Database System Concepts
Database System Concepts
7th Edition
ISBN: 9780078022159
Author: Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher: McGraw-Hill Education
Bartleby Related Questions Icon

Related questions

Question

please give a step by step implementation of this using only operators in the nand2tetris hack assembly language

The Feistel cipher is a symmetric block cipher encryption framework which is the basis
of many modern day encryption algorithms. In this coursework you will implement
a Feistel cipher system as a software implementation in Hack Assembly.
In a Feistel cipher the plaintext, P, to be encrypted is split into two equal size parts
Lo and Ro such that P = LoRo. A function F is applied to one half of the plaintext,
combined with a key, and the result is XOR'd with the other half of the plaintext.
Feistel ciphers often employ multiple rounds of this scheme. In general the scheme
works as follows, for all i=0,...,N,
Li+1 = Ri
Ri+1 = L; F(R₁, K₁)
To decrypt an encrypted message using this cipher we can apply the same procedure.
in reverse. For in,n
1,..., 0,
R₁ = Li+1
L₁ = Ri+1 F(Li+1, Ki)
For this coursework we are interested in the 16-bit Feistel cipher which uses 4 rounds.
The function F(A, B) = A + ¬B.
The keys are derived from a single 8-bit key Ko such that,
Ko=b7b6b5b4b3b₂b₁bo
K1b6b5b4b3b2b1b0b7
K₂ = b5b4b3b2b1bb7b6
K3=b4b3b2b1b0b7b6b5
expand button
Transcribed Image Text:The Feistel cipher is a symmetric block cipher encryption framework which is the basis of many modern day encryption algorithms. In this coursework you will implement a Feistel cipher system as a software implementation in Hack Assembly. In a Feistel cipher the plaintext, P, to be encrypted is split into two equal size parts Lo and Ro such that P = LoRo. A function F is applied to one half of the plaintext, combined with a key, and the result is XOR'd with the other half of the plaintext. Feistel ciphers often employ multiple rounds of this scheme. In general the scheme works as follows, for all i=0,...,N, Li+1 = Ri Ri+1 = L; F(R₁, K₁) To decrypt an encrypted message using this cipher we can apply the same procedure. in reverse. For in,n 1,..., 0, R₁ = Li+1 L₁ = Ri+1 F(Li+1, Ki) For this coursework we are interested in the 16-bit Feistel cipher which uses 4 rounds. The function F(A, B) = A + ¬B. The keys are derived from a single 8-bit key Ko such that, Ko=b7b6b5b4b3b₂b₁bo K1b6b5b4b3b2b1b0b7 K₂ = b5b4b3b2b1bb7b6 K3=b4b3b2b1b0b7b6b5
Write a program (Rotate.asm) in HACK assembly that implements an algorithm
to rotate the bits of a 16-bit number left (Least Significant bit (LSb) to Most
Significant bit (MSb)). The original number should be stored in RAM[3], the
number of times to rotate the bits should be in RAM[4] and the result stored in
RAM[5], i.e. 1010111100000000 rotated left 3 times would be 0111100000000101
where the MSb is used to replace the LSb on each rotation.
expand button
Transcribed Image Text:Write a program (Rotate.asm) in HACK assembly that implements an algorithm to rotate the bits of a 16-bit number left (Least Significant bit (LSb) to Most Significant bit (MSb)). The original number should be stored in RAM[3], the number of times to rotate the bits should be in RAM[4] and the result stored in RAM[5], i.e. 1010111100000000 rotated left 3 times would be 0111100000000101 where the MSb is used to replace the LSb on each rotation.
Expert Solution
Check Mark
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Database System Concepts
Computer Science
ISBN:9780078022159
Author:Abraham Silberschatz Professor, Henry F. Korth, S. Sudarshan
Publisher:McGraw-Hill Education
Text book image
Starting Out with Python (4th Edition)
Computer Science
ISBN:9780134444321
Author:Tony Gaddis
Publisher:PEARSON
Text book image
Digital Fundamentals (11th Edition)
Computer Science
ISBN:9780132737968
Author:Thomas L. Floyd
Publisher:PEARSON
Text book image
C How to Program (8th Edition)
Computer Science
ISBN:9780133976892
Author:Paul J. Deitel, Harvey Deitel
Publisher:PEARSON
Text book image
Database Systems: Design, Implementation, & Manag...
Computer Science
ISBN:9781337627900
Author:Carlos Coronel, Steven Morris
Publisher:Cengage Learning
Text book image
Programmable Logic Controllers
Computer Science
ISBN:9780073373843
Author:Frank D. Petruzella
Publisher:McGraw-Hill Education