Professional Documents
Culture Documents
2. Suppose that we have the following 128-bit AES key, given in hex-
adecimal notation:
2B7E151628AED2A6ABF 7158809CF 4F 3C
Construct two more keys from this key, explaining each step of the
construction. (07)
1 1 0 0 1 1 0 0
0 0 0 0 0 0 0 0
1 1 0 0 1 1 0 0
1 1 1 1 1 1 1 1
1 1 1 1 0 0 0 0
1 0 1 0 1 0 1 0
1 1 1 1 0 0 0 0
1 0 1 0 1 0 1 0
Page 2
so we obtain
L0 = 11001100000000001100110011111111
R0 = 11110000101010101111000010101010
133457799BBCDF F 1
0 0 0 1 0 0 1 1
0 0 1 1 0 1 0 0
0 1 0 1 0 1 1 1
0 1 1 1 1 0 0 1
1 0 0 1 1 0 1 1
1 0 1 1 1 1 0 0
1 1 0 1 1 1 1 1
1 1 1 1 0 0 0 1
K1 = 000110110000001011101111111111000111000001110010.
E(R◦ ) ⊕ K1 = 011000010001011110111010100001100110010100100111
f (Rcirc , K) = 00000011010010111010100110111011
and finally
R1 = 11001111010010110110010101000100.
Now, compute the second round using above given information. (07)
K = 00111010100101001101011000111111
Page 3
and the round keys are,
K1 = 0011101010010100
K2 = 1010100101001101
K3 = 1001010011010110
K4 = 0100110101100011
K5 = 1101011000111111
Suppose the plaintext is, x = 1100010000001101. Then what will
be the output of first round of SPN? That is, find out u0 , v 0 and
w0 using following permutation and substitution:
z 0 1 2 3 4 5 6 7 8 9 A B C D E F
πS (z) E 4 D 1 2 F B 8 3 A 6 C 5 9 0 7
Table 1: Substitution Table
z 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
πP (z) 1 5 9 13 2 6 10 14 3 7 11 15 4 8 12 16
Table 2: Permutation Table
(03)
(c) Show that the stream cipher that is constructed with a linear
shift register can also be viewed as a block cipher in OFB mode
if the length of the plaintext is a multiple of block length. (03)
6. (a) For k = 21 and m = 247, find s for which k s mod m = 60. (02)
(b) For k = 21 and m = 247, find s for which k s mod m = 64. (02)
(c) Suppose two parties perform a Diffie-Hellman key exchange, and
you intercept their values of k = 21, m = 247, k r mod m = 34,
and k s mod m = 64. Use your answer to part (b) to determine
the candidate RSA encryption exponent e = k r·s mod m. (03)
Page 4
A ↔ 1 B ↔ 2 C ↔ x
D ↔ x+1 E ↔ x+2 F ↔ 2x
G ↔ 2x + 1 H ↔ 2x + 2 I ↔ x2
J ↔ x2 + 1 K ↔ x2 + 2 L ↔ x2 + x
M ↔ x2 + x + 1 N ↔ x2 + x + 2 O ↔ x2 + 2x
P ↔ x2 + 2x + 1 Q ↔ x2 + 2x + 2 R ↔ 2x2
S ↔ 2x2 + 1 T ↔ 2x2 + 2 U ↔ 2x2 + x
V ↔ 2x2 + x + 1 W ↔ 2x2 + x + 2 X ↔ 2x2 + 2x
Y ↔ 2x2 + 2x + 1 Z ↔ 2x2 + 2x + 2
(07)
Page 5