Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

New models of Intel Processors have six instructions for encrypting and decrypti

ID: 3828185 • Letter: N

Question

New models of Intel Processors have six instructions for encrypting and decrypting data using the AES algorithm. Explain how this enhancement follows or does not follow RISC design principles. Circle the letter of the correct answers for the following multiple choice questions. Note that more than one answer may be correct. You must circle ALL correct answers. A digital signature Appears as an image at the bottom of the file Detects modifications to the file Identifies the creator of the file Prevents others from being able to read the file Superscalar processors Are significantly faster than a Pentium 4 Execute adjacent instructions in parallel if there are no hazards Require the processor to have multiple ALUs Require the programmer to use a parallel computer language A RISC sliding register stack ls implemented in the Intel Pentium 4 processor. Passes parameters to a method or function in the registers Pushes the return address on the memory stack. Renames t

Explanation / Answer

8)

The AES algorithm works by encrypting a fixed block size of 128 bits of plain text in several rounds to produce the final encrypted cipher text. The number of rounds (10, 12, or 14) used depends on the key length (128b, 192b, or 256b). Each round performs a sequence of steps on the input state, which is then fed into the following round. Each round is encrypted using a subkey that is generated using a key schedule. For more details on AES.

The new AES-NI instruction set is comprised of six new instructions that perform several compute intensive parts of the AES algorithm. These instructions can execute using significantly less clock cycles than a software solution. Four of the new instructions are for accelerating the encryption/decryption of a round and two new instructions are for round key generation. The following is a description of the new instructions.

9) Identifies the creator of the file

10) Execute adjacent instructions in parallel if there are no hazards

11) Pushes the return address on the memory stack

12) is the encryption system used by DES and AES

13) delayed jumps

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote