appropriate steps of DES operation, what is the final output of the key for round 1 (hint: you have to use the circular left shift and permutation compression (PC) table provided below).
  8. For round 1, please provide your output for the XOR operation of plaintext and the key, according to the DES operation.
  9. Based on the output of 4(h), explain the next process using the S-box table, and show the output from this operation.
  10. Based on the output of 4(i), explain the next process using a straight permutation table, and show the output from this operation.
  11. Share the python script of solving all those ques from 1 to 10?
6. Would it be possible to execute encryption functions in parallel on CBC mode with
multiple blocks of messages? How about Decryption?
Initial Permutation
Initial Permutation
7. Why Should the IV in CBC be protected?
58 50 42 34 26 18 10 02
60 52 44 36 28 20 12 04
62 54 46 38 30 22 14 06
Appendix:
64 56 48 40 32 24 16 08
57 49 41 33 25 17 09 01
59 51 43 35 27 19 11 03
61 53 45 37 29 21 13 05
63 55 47 39 31 23 15 07
ASCII Table
Dec Hx Oct Char
0 0 000 NUL (null)
1 1 001 SOH (start of heading)
2 2 002 STX (start of text)
3 3 003 ETX (end of text)
4
Dec Hx Oct Html Chr Dec Hx Oct Html Chr Dec Hx Oct Html Chr
32 20 040 432; Space 64 40 100 G#64;
33 21 041 G#33; !
34 22 042 6#34; "
35 23 043 6#35;
36 24 044 G#36; 4
37 25 045 G#37;
96 60 140 `
97 61 141 G#97; a
98 62 142 G#98; b
99 63 143 6#99;
68 44 104 &68; D 100 64 144 G100; d
69 45 105 G#69; E 101 65 145 #101; e
70 46 106 G#70; F 102 66 146 G#102; f
71 47 107 G#71; G 103 67 147 G#103; g
72 48 110 G#72; H 104 68 150 6#104; h
73 49 111 I I 105 69 151 6105; i
74 4A 112 G#74; J 106 6A 152 G#106; )
75 4B 113 K K 107 6B 153 G#107; k
76 4C 114 G#76; L 108 6c 154 G#108; 1
77 4D 115 G#77; M 109 6D 155 G#109;
78 4E 116 G#78; N 110 6E 156 G#110; n
79 4F 117 G#79; 0 111 6F 157 6#111; o
80 50 120 G#80; P 112 70 160 6#112; p
81 51 121 Q Q 113 71 161 6#113; q
82 52 122 G#82; R 114 72 162 G#114; r
83 53 123 G#83; S 115 73 163 #115; s
84 54 124 G#84; T 116 74 164 G#116;t
85 55 125 G#85; U 117 75 165 6#117; u
86 56 126 4#86; V 118 76 166 6#118; v
87 57 127 G#87; W 119 77 167 6#119; w
88 58 130 G#88; X 120 78 170 s#120; x
89 59 131 G#89; Y 121 79 171 G#121; Y
90 SA 132 G#90; z 122 7A 172 G#122; z
91 5B 133 G#91; [ 123 7B 173 #123; {
92 5C 134 6#92; \ 124 7C 174 G#124; I
93 5D 135 ] ) 125 7D 175 G125; }
126 7E 176 G#126; -
95 SF 137 G#95; 127 7F 177 #127; DEL
65 41 101 4#65; A
66 42 102 G#66; B
67 43 103 6#67; C
Expansion P-box
4 004 EOT (end of transnission)
5 5 005 ENQ (enquiry)
6 6 006 ACK (acknovledge)
7 7 007 BEL (bell)
8 8 010 BS (backspace)
9 9 011 TAB (horizontal tab)
10 A 012 LF
11 B 013 VT
12 C 014 FF
13 D 015 CR
14 E 016 so
32
01
02
03
04
38 26 046 6#38; 4
04
06
07
09
39 27 047 6#39;
00
10
12
13
40 28 050 #40; (
41 29 051 6#41; )
(HL line feed, neu line) 42 2A 052 G#42; *
43 2B 053 G#43; +
(MP form feed, neu page) 44 20 054 a#44;,
45 2D 055 6#45; -
46 2E 056 6#46;
47 2F 057 #47; /
48 30 060 G#48; 0
12
13
14
15
16
17
16
17
18
19
20
21
(vertical tab)
20
21
22
23
24
25
24 25
26
27
28
29
(carriage return)
(shift out)
28
29
31
31
32
01
15 F 017 SI (shift in)
16 10 020 DLE (data link escape)
17 11 021 DCi (device control 11
18 12 022 DC2 (device control 2)
19 13 023 DC3 (device control 3)
20 14 024 DC4 (device control 4)
21 15 025 NAK (negative acknovledge)
22 16 026 SYN (synchronous idle)
23 17 027 ETB (end of trans. block)
24 18 030 CAN (cancel)
49 31 061 G#49; 1
50 32 062 50; 2
51 33 063 6#51; 3
52 34 064 4 4
53 35 065 #53; 5
54 36 066 6#54; 6
55 37 067 G#55; 7
56 38 070 G#56; 8
57 39 071 #57; 9
58 3A 072 G#58; :
59 3B 073 G59; :
60 3C 074 6#60; <
61 3D 075 G#61; -
62 3E 076 G862; >
63 3F 077 6#63; ?
