1|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
Department of Computer Science and Computer Engineering
NSW Assignment Stage 06 (Prac 06) Individual Submission: Hard copy/ Soft copy shown to the tutor/lecturer Deadline: End of this lab session Worth: 1% for lab work + 0.5% BONUS for at least 1 hour attendance
Objectives: (1) To understand and learn more about computer and IT security based on lecture notes and internet sources. Exercise 1 1. Explain the ways by which the cryptographic systems are categorized. Ans: Mainly in three ways: a. type of encryption operations used i. substitution (for example, in case of alphabet as well twenty replace t by z and w by a y) ii. transposition ,changing the position of the data or the character iii. product, multiply data with secret code. b. number of keys used i. single-key or private(same key for encryption and decryption) ii. two-key or public (different key for encryption and decryption) c. way in which plaintext is processed i. block (take a known sized block of data to encrypt) ii. stream (encryption is performed on each byte or word sequentially)
2. Explain the following: i. Plain text: Original message that needed to be sent. 2|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
ii. Cipher text: When the plain text is converted in to a coded message using the encryption operations. iii. Cipher: Cipher Algorithm is used to execute the cryptographic systems. Key iv. Encipher-The procedure of converting plain text to cipher text. v. Decipher: recovering/ retrieving the plain text from cipher. vi. Cryptography: study of encryption principles/methods. vii. Cryptanalysis: (code breaking) - study of principles/ methods of deciphering cipher text without knowing key.
3. Explain the Symmetric Cipher Model. Detail the five ingredients of the symmetric cipher model, shown in Stallings Figure
Plaintext - original message
Encryption algorithm performs substitutions/transformations on plaintext
Secret key control exact substitutions/transformations used in encryption algorithm
ciphertext - scrambled message
Decryption algorithm inverse of encryption algorithm
Recover Plaintext - original message
Its requirements a strong encryption algorithm a secret key known only to sender / receiver
Transmitting end Receiving end 3|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
Exercise 2 1. Explain Feistel Cipher Structure for implementing symmetric encryption with the help of a diagram. Feistel Cipher Structure : used for Multiple encryption
Design elements of Feistel Cipher 4|Page Please provide references. Dont ignore PLAGIARISM, avoid it!
The exact realization of a Feistel network depends on the choice of the following parameters & design features: Block size key size - increasing size improves security, makes exhaustive key searching harder, but may slow cipher number of rounds - increasing number improves security Sub-key generation algorithm - greater complexity can make analysis harder, but slows cipher Round function - greater complexity can make analysis harder, but slows cipher fast Software en/decryption - more recent concern for practical use Ease of analysis - for easier validation & testing of strength
Echo on a Chip - Secure Embedded Systems in Cryptography: A New Perception for the Next Generation of Micro-Controllers handling Encryption for Mobile Messaging