Ginni has Published 1624 Articles

What are the basic terms used in cryptography in information security?

Ginni

Ginni

Updated on 15-Mar-2022 09:42:06

Cryptography is an automated mathematical tool that plays an important role in network security. It supports the confidentiality and integrity of information and provide authentication and non-repudiation to the users.Cryptography is frequently used in distributed applications to transfer recognition and authentication information from one system to another over a network. ... Read More

What is Triple DES?

Ginni

Ginni

Updated on 15-Mar-2022 09:40:29

Triple DES is also called a TDES. It is a symmetric key block cipher, defining that the same key can be used to encrypt and decrypt information in fixed-length set of bits known as blocks. It is known as "Triple DES" because it uses the DES cipher three times when ... Read More

How does the meet in middle attack work on Double DES?

Ginni

Ginni

Updated on 15-Mar-2022 09:37:59

The Double DES uses two example of DES cipher for encryption and two units of reverse DES cipher for decryption. Each unit of DES cipher needs multiple key for encryption which enhance the size of the key (112 bit) creating it more secure. But in the double DES can be ... Read More

What are the design issues of DES?

Ginni

Ginni

Updated on 15-Mar-2022 09:36:05

Data Encryption Standard (DES) is a block cipher algorithm that takes plain text in blocks of 64 bits and transform them to ciphertext utilizing keys of 48 bits. It is a symmetric key algorithm. It can define that the same key can be used for encrypting and decrypting data.The design ... Read More

What is Double DES?

Ginni

Ginni

Updated on 14-Mar-2022 10:17:56

The Data Encryption Standard (DES) is a symmetric key block cipher which creates 64-bit plaintext and 56-bit key as an input and makes 64-bit cipher text as output. The DES function is create up of P and S-boxes. P-boxes transpose bits and S-boxes substitute bits to make a cipher.DES is ... Read More

What are the Properties of Data Encryption Standard?

Ginni

Ginni

Updated on 14-Mar-2022 10:14:58

DES is a block cipher. The encryption procedure is create of two permutations (Pboxes) that it can be defined initial and final permutations, and 16 Feistel rounds. Each round need a different 48-bit round key created from the cipher key according to a pre-represented algorithm. The DES function uses a ... Read More

What are the Variations of DES?

Ginni

Ginni

Updated on 14-Mar-2022 10:12:59

There are two main variations of Data Encryption Standard are as follows −Double DES − Double DES is an encryption approach which need two instance of DES on same plain text. In both instances it uses multiple keys to encrypt the plain text. Both keys are needed at the time ... Read More

What are the elements of DES?

Ginni

Ginni

Updated on 14-Mar-2022 10:10:04

There are various elements of DES which are as follows −Use of S-Boxes − The tables used for substitution i.e., the S-boxes, in DES are kept hidden by IBM. IBM supports that it took them over 17 person years to appear up with the internal design of the S-boxes.Key Length ... Read More

What is Expansion Permutation in Information Security?

Ginni

Ginni

Updated on 14-Mar-2022 10:07:55

This operation expands the right half of the information, R from 32 bits to 48 bits and this operation changes the order of the bits as well as repeating specific bits. It is called an expansion permutation.This operation has two objective including it creates the right half the similar size ... Read More

How many Rounds are there in DES?

Ginni

Ginni

Updated on 14-Mar-2022 10:05:26

DES uses 16 rounds. Each of the 16 rounds includes the broad-level steps are as follows −Key Transformation − An initial 64-bit key is changed into a 56-bit key by discarding each 8th bit of the initial key. Therefore for each round, a 56 bit key is available. From this ... Read More

Previous 1 ... 4 5 6 7 8 ... 163 Next
Advertisements