The Digital Encryption Standard CSCI 5857: Encoding and Encryption.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

6.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Data Encryption Standard (DES)
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Data Encryption Standard (DES)
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 5 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Cryptography and Network Security Chapter 3
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Cryptography and Network Security
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
AES clear a replacement for DES was needed
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
Cryptography and Network Security (AES) Dr. Monther Aldwairi New York Institute of Technology- Amman Campus 10/18/2009 INCS 741: Cryptography 10/18/20091Dr.
Cryptography and Network Security Chapter 5. Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know.
Lecture 23 Symmetric Encryption
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Chapter 3 – Block Ciphers and the Data Encryption Standard
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Dr. Khalid A. Kaabneh Amman Arab University
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Chapter 5 –Advanced Encryption Standard "It seems very simple." "It is very simple. But if you don't know what the key is it's virtually indecipherable."
CSCI 5857: Encoding and Encryption
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
Advance Encryption Standard. Topics  Origin of AES  Basic AES  Inside Algorithm  Final Notes.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Hashing Algorithms: Basic Concepts and SHA-2 CSCI 5857: Encoding and Encryption.
Feistel Cipher Structure
Data Encryption Standard (DES) © 2000 Gregory Kesden.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
‘Baby DES’ cipher Alexei Vernitski. Block cipher A message is a sequence of bits: … We split the message in blocks of a fixed length.
Introduction to Modern Symmetric-key Ciphers
Le Trong Ngoc Security Fundamentals (2) Encryption mechanisms 4/2011.
Chapter 3 Encryption Algorithms & Systems (Part D)
Advanced Encryption Standard. Origins NIST issued a new version of DES in 1999 (FIPS PUB 46-3) DES should only be used in legacy systems 3DES will be.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Computer and Network Security Rabie A. Ramadan Lecture 3.
Module :MA3036NI Symmetric Encryption -4 Lecture Week 5.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Data Security and Encryption (CSE348) 1. Lecture # 7 2.
Data Encryption Standard (DES)
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
DES Analysis and Attacks CSCI 5857: Encoding and Encryption.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Instructor: Dania Alomar
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Data Security and Encryption (CSE348) 1. Lecture # 9 2.
Simplified DES.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Computer Security IT423 Semester II
Advanced Encryption Standard
Presentation transcript:

The Digital Encryption Standard CSCI 5857: Encoding and Encryption

Outline History and background Overall Feistel structure Mixer function –Permutation –Substitution boxes Round key generation –Key shifting –Compression box

History of DES Pre-1973: No standards for encryption 1973: National Institute of Standards requests proposals for national symmetric key cryptosystem 1975: NIST accepts proposal from IBM as national Digital Encryption Standard –56-bit key –Origin of some parts of structure classified –Input from NSA on S-Box structure

Overall DES Structure 64-bit block inputs and outputs 16 round Feistel cipher 56-bit key used to generate 48-bit round keys

Initial and Final Permutations Plaintext undergoes initial permutation Final permutation is inverse of initial permutation No known reason, since easy for adversary to simulate

Initial and Final P-Boxes

Feistel Structure Input at each round broken into 32-bit left and right halves Right half mixed with round key using “mixer” function f(R, K) Result XOR’d with left half Resulting left and right halves swapped before next round

Mixer Function 32-bit right half expanded to 48 bits Combined with round key using XOR Run through array of 6 x 4 S-Boxes Results combined and run through 32 x 32 P-Box

Expansion Permutation First and last bits of each four bits duplicated No real contribution to confusion, just matches size with round key

Array of S-Boxes 48-bit input broken into 8 “chunks” of 6 bits –Output of each compressed to 4 bits –Combined to form 32-bit output Each S-Box is different to maximize confusion

S-Box Structure 4 rows x 16 columns (2 bits x 4 bits) –Row determined by bits 1 and 6 of input –Column determined by bits 2 – 5 of input

S-Boxes 1 – 4

S-Boxes 5 – 8

DES S-Box Example Input: –First and last 2 bits: 10 = 2 in decimal –Middle four bits: 1001 = 9 in decimal Output: 12 = 1100

Mixer P-Box Goal: Output of each S-Box distributed across final round key value before use in XOR

Round Keys 16 round keys Applied in reverse order at decryption stage

Round Key Generation 64 bit input = 56 bits of key data + 8 parity bits 56-bit key split into 28- bit left and right halves Circular left shift applied to each half at each round Combined in compression P-Box to create 48-bit round key

Parity Bit Drop Every 8 th bit of key input used for parity check to detect transmission errors This stage removes the parity bits and shuffles key bits

Key Shift Schedule Key split into two subkeys (28 bits each) Circular left shift applied each round –One bit shift in rounds 1, 2, 9, 16 –Two bit shift in other rounds (adds up to 28) –Assures different key each round

Round Key Compression Reduces round key to 48 bits to match bits in mixer Combined with shifts, assures different bits used in each round key (different bits removed each round)