SHARE
SPREAD
HELP

The Tradition of Sharing

Help your friends and juniors by posting answers to the questions that you know. Also post questions that are not available.


To start with, Sr2Jr’s first step is to reduce the expenses related to education. To achieve this goal Sr2Jr organized the textbook’s question and answers. Sr2Jr is community based and need your support to fill the question and answers. The question and answers posted will be available free of cost to all.

 

#
Authors:
James F. Kurose, Keith W. Ross
Chapter:
Security In Computer Networks
Exercise:
Problems
Question:5 | ISBN:9780132856201 | Edition: 6

Question

Consider the block cipher in Figure 8.5. For a given “key” Alice and Bob would need to keep eight tables, each 8 bits by 8 bits. For Alice (or Bob) to store all eight tables, how many bits of storage are necessary? How does this number compare with the number of bits required for a full-table 64- bit block cipher?

TextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbookTextbook

Answer

(a)      For Alice and Bob to store all eight tables how many bits of storage are necessary?

  • # of table*size each entry  

= 8*2^8*8

= (2^3)(2^8)(2^3)

= 2^14 bits

(b)      How does this number compare with the number of bits required for a full-table 64-bit block cipher? (3 pts) (Referenced)

  • Bits 2^14 bits are far smaller if compared with the number of bits required for a full table 64 bit block cipher (2^71)
0 0

Discussions

Post the discussion to improve the above solution.