The document discusses the Data Encryption Standard (DES) and its vulnerabilities, highlighting its historical significance and the evolution of cryptographic techniques. It explains variations of DES, such as Double and Triple DES, and introduces concepts of asymmetric key cryptography. Additionally, it touches on steganography and the importance of key management in secure communications.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0 ratings0% found this document useful (0 votes)
5 views
INS Assignment 3
The document discusses the Data Encryption Standard (DES) and its vulnerabilities, highlighting its historical significance and the evolution of cryptographic techniques. It explains variations of DES, such as Double and Triple DES, and introduces concepts of asymmetric key cryptography. Additionally, it touches on steganography and the importance of key management in secure communications.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 6
}
Ieame 3 Anshv chavrasyya _ i
|Rouno +1813 Tes E of i |
| Assignmen FNos on | 77 |
Explain with. cod diagram wording _of. DES ai gobitom
_=2 she _Dala_enctypiisn Standard _CbEs)cilso_caned_the dat
___Leretyntion —algorithin (pea) hy ANss and DEA=\by 160
thas | eth _O._clyplo gtaphic augroijhn used for _alel eo _
a. —-decades of tafe pes hos beth found valnerabie ovgdinst
Noy —pmosrfoi_odacks and therelol the popolatity af Deg
_____ has
TMoweuer no bee oh georily iS com@rbe Wathoul DES
se Shalt Yo discuss pes ot? lenghh “to achieve two
——ObiecHive EtksHy to learn aboot pe§ bub secepdiy and
more _impicdandiy Jo disserd and _ondesskand a_telat nie _
ENG at ‘ pole
si origins of pes go ack to 1492 Uhen tn dhe us
jong ay
Ldhe _wawions) _Instiwie _of Stadarels curd Technorg g.Ciuis L
____rermbratwed _Upon a prov’ fect_For_prtecting dhe ~ lela ib —
____sempuier sand Computer Commonicaans
1|
foo Tt [cube | [éu-bit |
agit P| lain text Dian dese
qo
-p8-bU NEY Lops Sa J og]
+ Gu= bh 64-bit Teu-bit |
1 Leitpher toa Leibher fed Lcivner Text
7 Block 2 Block 2 Block pn
2) Explain dae 06 Vaviatlons of pe.
_2 There are Swo tndin yartatfon of be
|) Double pec 4
2) Thple Dec
| dhe eh eyed foxt Kz Agatn _petfdrms Dé
—-Chekgpled feck fuk dhi's dime with dhe _athor kes ka
—|_ Thy in : IC
xt Cie ‘gira _plur_bexd
— hwo diferent —“eys)
—l arias Ici bher ner
—~|vlain te ? reer]
~~ R2 Jaz~ it _dhe Mey R18 dhe end of a message and 6
the —teteier Denciyples the maestgee asi gis pubic |
vey ( Bevk) and gend
the tncrypled message to B. b then
jr
Us ing Is owp privet Rey CBpvr) |
defvurls dhe. mnescage
o g
-h decryplinn can be done cniy hy dhe pri ich IS
ome nen
__coniidentias and Haown only fo “dhe hecpiver.
Tho oss
JOu2
ing name is ‘Abul nm? [Encrypt [ oar? caterare [
jnyaanel —Tucalee $$ ie eo
_) Wile x nate on _Steganegtaph Ae ee
= Steghogophy Tee dehnjoe aad Paces higag op
message dha 1s _ job cheep Scrat inside abet tee
: “ahis “resents ip —ehe_concetiment_of FAC 3 ’
: Lwishontany ane Sendo used —enethad —Sirh—ao-lbutsibye
7 sims ahs fin_puhjyres on SPeill.—chelaclsalne
___| Natiawons le een handwritten chatacters Percll _harkes
_on handusten —¢
= oF lute people hide Secret message fo gend we cap faker
| another tna Cones and we can peplace the las! }20 biybh
most £ each byte. of dhal Image with € the next)
two bi £ ovk — Seckes mnesage The resis thaage
wovid sao} look to differed and. gob —caertly cl Sched.
T ie
Lak it woold read dhe [atl Jno bits of cath bute f
dot __image Dine and pecorsiract dhe Scket message.
GS) Explain dhe tehnigues of Cieyplograph.
Z__Syrnine Hic eg Crgplogra py $— ath Which the ley lemon:
T '
Lo ed is dhe? game for bn eecraphon as wilt cas decty Pata
I
Oi Summebic hey clepAlo sip 3 = ele :
gicaphy ane 2 sume
so eee_uoidh three -
__fig_dhe plain “Yexd__lotoce_p_.s like! energpbed®
__uSth__o Key 1. olah_ebcrypled _widh_a Second —
ey Rh _ incall width o_— dha Rey 2 where
Bled
DES ead dhyre eyo dhe idea al. Shple_peg
Keys_i's inustealed In ahe Potiocsin.
ie ae and oa Tare a ditterent froin each bn
Joriginal M4 | pin
[pian text ? [Tex 7 i
RL a.
encrypt ? Nei | Teneo
uo Lrexer | t
| ko he
|
-| ES toish 1k
D Ehoryat dhe plain tech ith ey KD.
+ Hihaly_ebeigpl_the outpud of sheep 2_ again euith Hey 1
) Dechyp} dhe ovipol of steep 7 abov paith Mex
| origina = | i Tiina el
[pain + a Civh
| kK y
! Loe chs
Ko“The—Sendor dale dhe iecbiye °
conesponding _decksption Alforishin 4c decesyph he dati
Dlaw tb I
Text ? l En Leptin | Toscano Fe
CiPher teak
0) Asymmetric hey cyy phy
_ 2 th__asymimelic Sou! Pubi’e —i2e. keyplogiaphic_dnere
— key _o_prlunte hey Onda pubic ey “The phe phivele |
lacy 1S _eep hy he receiver «the Spubiic et i's cinnovrcel|
—4e—the pubic. srmagine auice ante lo send 07 mn age ko
—t AM to
public Rey to__enckgpt dh, messag) heb dbe_me
____tecieved bby _fhab dhe private wey 's sed to dechypl
dre ___ ye S: age
yR bb priic Hey
PR Bee Priveke Key
l Bob zi), |
[nice v i |
Yea ton
[pain veal——> Lemerganon PPI | necranon plant
Se ae a =
ais = fey, pas
> ain fe i. dubs ey Privat ley
v
4