DATA ENCRYPTION STANDARD (DES)

Slides:



Advertisements
Similar presentations
DATA ENCRYPTION STANDARD (DES). Outline History Encryption Key Generation Decryption Strength of DES Ultimate.
Advertisements

1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
ICS 454: Principles of Cryptography
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Feistel Cipher Structure
Data Encryption Standard (DES) © 2000 Gregory Kesden.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
Permuted Choice #
TE/CS 536 Network Security Spring 2005 – Lecture 8 Security of symmetric algorithms.
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
Chapter 3 Encryption Algorithms & Systems (Part D)
Cracking the DES Encryption
1 Symmetric key cryptography: DES DES: Data Encryption Standard US encryption standard [NIST 1993] 56-bit symmetric key, 64 bit plaintext input How secure.
Announcements: Homework 2 returned Homework 2 returned Monday: Written (concept and small calculations) exam on breaking ch 2 ciphers Monday: Written (concept.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Data Encryption Standard (DES)
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
DATA ENCRYPTION STANDARD (DES)
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Triple DES.
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Lecture 3.
Data Encryption Standard
Simplified IDEA Cryptography and Network Security.
SHAIKH SAMIUDDIN NIZAMI
SYMMETRIC KEY ALGORITHMS
Lecture 2.2: Private Key Cryptography II
Lecture 3: Symmetric Key Encryption
Networks and Communication Systems Department
NET 311 Information Security
Cryptography and Network Security Chapter 3
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
Rotors and Secret-Key Encryption
NET 311 Information Security
Chapter -2 Block Ciphers and the Data Encryption Standard
DES (Data Encryption Standards)
SYMMETRIC KEY ALGORITHMS
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
Feistel & DES -Sheetal Thapaliya.
DES (Data Encryption Standard)
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Cipher-Based MAC Network Security.
Feistel Cipher Structure
Data Encryption Standard (DES)
Presentation transcript:

DATA ENCRYPTION STANDARD (DES) -Sheetal Thapaliya

Outline History Key Generation Encryption Decryption Strength of DES Ultimate

History In 1971, IBM developed an algorithm, named LUCIFER which operates on a block of 64 bits, using a 128-bit key Walter Tuchman, an IBM researcher, refined LUCIFER and reduced the key size to 56-bit, to fit on a chip.

History In 1977, the results of Tuchman’s project of IBM was adopted as the Data Encryption Standard by NSA (NIST).

DES – Block Diagram

DES – Basic Information Block size of 64 bit Usable Key size 56 bit Input = Plain text and Key Plain text: 0000 0001 0010 0100 0101 0110 0111 1000 1001 1010 1011 1101 1110 1111 Key: 00010011 00110100 01010111 01111001 10011011 101111100 11011111 11110001 Output = Cipher No. of round = 16

Key Generation Input= 56 (or 64 bit) Output = 16 subkey of 48 bit Uses Permuted Choice (PC-1) table

Key Generation

Key Generation

Key Generation Generate other C0 and D0 by Left Circular Shift

Key Generation

Key Generation C1D1 = 111000 1100110 0101010 1011111 1010101 0110011 00111100 0011110 K1 = 000110 110000 001011 101111 111111 000111 000001 110010

Key Generation

EnCRYption Input= 64 bit Output = 64 bit Key Size = 32 bit

Encryption Block Diagram

Encryption – IP (initial Permutation)

Encryption : Divide plain text

Encryption: The f function Block Diagram

Encryption : Calculation of f Size Rn-1 = 32 bit Size of Kn = 48 bit Thus Expand Rn-1 using E Bit-Selection Table

Encryption: Calculation of f E bit Selection Table

Encryption: Calculation of f S-Box Input = 6 bit X 8 = 48 bit Output= 4 bit X 8 = 32 bit Eg.: 011000  0101

Encryption: Calculation of f S-Box 010001 1100 011111 ?

Encryption: Calculation of f S-Box

Encryption: Calculation of f Output of S-BOX

Encryption: Calculation of f Last step: Permulation

Encryption: Final Calculation of R1 Repeat this step upto 16 round Final block : L16 R16 Reverse to get : R16 L16

Encryption: Final Permutation

Encryption: Final Permutation

Thank you