Experiment 7: Encryption of plaintext using Twofish algorithm
Twofish Encryption Simulation Procedure
Objective
The objective of this experiment is to simulate the Twofish encryption algorithm and provide students with a visual understanding of the internal workings of the encryption process. Participants will enter a plain text message, which will be internally converted to its corresponding 128-bit binary and hexa-decimal representation. The message will then undergo the standard 16-round Twofish algorithm, and students will be able to view the internal workings for each round.
Experimental Setup
Input
- Students input a 16-character plain text message.
Conversion
- The entered plain text message is internally converted to the corresponding 128-bit binary representation.
- The binary representation is further converted to its hexa-decimal representation.
Twofish Encryption
- The hexa-decimal message is fed into the standard 16-round Twofish algorithm.
- Each round involves a series of predefined calculations.
Visualization
- Hexa-decimal data is represented as a matrix for better understanding.
- Each step of the encryption process is clearly visualized to aid student comprehension.
User Interaction
- Students can click provided buttons to view the internal workings of the encryption process for each round.
Intermediate Result
- Participants will be asked to calculate the (k+1)th intermediate result after the first k rounds.
Evaluation
- If the student provides the correct answer, the remainder of the simulation will be shown.
Conclusion
This experiment aims to enhance students' understanding of the Twofish encryption algorithm by providing a hands-on, visual representation of the process. The interactive nature of the simulation encourages active participation and reinforces theoretical knowledge.