Explore BrainMass
Share

Information Security: DES and Rijndael Protocol

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

1.What is DES? What is triple DES? How did the Rijndael protocol enhance DES?

2.What are substitution ciphers? How do they differ from one-time pads (OTP)? Which is better for the IS manager to employ and why?

© BrainMass Inc. brainmass.com October 25, 2018, 3:35 am ad1c9bdddf
https://brainmass.com/computer-science/random-number-generation/information-security-des-rijndael-protocol-345798

Solution Preview

See the attached file.
DES stands for Data Encryption Standard and was the cipher selected to encrypt government information in 1976. It is a block cipher, which means that it uses a fixed length block. Therefore if you put in 128 bits of plaintext data, you will get back 128 bits of encrypted data. Block ciphers also use a symmetric key. Symmetric key ciphers are a class of ciphers that use similar or identical keys for decryption and encryption.
DES uses a block size of 64 bits, with 8 of those used of parity checks. As a result, DES uses a key size of only 56 bits. By 1998, DES had proven to be too insecure when a special DES breaking computer designed by the Electronic Frontier Foundation was able to break DES in only a few days.
Triple DES encrypts blocks 3 times, using 2 different cipher keys. This produces 112 bit keys and 80 bit security. DES is still considered secure.
The Advanced Encryption Standard (AES) ...

Solution Summary

The solution discusses what is DES and how Rijndael protocol enhances DES.

$2.19
See Also This Related BrainMass Solution

The Data Encryption Standard (DES) is exemplified.

Q1: What are substitution ciphers? How do they differ from one-time pads? Which is better for the IS manager to employ? Explain your answer.

Q2: What is the Data Encryption Standard (DES)? What is triple DES? How did the Rijndael protocol enhance DES?

Q3: What is an intrusion detection system (IDS)? What are the two types of IDS? Provide examples of at least three things that a properly configured IDS does for the IS manager.

Q4: Is intrusion prevention a proactive or reactive approach? Why? Provide an example. What is a digital signature? How does digital signature enhance the authenticity and integrity of data? Provide at least two examples.

View Full Posting Details