CRYPTOGRAPHY. In this problem we will work through a round of DES. For notational simplicity, assume it is the first round. Please enter all answers as strings of 0's and 1's. The input is the 64 bit block 00000000000000100000000000000010000001000000010001000000000000000000000000000010000000000000001000000100000001000100000000000000 Suppose that the subkey for the current round is this 48 bit number: 000000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000 What does the 64 bit state look like after the IP transformation is applied to the input? Now find L0L0 and R0R0, the left and right halves of the state. L0=L0= R0=R0= What is the result of applying the expansion box to R0R0? E(R0)=E(R0)= What is the result of XORing the subkey with E(R0)E(R0)? k1⊕E(R0)=k1⊕E(R0)= We now apply the S-box transformation. S(k1⊕E(R0))=S(k1⊕E(R0))= Finally we apply the permutation box to complete the function ff. f(R0)=P(S(k1⊕E(R0)))=f(R0)=P(S(k1⊕E(R0)))= We can now compute the state of DES going into the next round. L1=L1= R1=R1=

Systems Architecture
7th Edition
ISBN:9781305080195
Author:Stephen D. Burd
Publisher:Stephen D. Burd
Chapter8: Data And Network Communication Technology
Section: Chapter Questions
Problem 41VE
icon
Related questions
Question

 CRYPTOGRAPHY.
In this problem we will work through a round of DES.

For notational simplicity, assume it is the first round.

Please enter all answers as strings of 0's and 1's.

The input is the 64 bit block

00000000000000100000000000000010000001000000010001000000000000000000000000000010000000000000001000000100000001000100000000000000

Suppose that the subkey for the current round is this 48 bit number:

000000000000000001000000000000000000000000000000000000000000000001000000000000000000000000000000

What does the 64 bit state look like after the IP transformation is applied to the input?

 

Now find L0L0 and R0R0, the left and right halves of the state.
L0=L0= 

R0=R0= 

What is the result of applying the expansion box to R0R0?

E(R0)=E(R0)= 

What is the result of XORing the subkey with E(R0)E(R0)?

k1⊕E(R0)=k1⊕E(R0)= 

We now apply the S-box transformation.

S(k1⊕E(R0))=S(k1⊕E(R0))= 

Finally we apply the permutation box to complete the function ff.

f(R0)=P(S(k1⊕E(R0)))=f(R0)=P(S(k1⊕E(R0)))= 

We can now compute the state of DES going into the next round.

L1=L1= 

R1=R1= 

Expert Solution
steps

Step by step

Solved in 2 steps

Blurred answer
Knowledge Booster
Public key encryption
Learn more about
Need a deep-dive on the concept behind this application? Look no further. Learn more about this topic, computer-science and related others by exploring similar questions and additional content below.
Similar questions
  • SEE MORE QUESTIONS
Recommended textbooks for you
Systems Architecture
Systems Architecture
Computer Science
ISBN:
9781305080195
Author:
Stephen D. Burd
Publisher:
Cengage Learning