Data Standard Encryption (DES): An Exercise in Hand Calculations
1. Obtain from your professor a unique 10-bit key (unique to each individual student).
2. Obtain from your professor a unique 8-bit message (unique to each individual student).
3. Start going through the steps described in the document to encrypt this message.
4. These individual steps must be documented in full detail. Remember that you are doing this to get the feel and the experience of actually going through a symmetric encryption technique, so thoroughness is important here.
5. Once you succeed in encrypting the message, go back and decrypt it and verify that your cipher text is indeed resolvable into the original plaintext.
6. I need detailed lab report documenting all the steps, with captions detailing what each step represents.
7. Plan on spending a few hours on this educational venture.
10 bit keys 00100 10111
8 bit input 10100101
Recently Asked Questions
- Suppose that grade point averages of undergraduate students at one university have a bell-shaped distribution with a mean of 2.6 2.6 and a standard deviation
- Ms. D sold a business that she had operated as a sole proprietorship for 18 years. On date of sale, the business balance sheet showed the following assets:
- What do you think about Hart and Fredrickson's ideas of "patriotism of benevolence"? How do these ideas balance out with the "proper role" of public