Key Permutation Table
57
49
41
33
25
17
4 34 % I8 10 0
4 5 20 08
44 % 6 55 0 »
58 50
25 19 031 EM
(end of nedium)
9 51
19
II
26 1A 032 SUB (substitute)
27 1B 033 ESC (escape)
28 1C 034 Fs
0 52
15 4 N
14 6 61 3 4 37
06 3 12
60
39
(file separator)
29 1D 035 GS (group separator)
30 1E 036 RS (record separator)
(unit separator)
31 23
07
38
94 SE 136 &#94; A
30
22
31 IF 037 US
» 21
13
Key Permutation-Compression Table
14
17
24
03
28
15
06
21
10
23
19
12
04
26
16
07
27
20
13
02
41
52
31
37
47
55
30
40
51
45
33
48
44
49
39
56
34
53
46
42
50
36
29
32
S-Box Table
Transcribed Image Text:6. Would it be possible to execute encryption functions in parallel on CBC mode with multiple blocks of messages? How about Decryption? Initial Permutation Initial Permutation 7. Why Should the IV in CBC be protected? 58 50 42 34 26 18 10 02 60 52 44 36 28 20 12 04 62 54 46 38 30 22 14 06 Appendix: 64 56 48 40 32 24 16 08 57 49 41 33 25 17 09 01 59 51 43 35 27 19 11 03 61 53 45 37 29 21 13 05 63 55 47 39 31 23 15 07 ASCII Table Dec Hx Oct Char 0 0 000 NUL (null) 1 1 001 SOH (start of heading) 2 2 002 STX (start of text) 3 3 003 ETX (end of text) 4 Dec Hx Oct Html Chr Dec Hx Oct Html Chr Dec Hx Oct Html Chr 32 20 040 432; Space 64 40 100 G#64; 33 21 041 G#33; ! 34 22 042 6#34; " 35 23 043 6#35; 36 24 044 G#36; 4 37 25 045 G#37; 96 60 140 &#96; 97 61 141 G#97; a 98 62 142 G#98; b 99 63 143 6#99; 68 44 104 &68; D 100 64 144 G100; d 69 45 105 G#69; E 101 65 145 #101; e 70 46 106 G#70; F 102 66 146 G#102; f 71 47 107 G#71; G 103 67 147 G#103; g 72 48 110 G#72; H 104 68 150 6#104; h 73 49 111 &#73; I 105 69 151 6105; i 74 4A 112 G#74; J 106 6A 152 G#106; ) 75 4B 113 &#75; K 107 6B 153 G#107; k 76 4C 114 G#76; L 108 6c 154 G#108; 1 77 4D 115 G#77; M 109 6D 155 G#109; 78 4E 116 G#78; N 110 6E 156 G#110; n 79 4F 117 G#79; 0 111 6F 157 6#111; o 80 50 120 G#80; P 112 70 160 6#112; p 81 51 121 &#81; Q 113 71 161 6#113; q 82 52 122 G#82; R 114 72 162 G#114; r 83 53 123 G#83; S 115 73 163 #115; s 84 54 124 G#84; T 116 74 164 G#116;t 85 55 125 G#85; U 117 75 165 6#117; u 86 56 126 4#86; V 118 76 166 6#118; v 87 57 127 G#87; W 119 77 167 6#119; w 88 58 130 G#88; X 120 78 170 s#120; x 89 59 131 G#89; Y 121 79 171 G#121; Y 90 SA 132 G#90; z 122 7A 172 G#122; z 91 5B 133 G#91; [ 123 7B 173 #123; { 92 5C 134 6#92; \ 124 7C 174 G#124; I 93 5D 135 &#93; ) 125 7D 175 G125; } 126 7E 176 G#126; - 95 SF 137 G#95; 127 7F 177 #127; DEL 65 41 101 4#65; A 66 42 102 G#66; B 67 43 103 6#67; C Expansion P-box 4 004 EOT (end of transnission) 5 5 005 ENQ (enquiry) 6 6 006 ACK (acknovledge) 7 7 007 BEL (bell) 8 8 010 BS (backspace) 9 9 011 TAB (horizontal tab) 10 A 012 LF 11 B 013 VT 12 C 014 FF 13 D 015 CR 14 E 016 so 32 01 02 03 04 38 26 046 6#38; 4 04 06 07 09 39 27 047 6#39; 00 10 12 13 40 28 050 #40; ( 41 29 051 6#41; ) (HL line feed, neu line) 42 2A 052 G#42; * 43 2B 053 G#43; + (MP form feed, neu page) 44 20 054 a#44;, 45 2D 055 6#45; - 46 2E 056 6#46; 47 2F 057 #47; / 48 30 060 G#48; 0 12 13 14 15 16 17 16 17 18 19 20 21 (vertical tab) 20 21 22 23 24 25 24 25 26 27 28 29 (carriage return) (shift out) 28 29 31 