Paper: https://eprint.iacr.org/2004/083.pdf Write code to implement…
Question Paper: https://eprint.iacr.org/2004/083.pdf Write code to implement… Paper: https://eprint.iacr.org/2004/083.pdf Write code to implement scan chain attack on DES. 1. Take an DES implementation (from SW resources) 2. Modify the implementation to implement the “scan chain” (i.e., output the results after 1 round of DES) 3. Deduce the DES round key by using the intermediate results. (See the Scan attack papers on DES) 4. Come up with a set of test patterns you need to deduce the key. a. Based on the scanned out responses, decide the test patterns for the subsequent iterations, until you can reverse engineer the key from the scanned out responses. 5. Write a report on how you reverse-engineered the key and submit your results along with your attack implementation Deliverables: 1.1 Submit the C/C++/Python code (Put prints after each of the process). 1. Print the plaintext input values used in each iteration of the attack algorithm 2. Print 2 possible values of each key byte. 1.2 Stepwise explanation of your code and the scan-attack (Explanation should include sample/screenshot of your code) 1.3 Run the code to extract three DES keys (submit screenshot of prints on output screen). Computer Science Engineering & Technology C++ Programming CS-UY MISC Share QuestionEmailCopy link Comments (0)


