0% found this document useful (0 votes)
5 views

INS Assignment 3

The document discusses the Data Encryption Standard (DES) and its vulnerabilities, highlighting its historical significance and the evolution of cryptographic techniques. It explains variations of DES, such as Double and Triple DES, and introduces concepts of asymmetric key cryptography. Additionally, it touches on steganography and the importance of key management in secure communications.

Uploaded by

nepebas258
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
5 views

INS Assignment 3

The document discusses the Data Encryption Standard (DES) and its vulnerabilities, highlighting its historical significance and the evolution of cryptographic techniques. It explains variations of DES, such as Double and Triple DES, and introduces concepts of asymmetric key cryptography. Additionally, it touches on steganography and the importance of key management in secure communications.

Uploaded by

nepebas258
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
} Ieame 3 Anshv chavrasyya _ i |Rouno +1813 Tes E of i | | Assignmen FNos on | 77 | Explain with. cod diagram wording _of. DES ai gobitom _=2 she _Dala_enctypiisn Standard _CbEs)cilso_caned_the dat ___Leretyntion —algorithin (pea) hy ANss and DEA=\by 160 thas | eth _O._clyplo gtaphic augroijhn used for _alel eo _ a. —-decades of tafe pes hos beth found valnerabie ovgdinst Noy —pmosrfoi_odacks and therelol the popolatity af Deg _____ has TMoweuer no bee oh georily iS com@rbe Wathoul DES se Shalt Yo discuss pes ot? lenghh “to achieve two ——ObiecHive EtksHy to learn aboot pe§ bub secepdiy and more _impicdandiy Jo disserd and _ondesskand a_telat nie _ ENG at ‘ pole si origins of pes go ack to 1492 Uhen tn dhe us jong ay Ldhe _wawions) _Instiwie _of Stadarels curd Technorg g.Ciuis L ____rermbratwed _Upon a prov’ fect_For_prtecting dhe ~ lela ib — ____sempuier sand Computer Commonicaans 1 | foo Tt [cube | [éu-bit | agit P| lain text Dian dese qo -p8-bU NEY Lops Sa J og] + Gu= bh 64-bit Teu-bit | 1 Leitpher toa Leibher fed Lcivner Text 7 Block 2 Block 2 Block pn 2) Explain dae 06 Vaviatlons of pe. _2 There are Swo tndin yartatfon of be |) Double pec 4 2) Thple Dec | dhe eh eyed foxt Kz Agatn _petfdrms Dé —-Chekgpled feck fuk dhi's dime with dhe _athor kes ka —|_ Thy in : IC xt Cie ‘gira _plur_bexd — hwo diferent —“eys) —l arias Ici bher ner —~|vlain te ? reer] ~~ R2 Jaz ~ it _dhe Mey R18 dhe end of a message and 6 the —teteier Denciyples the maestgee asi gis pubic | vey ( Bevk) and gend the tncrypled message to B. b then jr Us ing Is owp privet Rey CBpvr) | defvurls dhe. mnescage o g -h decryplinn can be done cniy hy dhe pri ich IS ome nen __coniidentias and Haown only fo “dhe hecpiver. Tho oss JOu2 ing name is ‘Abul nm? [Encrypt [ oar? caterare [ jnyaanel —Tucal ee $$ ie eo _) Wile x nate on _Steganegtaph Ae ee = Steghogophy Tee dehnjoe aad Paces higag op message dha 1s _ job cheep Scrat inside abet tee : “ahis “resents ip —ehe_concetiment_of FAC 3 ’ : Lwishontany ane Sendo used —enethad —Sirh—ao-lbutsibye 7 sims ahs fin_puhjyres on SPeill.—chelaclsalne ___| Natiawons le een handwritten chatacters Percll _harkes _on handusten —¢ = oF lute people hide Secret message fo gend we cap faker | another tna Cones and we can peplace the las! }20 biybh most £ each byte. of dhal Image with € the next) two bi £ ovk — Seckes mnesage The resis thaage wovid sao} look to differed and. gob —caertly cl Sched. T ie Lak it woold read dhe [atl Jno bits of cath bute f dot __image Dine and pecorsiract dhe Scket message. GS) Explain dhe tehnigues of Cieyplograph. Z__Syrnine Hic eg Crgplogra py $— ath Which the ley lemon: T ' Lo ed is dhe? game for bn eecraphon as wilt cas decty Pata I Oi Summebic hey clepAlo sip 3 = ele : gicaphy ane 2 sume so eee _uoidh three - __fig_dhe plain “Yexd__lotoce_p_.s like! energpbed® __uSth__o Key 1. olah_ebcrypled _widh_a Second — ey Rh _ incall width o_— dha Rey 2 where Bled DES ead dhyre eyo dhe idea al. Shple_peg Keys_i's inustealed In ahe Potiocsin. ie ae and oa Tare a ditterent froin each bn Joriginal M4 | pin [pian text ? [Tex 7 i RL a. encrypt ? Nei | Teneo uo Lrexer | t | ko he | -| ES toish 1k D Ehoryat dhe plain tech ith ey KD. + Hihaly_ebeigpl_the outpud of sheep 2_ again euith Hey 1 ) Dechyp} dhe ovipol of steep 7 abov paith Mex | origina = | i Tiina el [pain + a Civh | kK y ! Loe chs Ko “The—Sendor dale dhe iecbiye ° conesponding _decksption Alforishin 4c decesyph he dati Dlaw tb I Text ? l En Leptin | Toscano Fe CiPher teak 0) Asymmetric hey cyy phy _ 2 th__asymimelic Sou! Pubi’e —i2e. keyplogiaphic_dnere — key _o_prlunte hey Onda pubic ey “The phe phivele | lacy 1S _eep hy he receiver «the Spubiic et i's cinnovrcel| —4e—the pubic. srmagine auice ante lo send 07 mn age ko —t AM to public Rey to__enckgpt dh, messag) heb dbe_me ____tecieved bby _fhab dhe private wey 's sed to dechypl dre ___ ye S: age yR bb priic Hey PR Bee Priveke Key l Bob zi), | [nice v i | Yea ton [pain veal——> Lemerganon PPI | necranon plant Se ae a = ais = fey, pas > ain fe i. dubs ey Privat ley v 4

You might also like