Professional Documents
Culture Documents
Requirement:
- Student works individually an submits the pdf file with filename Lab2-ID.pdf
1. DES
Students open Avalanche (DES).cwm in folder C:\Program Files (x86)\CrypTool
2\Templates\Cryptanalysis\Modern. Click on “Enable to change single bit”
1
1.1 Change message, keep key
- Type student name (only 8 characters) into DES plaintext.
- Click on any bit in initial message to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8
# of flipped bits
% of flipped bits
Round 9 10 11 12 13 14 15 16
# of flipped bits
% of flipped bits
# of flipped bits
% of flipped bits
Round 9 10 11 12 13 14 15 16
# of flipped bits
% of flipped bits
2
1.3 Keep message, change key
- Type student name (only 8 characters) into DES plaintext.
- Click on 8th bit in initial key to change -> Done
- Click Continue to see the change from round to round and Encryption result.
- Fill the information from the result into following table (include the figure of
Cryptool to show the input and the result):
Round 1 2 3 4 5 6 7 8
# of flipped bits
% of flipped bits
Round 9 10 11 12 13 14 15 16
# of flipped bits
% of flipped bits
3
2. AES
Open the AESVisualisierung.cwm file to inspect the operation of AES and fill
information in the following table:
Content Description
192 bits.
256 bits.
Summarize the First, the last four bytes of the previous key are taken.
steps of creating Afterward, the last byte is placed at the front
key in each round
Every byte in the state matrix is exchanged with the
(round key)
corresponding byte from S-box
Adding the first four bytes of the previous key gives you the
first four bytes of the next key
For column x of the new key you XOR column x from the
previous key with column x-1 from the new key.
List and describe 4 Sub Byte: First, a byte is transferred from the state matrix to
functions (in order) the transition spot and split up. The corresponding byte in the
in each round S-box is determined and placed into the result matrix.
Shift Row : First, the second row is shifted once to the left.
Then, the third row is shifted twice towards the left, and
4
finally the fourth row is shifted three times to the left. The
overlapping bytes are transferred to the right to form a 4x4
matrix.
Mix Col: One column is taken from the current state and
placed next to the multiplication matrix. Then it is multiplied
with the multiplication matrix to determine the next column
of the next state.