Monday, September 23, 2013

Sections 4.1, 4.2, 4.4 due on September 23

1. How is/was DES secure when you use the same Initial Permutation and Expansion Permutation tables every time? I realize that computing capabilities were limited in 1974, but as they increased, I feel like the tables should have changed, especially since DES is not a group.

2. One thing I found interesting was the lack of trust people had of the NSA. It seems like that's a recurring theme. I also was intrigued by expander functions. I had never seen those before, but they are definitely effective. As I read about both DES and the simplified DES-type algorithm, I realized how deep into computers both security and hacking has gotten. We are learning about how to encrypt a set of bits of information, which seems so tiny, when in reality, it could be hacked.

No comments:

Post a Comment