Experiment 7: Encryption of plaintext using Twofish algorithm

Twofish Encryption Simulation Procedure

Objective

The objective of this experiment is to simulate the Twofish encryption algorithm and provide students with a visual understanding of the internal workings of the encryption process. Participants will enter a plain text message, which will be internally converted to its corresponding 128-bit binary and hexa-decimal representation. The message will then undergo the standard 16-round Twofish algorithm, and students will be able to view the internal workings for each round.

Experimental Setup

Input

  1. Students input a 16-character plain text message.

Conversion

  1. The entered plain text message is internally converted to the corresponding 128-bit binary representation.
  2. The binary representation is further converted to its hexa-decimal representation.

Twofish Encryption

  1. The hexa-decimal message is fed into the standard 16-round Twofish algorithm.
  2. Each round involves a series of predefined calculations.

Visualization

  1. Hexa-decimal data is represented as a matrix for better understanding.
  2. Each step of the encryption process is clearly visualized to aid student comprehension.

User Interaction

  1. Students can click provided buttons to view the internal workings of the encryption process for each round.

Intermediate Result

  1. Participants will be asked to calculate the (k+1)th intermediate result after the first k rounds.

Evaluation

  1. If the student provides the correct answer, the remainder of the simulation will be shown.

Conclusion

This experiment aims to enhance students' understanding of the Twofish encryption algorithm by providing a hands-on, visual representation of the process. The interactive nature of the simulation encourages active participation and reinforces theoretical knowledge.