Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Class notes

Cryptography and Network Security

Rating
-
Sold
-
Pages
2
Uploaded on
06-10-2022
Written in
2020/2021

Cryptography and Network Security covers ciphers, digital, analogue, network system security and many more. Exam PQ questions and answers are here also correctly solved. Practical and Theoretical

Institution
Course

Content preview

PROGRAMME: ICE
COURSE CODE: EIE 524
ASSIGNMENT


REVIEW QUESTIONS
3.1 Most symmetric block encryption algorithms in current use are based on the Feistel block
cipher structure. Therefore, a study of the Feistel structure reveals the principles behind these
more recent ciphers.

3.2 A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. A
block cipher is one in which a block of plaintext is treated as a whole and used to produce a
ciphertext block of equal length.

3.3 If a small block size, such as n = 4, is used, then the system is equivalent to a classical
substitution cipher. For small n, such systems are vulnerable to a statistical analysis of the
plaintext. For a large block size, the size of the key, which is on the order of n ´ 2n, makes the
system impractical.

3.4 In a product cipher, two or more basic ciphers are performed in sequence in such a way that
the final result or product is cryptographically stronger than any of the component ciphers.

3.5 In diffusion, the statistical structure of the plaintext is dissipated into long-range statistics of
the ciphertext. This is achieved by having each plaintext digit affect the value of many ciphertext
digits, which is equivalent to saying that each ciphertext digit is affected by many plaintext
digits. Confusion seeks to make the relationship between the statistics of the ciphertext and the
value of the encryption key as complex as possible, again to thwart attempts to discover the key.
Thus, even if the attacker can get some handle on the statistics of the ciphertext, the way in
which the key was used to produce that ciphertext is so complex as to make it difficult to deduce
the key. This is achieved by the use of a complex substitution algorithm.

3.6 Block size: Larger block sizes mean greater security (all other things being equal) but
reduced encryption/decryption speed.
Key size: Larger key size means greater security but may decrease encryption/decryption speed.
Number of rounds: The essence of the Feistel cipher is that a single round offers inadequate
security but that multiple rounds offer increasing security.
Subkey generation algorithm: Greater complexity in this algorithm should lead to greater
difficulty of cryptanalysis.
Round function: Again, greater complexity generally means greater resistance to cryptanalysis.

Written for

Institution
Course

Document information

Uploaded on
October 6, 2022
Number of pages
2
Written in
2020/2021
Type
Class notes
Professor(s)
Professor adoghe
Contains
All classes

Subjects

$7.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
emmanueluduebholo

Also available in package deal

Get to know the seller

Seller avatar
emmanueluduebholo Huawei
Follow You need to be logged in order to follow users or courses
Sold
-
Member since
3 year
Number of followers
0
Documents
17
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions