Vous êtes sur la page 1sur 3

Homework Title / No.

: 2 Course Code : CSE532

Course Instructor: Mr. mandeep Singh Course Tutor (if applicable) :

Date of Allotment: 18.2.2011 Date of submission : 26.2.2011

Student’s Roll No: RG1007B26 Section No. : G1007


Declaration:
I declare that this assignment is my individual work. I have not copied from any other
student’s work or from any other source except where due acknowledgment is made
explicitly in the text, nor has any part been written for me by another person.
Student’s Signature :Alpinder
Kaur
Evaluator’s comments:
_____________________________________________________________________
Marks obtained : ___________ out of ______________________
Content of Homework should start from this page only:

Part A
Ques 1) Why is it important to study the Feistel Cipher?
Ans:- Feistal cipher Is the concept of the product cipher which is the
performing of two or basic ciphers in sequence in such a way that the
final result is product is crptographacialy stronger than any other
component cipher.Feistel proposed the use of ciphers that alternates
substitution and permutation so feistal cipher.
Q2. Write one algorithm for encryption as well as decryption for DES?
Ans:-
Part B:-
Q4. Write down AES encryption algorithm and prove your algorithm with
help of an Example?
Ans:-
Q5. What is the need of Stream Cipher? Write an algorithm to generate a key
Stream?

Ans:- A stream cipher, also called a stream algorithm, combines plaintext bits
with a key stream. A key stream is a pseudorandom algorithm bit stream.
Plaintext digits are encrypted one at a time.

The stream cipher part of the RIM Cryptographic API is based on the common
stream interface in Java and uses similar read and write function calls to interact
with the stream. After a stream cipher is established, you don't need to write
code for what it does: all activity is automatically performed by the class on the
underlying stream.
Q6 What is the concept behind Asymmetric Key Cryptography? How is better
than Symmetric Key Cryptography?
Ans:-Asymmetric Encryption
The problem with secret keys is exchanging them over the Internet or a large
network while preventing them from falling into the wrong hands. Anyone who
knows the secret key can decrypt the message. One answer is asymmetric
encryption, in which there are two related keys--a key pair. A public key is
made freely available to anyone who might want to send you a message. A
second, private key is kept secret, so that only you know it.
Any message (text, binary files, or documents) that are encrypted by using the
public key can only be decrypted by applying the same algorithm, but by using
the matching private key. Any message that is encrypted by using the private
key can only be decrypted by using the matching public key.
This means that you do not have to worry about passing public keys over the
Internet (the keys are supposed to be public). A problem with asymmetric
encryption, however, is that it is slower than symmetric encryption. It requires
far more processing power to both encrypt and decrypt the content of the
message.
Part a
Ques3) Discuss the purpose of the S-box DES?
Ans:- The s- box in the function F is that the substitution consist of a set of eight
s-boxes, each of which accepts 6 bits as input and produce 4 bit as fallow. The
first and last bit Of the input to box Si from a 2-bit binary number to select one
of four substitution defined by the four rows in the table for Si. The middle four
bit selects one or sixteen columns. The decimal value in the cell selected byrow
and column is then converted into 4-bit representation to produce the output.

Vous aimerez peut-être aussi