DES (Data Encryption Standard)

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Cryptography Block Ciphers and Feistel Functions.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
IT 221: Classical and Modern Encryption Techniques Lecture 2: Classical and Modern Encryption Techniques For Educational Purposes Only Revised: September.
CSCI 5857: Encoding and Encryption
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
Chapter 3 Encryption Algorithms & Systems (Part D)
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Triple DES.
School of Computer Science and Engineering Pusan National University
Blowfish Algorithm.
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Data Encryption Standard
Topics discussed in this section: 30-2 SYMMETRIC-KEY CRYPTOGRAPHY Symmetric-key cryptography started thousands of years ago when people needed.
Chapter-2 Classical Encryption Techniques.
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
- Stream Cipher and Block Cipher - Confusion & Diffusion
SYMMETRIC KEY ALGORITHMS
Lecture 2.2: Private Key Cryptography II
Networks and Communication Systems Department
NET 311 Information Security
Symmetric Key Block Ciphers
NET 311 Information Security
Chapter 3:Cryptography (16M)
PART VII Security.
Some of this slide set is from Section 2,
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Block Ciphers and the Data Encryption Standard (DES)
Algorithm Types & Algorithm Modes
Cryptography Lecture 17.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
NET 311 Information Security
Chapter -2 Block Ciphers and the Data Encryption Standard
Advanced Encryption Standard
SYMMETRIC KEY ALGORITHMS
Block Ciphers: DES and AES
About Blowfish Encryption Video made by: Tudor Mare Sorin Nita Valentina Sociu Stefan Stefanescu.
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
Advanced Encryption Standard
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
DATA ENCRYPTION STANDARD (DES)
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Data Encryption Standard (DES)
Presentation transcript:

DES (Data Encryption Standard) Visit for more Learning Resources

DES is a symmetric block cipher algorithm . It encrypts data 64 bits plain text block under the control of 56 bit key which produces 64 bits of cipher text. DES is based on the two fundamental attributes of cryptography: substitution and transposition

Steps in DES

Initial Permutation It happens only once. It replace 1st bit of original plain text with 58th bit of original plain text and so on. The resulting 64 bit permuted text block is divided into two half blocks each consist of 32 bits that is LPT(Left Plain Text) and RPT(Right Plain Text) 16 rounds are performed on this two blocks.

Each round steps(total 16 rounds)

Step 1 : key transformation The initial key available is 56 bit transformed it into a 48-bit key by discarding every 8th bit of initial key. This procedure is called “Key Transformation” which is repeated for every round.

Step 2: Expansion permutation: RPT is expanded from 32 bits to 48 bits. The 32-bit RPT is divided into 8 blocks, with each block consisting of 4-bits. Each 4-bits block of the previous step is then expanded to a corresponding 6-bit block, per 4-bit block, 2 more bits are added. The 48 bit key is XORed with the 48-bit RPT and the resulting output is given to the next step.

Step 3: S-box substitution: It accepts the 48-bits input produces 32-bit output using the substitution techniques. Each of the 8 S-boxes has a 6-bit input and a 4-bit output. The output of each S-box then combined to form a 32-bit block, which is given to the last stage of a round.

Step 3: S-box substitution:

Step 4: P- box permutation: the output of S-box consists of 32-bits. These 32-bits are permuted using P-box.

Step 5: XOR and Swap: The LPT of the initial 64-bits plain text block is XORed with the output produced by P box-permutation. It produces new RPT. The old RPT becomes new LPT, in a process of swapping.

Step 5: XOR and Swap:

Final Permutation: At the end of 16 rounds, the final permutation is performed. This is simple transposition. For e.g., the 40th input bit takes the position of 1st output bit and so on. For more detail contact us