1. How is/was DES secure when you use the same Initial Permutation and Expansion Permutation tables every time? I realize that computing capabilities were limited in 1974, but as they increased, I feel like the tables should have changed, especially since DES is not a group.
2. One thing I found interesting was the lack of trust people had of the NSA. It seems like that's a recurring theme. I also was intrigued by expander functions. I had never seen those before, but they are definitely effective. As I read about both DES and the simplified DES-type algorithm, I realized how deep into computers both security and hacking has gotten. We are learning about how to encrypt a set of bits of information, which seems so tiny, when in reality, it could be hacked.
No comments:
Post a Comment