31 32 01 15 F 017 SI (shift in) 16 10 020 DLE (data link escape) 17 11 021 DCi (device control 11 18 12 022 DC2 (device control 2) 19 13 023 DC3 (device control 3) 20 14 024 DC4 (device control 4) 21 15 025 NAK (negative acknovledge) 22 16 026 SYN (synchronous idle) 23 17 027 ETB (end of trans. block) 24 18 030 CAN (cancel) 49 31 061 G#49; 1 50 32 062 50; 2 51 33 063 6#51; 3 52 34 064 &#52; 4 53 35 065 #53; 5 54 36 066 6#54; 6 55 37 067 G#55; 7 56 38 070 G#56; 8 57 39 071 #57; 9 58 3A 072 G#58; : 59 3B 073 G59; : 60 3C 074 6#60; < 61 3D 075 G#61; - 62 3E 076 G862; > 63 3F 077 6#63; ? Key Permutation Table 57 49 41 33 25 17 4 34 % I8 10 0 4 5 20 08 44 % 6 55 0 » 58 50 25 19 031 EM (end of nedium) 9 51 19 II 26 1A 032 SUB (substitute) 27 1B 033 ESC (escape) 28 1C 034 Fs 0 52 15 4 N 14 6 61 3 4 37 06 3 12 60 39 (file separator) 29 1D 035 GS (group separator) 30 1E 036 RS (record separator) (unit separator) 31 23 07 38 94 SE 136 &#94; A 30 22 31 IF 037 US » 21 13 Key Permutation-Compression Table 14 17 24 03 28 15 06 21 10 23 19 12 04 26 16 07 27 20 13 02 41 52 31 37 47 55 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32 S-Box Table
51
12 13
2 11
52
15 1
4 7
15
7 11 10 4 13 1 S 12
* 14
e 14
11 R 1 e1
42 11 6 7 12
11 5
55
7 16
11 6
1 11 1e 1
1 14
5 1
3 8
2 8 12 3 7e 4 1e 1 13 11 e
6 e81.
12 1 10 15
9268 e 13 3 4 14 7
9 14 15 S
4 3
4 11
15 6
1 4
11 13
6 11
8 4 6 19
13 8
13 2
1 15
7 11 4 1
14 7
e3 74 12 S
zt G
14 2
2 1
4 10
8 13 15 12
Straight Permutation
Table
ang
N
uh oo
५
Transcribed Image Text:51 12 13 2 11 52 15 1 4 7 15 7 11 10 4 13 1 S 12 * 14 e 14 11 R 1 e1 42 11 6 7 12 11 5 55 7 16 11 6 1 11 1e 1 1 14 5 1 3 8 2 8 12 3 7e 4 1e 1 13 11 e 6 e81. 12 1 10 15 9268 e 13 3 4 14 7 9 14 15 S 4 3 4 11 15 6 1 4 11 13 6 11 8 4 6 19 13 8 13 2 1 15 7 11 4 1 14 7 e3 74 12 S zt G 14 2 2 1 4 10 8 13 15 12 Straight Permutation Table ang N uh oo ५
Expert Solution
steps

Step by step

Solved in 3 steps with 2 images

Blurred answer
Recommended textbooks for you
Computer Networking: A Top-Down Approach (7th Edi…
Computer Networking: A Top-Down Approach (7th Edi…
Computer Engineering
ISBN:
9780133594140
Author:
James Kurose, Keith Ross
Publisher:
PEARSON
Computer Organization and Design MIPS Edition, Fi…
Computer Organization and Design MIPS Edition, Fi…
Computer Engineering
ISBN:
9780124077263
Author:
David A. Patterson, John L. Hennessy
Publisher:
Elsevier Science
Network+ Guide to Networks (MindTap Course List)
Network+ Guide to Networks (MindTap Course List)
Computer Engineering
ISBN:
9781337569330
Author:
Jill West, Tamara Dean, Jean Andrews
Publisher:
Cengage Learning
Concepts of Database Management
Concepts of Database Management
Computer Engineering
ISBN:
9781337093422
Author:
Joy L. Starks, Philip J. Pratt, Mary Z. Last
Publisher:
Cengage Learning
Prelude to Programming
Prelude to Programming
Computer Engineering
ISBN:
9780133750423
Author:
VENIT, Stewart
Publisher:
Pearson Education
Sc Business Data Communications and Networking, T…
Sc Business Data Communications and Networking, T…
Computer Engineering
ISBN:
9781119368830
Author:
FITZGERALD
Publisher:
WILEY