0% found this document useful (0 votes)
36 views

EECE 455/632 - Cryptography and Computer Security: Assignment

The document provides instructions for two exercises involving the Data Encryption Standard (DES) algorithm. The first exercise asks the reader to compute specific output bits from the first round of DES decryption given a ciphertext of all 1s and a key of all 0s. The second exercise asks the reader to perform one full round of DES encryption, showing the intermediate steps, given a plaintext block, key, and specifying the sub-key derivation, expansion, S-box substitution, permutation, and output ciphertext block.

Uploaded by

Karim Ghaddar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views

EECE 455/632 - Cryptography and Computer Security: Assignment

The document provides instructions for two exercises involving the Data Encryption Standard (DES) algorithm. The first exercise asks the reader to compute specific output bits from the first round of DES decryption given a ciphertext of all 1s and a key of all 0s. The second exercise asks the reader to perform one full round of DES encryption, showing the intermediate steps, given a plaintext block, key, and specifying the sub-key derivation, expansion, S-box substitution, permutation, and output ciphertext block.

Uploaded by

Karim Ghaddar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

EECE 455/632 – Cryptography and Computer Security

Assignment

CHAPTER 3
Exercise #1 (One round of DES, simplified)
Compute the bits numbered 7, 37, 47, and 57 at the output of the first round of DES decryption,
assuming that the ciphertext block is composed only of ones (1’s) and the external key is
composed only of zeros (0’s).

Exercise #2 (One round illustration of DES)


Assume that you have the following input:
The key, K, in hexadecimal is: A A A A B B B B C C C C 1 1 1 1
K in binary is: 1010 1010 1010 1010 1011 1011 1011 1011
1100 1100 1100 1100 0001 0001 0001 0001
The plaintext, T, in hexadecimal is: 0 0 1 1 2 2 3 3 4 4 5 5 6 6 7 7
T in Binary: 0000 0000 0001 0001 0010 0010 0011 0011
0100 0100 0101 0101 0110 0110 0111 0111
§ Now, perform one round of DES, writing out the following steps:
a. Derive the first-round sub-key, K1
b. Derive L0 and R0
c. Use the expansion function, E, to get E[R0]
d. Calculate A = E[R0] Å K1
e. Perform S-box substitutions to obtain a 32-bit result, B
f. Perform the permutation P(B)
g. Compute R1 = P(B) Å L0
h. Write down the resulting ciphertext block.

You might also like