0% found this document useful (0 votes)
2 views

T3 theory assignment qn1 qn2

The document discusses the avalanche effect in the Data Encryption Standard (DES), emphasizing how a single bit change in the plaintext can significantly alter the ciphertext. It outlines the structure of DES, including its 64-bit plaintext and 56-bit key, and describes the encryption process involving multiple rounds and transformations. Additionally, it touches on vulnerabilities in cryptographic schemes, particularly in relation to chosen ciphertext attacks.

Uploaded by

soyoco1900
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
2 views

T3 theory assignment qn1 qn2

The document discusses the avalanche effect in the Data Encryption Standard (DES), emphasizing how a single bit change in the plaintext can significantly alter the ciphertext. It outlines the structure of DES, including its 64-bit plaintext and 56-bit key, and describes the encryption process involving multiple rounds and transformations. Additionally, it touches on vulnerabilities in cryptographic schemes, particularly in relation to chosen ciphertext attacks.

Uploaded by

soyoco1900
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
Narre: (aaj Rewttrann “Roll m0? CeR22055 Coupe Code» COBIG “une.ntm: Combdn netanu LAG 1p Anal: ming the Avelorehe effect in DES C Data Enceypiont Gleneland) Pbjective. Te obseaue, ow A shingle. bit Cog i the plaintext offects the solowmedicle buelfe $ Each & pests 1 newts, abtimatsly paullie ina Sep ficertly Aiffewnt Cipher text + Demenseotiog di. avalarche. effect DES Ovewiew fopet 64-bit plowntext Key bie key (only ge bits te effecbvoty Rounds: 16 feysed Rounds Cath seurd tec lueles « Exparsion (32 — 48 bes) + Rey ariel ( XOR coith Rewtiey) + Substitution ( S- boxes) + Pormctation + Swaps of k{t amd ngs pales Avene. Effect ian DES Te avelarele. effet Uo anclarnental foefrily ol dreune. Cryft fite. + pudhns «St 4 amall af vv ad Input ~duch a pity A dimple bit - Should Cewrse a longs. dnfrcelicteble Chang in the elf 9m ca oorl cttw» ALi od ( Ng (ct we infu should “edeally ftp A 50 of he q extfuct bits - soos thal DES (Data Ere tion cStanclact) “a Arnal, block pha, Hat cropple 64 -bit plainieve blocks Ua WM Sb-bit Key (G4 -bie iioput hey with & panty BIS). Qe efombs in 1b Fiesiel nowmels , each. dbewbig Expansion, key voicing dubstitdien are ferracta on. Experiment deluf> . Ootginal Planter » Ox012 24 961SGABC DEF D Medlifiel Ploimext » Ox84£2.34 56 TSIABE oeF oI Keg ( wrchorged): oxigarsries ence Fs * Srey blion clgenten cStamdlat DES orang tem dowd within 16 _Metrodoloyy As Encaypt booth ~The. oviginnt enc — Maeli fred — pplevintont using) We, dome DES KH - °- Af. coth. hovel , Compost Tarernodlict ba bre pupa > Cart hoor aramy bid lle ae Rowwd amd — Chont We. crumeber Of afb bis fo obsewe haw the cwolaehe effect Revd by (Reed tenypontion aft. each neurel * poe ft- yy aaa eo - i g - us wo by 3-20 3 - Ih - 64 : ib - 5 4 - 268 — 60 5 - 22 Towa ion $ - 3 ig ~ $3 Avalysi + Qmidiak Rounds. gn fewer 5 only 3 vet of by bite Ore as fet Sid Ronde (aR) 1 Bed Aiffremer poof Around s0% of dite dif by maurcl 6, inlinke Ste diffesion q + Cine Reurdet fog fotred L2 Orval, wlroak Le al 64 pis wiffer » Ahowsey Corablete. rulart SS ‘ Gites Fifppec| 2 Corerat Prool of Hornp mos pric Property Lets consid. the RSA eremblion scherte. Nth thes follorot com ponents | + Poblte : ime) * Pave el , © Usher, “= Pq, jo. lage Primes 0,9 "ed = 1 med b(n) det YM, EZ be two plaintert mesnogts RSA every biton ob a remeroge, m is abefied on Elm)= m4 mod a Nod Cenacle -pu0 coouypied a = Elm) > mr mod 7 Cos amaaldiply she. two Ciphederts vam) ned = (ome 2 JE mod 7 E (mn, > me med 9 e yea = Cams c E Commo) This Proves that EB (om) Elena) = ean, ma) nad 9 bieanity ienplitation » Valirenabi lity fo Choton Ciphetere pol (CEA) Attack punmio (CC ALY} atlacke. interes a ciphertext Aubbose. an ce E(m) an 2) do not Kmows YRe = , Pirate Ney bak em any a avons welled cxlasened re dene os ae DD The. allockn picks wt reurelarn flu. te Zh ome Com furtss 2 ef ac Els) = Elan) +E («) = Elms) Thon sey fond 0% te whe omy piton poole. , Dect) = mt mod 9 wince, Ane atlocler mace 6 Hey @m Gocraficle # me plc’) +3 wed 7 Ths the eerie planiext om vethret™ eceg bh og C dinélly « Cornsng yer + Pod die schorw (fice PKCSHL Veg) one Vulnerable fp me propel jenp erent + « This 5 coh plain qs enempprton is Not demannid Jecune, undr chosen) Ciphetert Attocha (CCA) + + Maden apptiations use. OA CP Coprinnly Assy mabe! Endy prod Pacldirg ) ee cred to preoot ducr attacks « Coedlusivey “ial rnin fete. ermD MAb fs Nethe m= an elegamt fuck jnteo chusees ane and asta Lab » at allow cittackes ty Marmpilot Ciphtert evel Split otacle adtoss . me HRSA prt ee bolwe, vehems at schemes (8) Rea oder) + pebine rtd Fs,

You might also like