Data Standard Encryption (DES): An Exercise in Hand Calculations
1. Obtain from your professor a unique 10-bit key (unique to each individual student).
2. Obtain from your professor a unique 8-bit message (unique to each individual student).
3. Start going through the steps described in the document to encrypt this message.
4. These individual steps must be documented in full detail. Remember that you are doing this to get the feel and the experience of actually going through a symmetric encryption technique, so thoroughness is important here.
5. Once you succeed in encrypting the message, go back and decrypt it and verify that your cipher text is indeed resolvable into the original plaintext.
6. I need detailed lab report documenting all the steps, with captions detailing what each step represents.
7. Plan on spending a few hours on this educational venture.
10 bit keys 00100 10111
8 bit input 10100101
Recently Asked Questions
- After reading Chapters 1, 3 and 4, how does the information relate to you own personal volunteer experiences? The above question has to do with a Nonprofit
- The area of a region under a curve is greater than the area of an inscribed rectangle and less than the area of a circumscribed rectangle. Intuitively, we
- complete the balance sheet below given Current ratio 2.5 times Profit margin 10% Sales $1,200m ROE 20% Long-term debt to Long-term debt and equity 55% Current