Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
expand_more
expand_more
format_list_bulleted
Question
Data Encryption Standard
Perform a Data Encryption Standard encryption on the plaintext (PL) by using key (K). The PL is your first 8 characters of your name and K is the last 8 digits of your student ID.
For example:
Name: Siti Fajar
Plain text (PL): SITIFAJA
Student ID: 201908040016
Key (K): 08040016
Show detail step by step involved.
Expert Solution
This question has been solved!
Explore an expertly crafted, step-by-step solution for a thorough understanding of key concepts.
Step by stepSolved in 2 steps
Knowledge Booster
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.Similar questions
- Public key cryptosystems are: (more than one may be true, choose all that are true) a offering a simpler way for key distribution B faster than symmetric C the preferred solution when the message we want to encrypt is very large D easily used to offer integrity E requiring advanced hardware in order to use them F easily used to offer confidentiality G marketed better than symmetric that is why people prefer them H using one key for encryption and a different key for decryptionarrow_forwardCryptography: Alice’s modulus is 11292367, her public exponent is e=94321 and her private exponent is d=6327241. Use RSA to sign the message: x=08041115arrow_forward Block size = 8 bits Hash size = 8 bits Encryption function: Divide the key into two halves: LK and RK; Divide the plaintext into twohalves: LT and RT; Then ciphertext= LC||RC where LC=LK XOR RT; and RC = RK XOR LT;where LC, RC, LT, and RT are each 4 bits; Plaintext and ciphertext are each 8 bits. g(H) = an 8-bit string that is equal to the complement of bits in H; For example, if H=A3 (Hexa)= 10100011 (binary); then g(H)= 01011100 H0 = Initial hash = 11001010 Given a message m: CAB2 (in Hexa);Q1. Determine the hash (in hexadecimal) of the message M using Martyas-Meyer-Oseas hashfunction (Fig. 11.7). Q.2 Determine the hash (in hexadecimal) of the message M using Davis-Meyer hash function(Fig. 11.6) Q.3 Determine the hash (in hexadecimal) of the message M using Migayuchi-Preneel hashfunction (Fig. 11.6)arrow_forward
- Explain what the following lines of code do pad = len(byteblock)%16 * (-1)byteblock_trimmed = byteblock[64:pad]ciphertext = cipher.encrypt(byteblock_trimmed)ciphertext = byteblock[0:64] + ciphertext + byteblock[pad:]arrow_forwardCS 386 Project: Overview Project Synopsis: This group project will require your group to design and implement your own enciphering algorithm. Your team's algorithm must combine the two operations, substitution and permutation/transposition, into your unique encryption algorithm. Your encryption algorithm must include multiple rounds of the two operations. You program must be able to encrypt and decrypt messages. Your team will need to give your algorithm a name that is unique to your encryption technique. Your group mayarrow_forwardQuestion # 3 Assume that Dominique and Pricilla agreed to use an auto key cipher with initial keyvalue k1 = 11. Now Dominique wants to send Pricilla the following message“THE CLASS IS CANCELLED”. Encrypt the message before transmitting it over the Internet Remember: i need a Mathematics solution not computer program You must show all the steps of your workarrow_forward
- Computer Science Assume we use transposition cipher to encrypt the data, and the original message is stored in a 8 by 5 matrix (8 rows and 5 columns). If the ciphertext is shown below, what is the original plaintext?WMHPSCATEEEUCELELTCTIASLOTMRNCAarrow_forwardQuestion 9 Full explain this question and text typing work only thanksarrow_forwardSince hashing passwords in a file is a far better idea than encrypting the password file, it is the method of choice.arrow_forward
- Following the example, please break this cipher: c=6642328489179330732282037747645 n=17058317327334907783258193953123 Please use screenshots to demonstrate the intermediate steps and results. [screenshot]arrow_forwardPlaintext: SALUTE yields ciphertext: BKXSDG using a Hill cipher. Find the key matrix for m=2.arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education