Key Permutation Part 4

Encryption 101 Cipher Algorithm operations
2 minutes
Share the link to this page
Copied
  Completed
You need to have access to the item to view this lesson.
One-time Fee
$69.99
List Price:  $99.99
You save:  $30
€61.54
List Price:  €87.92
You save:  €26.37
£52.76
List Price:  £75.37
You save:  £22.61
CA$96.87
List Price:  CA$138.39
You save:  CA$41.52
A$109.55
List Price:  A$156.51
You save:  A$46.95
S$91.73
List Price:  S$131.06
You save:  S$39.32
HK$543.37
List Price:  HK$776.27
You save:  HK$232.90
CHF 57.28
List Price:  CHF 81.84
You save:  CHF 24.55
NOK kr732.97
List Price:  NOK kr1,047.14
You save:  NOK kr314.17
DKK kr459.51
List Price:  DKK kr656.48
You save:  DKK kr196.96
NZ$117.16
List Price:  NZ$167.38
You save:  NZ$50.22
د.إ257.07
List Price:  د.إ367.26
You save:  د.إ110.18
৳8,498.75
List Price:  ৳12,141.59
You save:  ৳3,642.84
₹5,975.99
List Price:  ₹8,537.50
You save:  ₹2,561.50
RM308.48
List Price:  RM440.70
You save:  RM132.22
₦112,206.56
List Price:  ₦160,301.96
You save:  ₦48,095.40
₨19,624.68
List Price:  ₨28,036.47
You save:  ₨8,411.78
฿2,333.95
List Price:  ฿3,334.36
You save:  ฿1,000.41
₺2,661.02
List Price:  ₺3,801.63
You save:  ₺1,140.60
B$406.50
List Price:  B$580.74
You save:  B$174.24
R1,317.28
List Price:  R1,881.92
You save:  R564.63
Лв120.48
List Price:  Лв172.12
You save:  Лв51.64
₩99,273.11
List Price:  ₩141,824.81
You save:  ₩42,551.70
₪257.98
List Price:  ₪368.57
You save:  ₪110.58
₱3,968.04
List Price:  ₱5,668.88
You save:  ₱1,700.83
¥9,966.07
List Price:  ¥14,237.86
You save:  ¥4,271.78
MX$1,380.15
List Price:  MX$1,971.73
You save:  MX$591.58
QR254.95
List Price:  QR364.23
You save:  QR109.27
P964.16
List Price:  P1,377.43
You save:  P413.27
KSh9,074.90
List Price:  KSh12,964.70
You save:  KSh3,889.80
E£3,578.37
List Price:  E£5,112.17
You save:  E£1,533.80
ብር9,310.32
List Price:  ብር13,301.03
You save:  ብር3,990.70
Kz64,110.84
List Price:  Kz91,590.84
You save:  Kz27,480
CLP$67,726.52
List Price:  CLP$96,756.32
You save:  CLP$29,029.80
CN¥510.63
List Price:  CN¥729.50
You save:  CN¥218.87
RD$4,195.18
List Price:  RD$5,993.38
You save:  RD$1,798.19
DA9,284.08
List Price:  DA13,263.54
You save:  DA3,979.46
FJ$159.98
List Price:  FJ$228.55
You save:  FJ$68.57
Q538.79
List Price:  Q769.73
You save:  Q230.94
GY$14,673.87
List Price:  GY$20,963.57
You save:  GY$6,289.70
ISK kr8,931.42
List Price:  ISK kr12,759.72
You save:  ISK kr3,828.30
DH648.77
List Price:  DH926.86
You save:  DH278.08
L1,210.09
List Price:  L1,728.78
You save:  L518.68
ден3,790.66
List Price:  ден5,415.46
You save:  ден1,624.80
MOP$559.24
List Price:  MOP$798.95
You save:  MOP$239.71
N$1,319.79
List Price:  N$1,885.50
You save:  N$565.70
C$2,573.88
List Price:  C$3,677.13
You save:  C$1,103.25
रु9,553.85
List Price:  रु13,648.95
You save:  रु4,095.09
S/260.67
List Price:  S/372.40
You save:  S/111.73
K289.28
List Price:  K413.28
You save:  K123.99
SAR262.60
List Price:  SAR375.16
You save:  SAR112.56
ZK1,991.80
List Price:  ZK2,845.55
You save:  ZK853.75
L306.39
List Price:  L437.72
You save:  L131.33
Kč1,542.51
List Price:  Kč2,203.68
You save:  Kč661.17
Ft25,133.16
List Price:  Ft35,906.06
You save:  Ft10,772.89
SEK kr673.33
List Price:  SEK kr961.95
You save:  SEK kr288.61
ARS$79,646.52
List Price:  ARS$113,785.63
You save:  ARS$34,139.10
Bs483.39
List Price:  Bs690.58
You save:  Bs207.19
COP$301,147.88
List Price:  COP$430,229.70
You save:  COP$129,081.81
₡35,153.86
List Price:  ₡50,221.95
You save:  ₡15,068.09
L1,813.35
List Price:  L2,590.62
You save:  L777.26
₲559,917.39
List Price:  ₲799,916.27
You save:  ₲239,998.88
$U2,963.96
List Price:  $U4,234.41
You save:  $U1,270.45
zł263.31
List Price:  zł376.18
You save:  zł112.86
Already have an account? Log In

Transcript

So we're doing permutation and what we are actually doing is mixing out the bits. And from the first permutation each cipher algorithm is doing sets of operations and repeats them in several rounds. What kind of operation, throwing away some bits, doing another set of permutation, rearranging the bits, splitting the key into two halfs. swapping the half's shifting the bits left and right. And then we do another round, another permutation splitting the keys and swapping them. cipher algorithms are doing dozens of such rounds to get the perfect secret key.

So that's four key. And what about the plaintext that we want to encrypt? That is also being primitive using a permutation table. So if for example, we have a plaintext, or a bitstream of 10101010. And our permutation table turns the output into 01010101. We take the plaintext and we split it into two halves.

Now let's take a look at one half. We do what is called an expand and permitted that is each bit is being duplicated and arranged differently. So if we have 1010 we do Located and rearrange it. And now let's take our key and store it with the premeditation of the plain text. And the result is the cipher text. Now, that was a simplification of the process.

There are multiple rounds of operations and each cipher algorithm works in a different way. But the idea is the same idea. You're taking the bits, you swap them, you shift them, you substitute them with the key, and you generate a cipher text.

Sign Up

Share

Share with friends, get 20% off
Invite your friends to LearnDesk learning marketplace. For each purchase they make, you get 20% off (upto $10) on your next purchase.