COMPUTER NETWORKING

NETWORK SECURITY

CONFIDENTIALITY

Question [CLICK ON ANY CHOICE TO KNOW THE RIGHT ANSWER]
DES follows
A
Hash Algorithm
B
Caesars Cipher
C
Feistel Cipher Structure
D
SP Networks
Explanation: 

Detailed explanation-1: -Explanation: DES follows Feistel Cipher Structure. Explanation: The DES Algorithm Cipher System consists of 16 rounds (iterations) each with a round key. Explanation: DES encrypts blocks of 64 bits using a 64 bit key.

Detailed explanation-2: -DES is a block cipher that operates on data blocks of 64 bits in size. DES uses a 64-bit key 8 × 8 including 1 bit for parity, so the actual key is 56 bits. DES, in common with other block ciphers, is based around a structure called a Feistel Lattice so it is useful to describe how this works.

Detailed explanation-3: -Feistel cipher structure encrypts plain text in several rounds, where it applies substitution and permutation to the data. Each round uses a different key for encryption, and that same key is used for the decryption process.

Detailed explanation-4: -Feistel cipher design divides blocks in left and right halves, mangles the right half with a sub-key and swaps the two halves. 3. DES consists of 16 rounds using a 56-bit key from which 48-bit subkeys are generated. Each round uses eight 6x4 S-Boxes followed by permutation.

There is 1 question to complete.