CS 519 / ECE 599 : Advanced Network Security ( Fall 2014 ) Instructor : Dr . Attila A Yavuz
نویسنده
چکیده
Instructor: Dr. Attila A Yavuz Homework 1 (10/29/2014) ANSWER KEY 1) [8 total] (2) What is the basic design technique, which is frequently used to construct modern symmetric ciphers? Substitution Permutation Networks (SPN) (2) What are the main security properties achieved via this designed technique? Confusion by substitution and diffusion by permutation (4) Given the example of AES, which functional steps enable achieving these properties? Please provide specific names of these operations and briefly explain how they are applied in AES, Initial AES S-Box with 16 substitution and later in MixColumn octet substitutions to achieve confusion property and eliminate linearity. After applying S-Box, row-wise circular rotates introduce permutation. MixColumn third step (by slides) rotates columns and then collapses multiple elements into one with particular XOR operations (slides 32). Round keys produce a sub-key for each round and introduce it into process.
منابع مشابه
CS / ECE 578 : Cyber Security ( Fall 2017
Symmetric cryptography offers high computational efficiency, since it does not rely on expensive operations such as modular exponentiation or cryptographic pairing. Moreover, it offers compact authentication tags, proportional to the size of underlying primitive, for instance 160-bit with SHA1 based HMAC and 128-bit for AES-based MACs. Finally, key sizes are small and almost optimal, which offe...
متن کاملThe College of Engineering is home to four Centers of Excellence :
Centers of Excellence Center for Advanced Communications (CAC) Dr. Moeness Amin, Director and ECE Professor Dr. Fauzia Ahmad, Research Professor and Director, Radar Imaging Lab Dr. Robert Caverly, ECE Professor Dr. Ahmad Hoorfar, ECE Professor; Director, Antenna Research Laboratory Dr. Bijan G. Mobasseri, ECE Chair and Professor Dr. Sridhar Santhanam, ME Professor Dr. Rosalind Wynne, ECE Associ...
متن کاملNOVEL METHODS FOR SECURITY PROTOCOLS AND KEY MANAGEMENT TECHNIQUES IN WIRELESS NETWORKS BASED ON SIGNCRYPTION AND HYBRID CRYPTOGRAPHY by
NOVEL METHODS FOR SECURITY PROTOCOLS AND KEY MANAGEMENT TECHNIQUES IN WIRELESS NETWORKS BASED ON SIGNCRYPTION AND HYBRID
متن کامل