# Homework Solution: We can concisely express the encryption algorithm as a composition1 of functions: which can also be writ…

10 bit keys 00100 10111 8 bit inut 10100101 Start going through the steps described in the document to encrypt this message. These individual steps must be documented in full detail. Remember that you are doing this to get the feel and the experience of actually going through a symmetric encryption technique, so thoroughness is important here. Once you succeed in encrypting the message, go back and decrypt it and verify that your cipher text is indeed resolvable into the original plaintext.
We can concisely express the encryption algorithm as a composition1 of functions: which can also be written as: ciphertext = IP-1(fr, (swifrl (IP(plaintext)) where K-P(Shift|Pl0(key)) K-P8 Shift Shift P10 kev Decryption is also shown in Figure G.1 and is essentially the reverse of encryption: plaintext = lp-1(fri(SW(fr2(IP(ciphertext)))

10 morsel clews 00100 10111

8 morsel inut 10100101

Start going through the steps forcible in the instrument to encrypt this notice.

These indivisible steps must be instrumented in bountiful specialty. Remember that you are doing this to secure the reach and the trial of substantially going through a symmetric encryption technique, so thoroughness is relevant here.

Once you abound in encrypting the notice, go tail and decrypt it and warrant that your nothing passage is verily resolvable into the initiatory plaintext.

We can concisely specific the encryption algorithm as a composition1 of functions: which can to-boot be written as: nothingpassage = IP-1(fr, (swifrl (IP(plaintext)) where K-P(Shift|Pl0(key)) K-P8 Shift Shift P10 kev Decryption is to-boot shown in Figure G.1 and is essentially the counterchange of encryption: plainpassage = lp-1(fri(SW(fr2(IP(ciphertext)))