CRYPTOGRAPHY. In this problem we will work through a round of DES. For notational simplicity, assume it is the first round. Please enter all answers as strings of 0's and 1's. The input is the 64 bit block 00000000000000100000000000000010000001000000010001000000000000000000000000000010000000000000001000000100000001000100000000000000 Suppose that the subkey for the current round is this 48 bit number: 000000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000 What does the 64 bit state look like after the IP transformation is applied to the input? Now find L0L0 and R0R0, the left and right halves of the state. L0=L0= R0=R0= What is the result of applying the expansion box to R0R0? E(R0)=E(R0)= What is the result of XORing the subkey with E(R0)E(R0)? k1⊕E(R0)=k1⊕E(R0)= We now apply the S-box transformation. S(k1⊕E(R0))=S(k1⊕E(R0))= Finally we apply the permutation box to complete the function ff. f(R0)=P(S(k1⊕E(R0)))=f(R0)=P(S(k1⊕E(R0)))= We can now compute the state of DES going into the next round. L1=L1= R1=R1=

Database System Concepts
7th Edition
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Chapter1: Introduction
Section: Chapter Questions
Problem 1PE
icon
Related questions
Question

 CRYPTOGRAPHY.
In this problem we will work through a round of DES.

For notational simplicity, assume it is the first round.

Please enter all answers as strings of 0's and 1's.

The input is the 64 bit block

00000000000000100000000000000010000001000000010001000000000000000000000000000010000000000000001000000100000001000100000000000000

Suppose that the subkey for the current round is this 48 bit number:

000000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000

What does the 64 bit state look like after the IP transformation is applied to the input?

 

Now find L0L0 and R0R0, the left and right halves of the state.
L0=L0= 

R0=R0= 

What is the result of applying the expansion box to R0R0?

E(R0)=E(R0)= 

What is the result of XORing the subkey with E(R0)E(R0)?

k1⊕E(R0)=k1⊕E(R0)= 

We now apply the S-box transformation.

S(k1⊕E(R0))=S(k1⊕E(R0))= 

Finally we apply the permutation box to complete the function ff.

f(R0)=P(S(k1⊕E(R0)))=f(R0)=P(S(k1⊕E(R0)))= 

We can now compute the state of DES going into the next round.

L1=L1= 

R1=R1= 

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Database System Concepts
Database System Concepts
Computer Science
ISBN:
9780078022159
Author:
Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:
McGraw-Hill Education
Starting Out with Python (4th Edition)
Starting Out with Python (4th Edition)
Computer Science
ISBN:
9780134444321
Author:
Tony Gaddis
Publisher:
PEARSON
Digital Fundamentals (11th Edition)
Digital Fundamentals (11th Edition)
Computer Science
ISBN:
9780132737968
Author:
Thomas L. Floyd
Publisher:
PEARSON
C How to Program (8th Edition)
C How to Program (8th Edition)
Computer Science
ISBN:
9780133976892
Author:
Paul J. Deitel, Harvey Deitel
Publisher:
PEARSON
Database Systems: Design, Implementation, & Manag…
Database Systems: Design, Implementation, & Manag…
Computer Science
ISBN:
9781337627900
Author:
Carlos Coronel, Steven Morris
Publisher:
Cengage Learning
Programmable Logic Controllers
Programmable Logic Controllers
Computer Science
ISBN:
9780073373843
Author:
Frank D. Petruzella
Publisher:
McGraw-Hill Education