SlideShare a Scribd company logo
DES Supplementary Material
DES Supplementary Material
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
57 49 41 33 25 17 9
1 58 50 42 34 26 18
10 2 59 51 43 35 27
19 11 3 60 52 44 36
63 55 47 39 31 23 15
7 62 54 46 38 30 22
14 6 61 53 45 37 29
21 13 5 28 20 12 4
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
Key
#
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Left
Shift
1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
14 17 11 24 1 5
3 28 15 6 21 10
23 19 12 4 26 8
16 7 27 20 13 2
41 52 31 37 47 55
30 40 51 45 33 48
44 49 39 56 34 53
46 42 50 36 29 32
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 23 1
24 bit
24 bit
16 bit
16 bit
DES Supplementary Material
32 1 2 3 4 5
4 5 6 7 8 9
8 9 10 11 12 13
12 13 14 15 16 17
16 17 18 19 20 21
20 21 22 23 24 25
24 25 26 27 28 29
28 29 30 31 32 1
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
24 bit
24 bit
16 bit
16 bit
S-Box 1 S-Box 2 S-Box 3 S-Box 4
S-Box 5 S-Box 6 S-Box 7 S-Box 8
DES Supplementary Material
0 1 2 . . . 15
0
1
2
3
S-Box
6 bits
4 bits
DES Supplementary Material
 S-Box 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7
1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8
2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0
3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
DES Supplementary Material
 S-Box 2
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10
1 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5
2 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15
3 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
DES Supplementary Material
 S-Box 3
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8
1 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1
2 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7
3 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
DES Supplementary Material
 S-Box 4
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15
1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9
2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4
3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
DES Supplementary Material
 S-Box 5
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9
1 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6
2 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14
3 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
DES Supplementary Material
 S-Box 6
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11
1 10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8
2 9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6
3 4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
DES Supplementary Material
 S-Box 7
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1
1 13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6
2 1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2
3 6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
DES Supplementary Material
 S-Box 8
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7
1 1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2
2 7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8
3 2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
DES Supplementary Material
16 7 20 21 29 12 28 17
1 15 23 26 5 18 31 10
2 8 24 14 32 27 3 9
19 13 30 6 22 11 4 25
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
38 6 46 14 54 22 62 30
37 5 45 13 53 21 61 29
36 4 44 12 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
DES Supplementary Material
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

More Related Content

Viewers also liked

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
Stephen Lahanas
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
Noctorous Jamal
 
Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
Noctorous Jamal
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
Noctorous Jamal
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
Noctorous Jamal
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
 
Multimedia
MultimediaMultimedia
Multimedia
Sean Chia
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
C++ Programming Language
C++ Programming Language C++ Programming Language
C++ Programming Language
Mohamed Loey
 
01 c++ Intro.ppt
01 c++ Intro.ppt01 c++ Intro.ppt
01 c++ Intro.pptTareq Hasan
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
Mohamed Loey
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
Zakriya Ali Sabir
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
Online
 
Introduction to multimedia
Introduction to multimediaIntroduction to multimedia
Introduction to multimedia
Southern Leyte State University
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
Ahmed Moussa
 

Viewers also liked (20)

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
 
Hashing
HashingHashing
Hashing
 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
 
Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
 
Multimedia
MultimediaMultimedia
Multimedia
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
C++ Programming Language
C++ Programming Language C++ Programming Language
C++ Programming Language
 
01 c++ Intro.ppt
01 c++ Intro.ppt01 c++ Intro.ppt
01 c++ Intro.ppt
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
 
Introduction to multimedia
Introduction to multimediaIntroduction to multimedia
Introduction to multimedia
 
Multimedia
MultimediaMultimedia
Multimedia
 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
 

Similar to Computer Security Lecture 4.1: DES Supplementary Material

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Mohammad Golyani
 
ch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).pptch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).ppt
MrsPrabhaBV
 
information security lecture 7 & 8 .pptx
information security lecture 7 & 8 .pptxinformation security lecture 7 & 8 .pptx
information security lecture 7 & 8 .pptx
NasirAli233814
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
JeevananthamArumugam
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
Amir Masinaei
 
CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)
Jinho Choi
 
Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques
Alexander Litvinenko
 
Ctrie Data Structure
Ctrie Data StructureCtrie Data Structure
Ctrie Data Structure
Aleksandar Prokopec
 
13 14 mathcounts-students version
13 14 mathcounts-students version13 14 mathcounts-students version
13 14 mathcounts-students version
T Mordo Hollo
 
Millionaire tools. Chapter 1
Millionaire tools. Chapter 1Millionaire tools. Chapter 1
Millionaire tools. Chapter 1
BILINGUAL SCHOOL IES SEVERO OCHOA
 
Millionaire CHAPTER 1. Review your knowledge
Millionaire CHAPTER 1. Review your knowledgeMillionaire CHAPTER 1. Review your knowledge
Millionaire CHAPTER 1. Review your knowledge
BILINGUAL SCHOOL IES SEVERO OCHOA
 
Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...
Alexander Litvinenko
 

Similar to Computer Security Lecture 4.1: DES Supplementary Material (12)

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
ch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).pptch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).ppt
 
information security lecture 7 & 8 .pptx
information security lecture 7 & 8 .pptxinformation security lecture 7 & 8 .pptx
information security lecture 7 & 8 .pptx
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)
 
Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques
 
Ctrie Data Structure
Ctrie Data StructureCtrie Data Structure
Ctrie Data Structure
 
13 14 mathcounts-students version
13 14 mathcounts-students version13 14 mathcounts-students version
13 14 mathcounts-students version
 
Millionaire tools. Chapter 1
Millionaire tools. Chapter 1Millionaire tools. Chapter 1
Millionaire tools. Chapter 1
 
Millionaire CHAPTER 1. Review your knowledge
Millionaire CHAPTER 1. Review your knowledgeMillionaire CHAPTER 1. Review your knowledge
Millionaire CHAPTER 1. Review your knowledge
 
Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...
 

More from Mohamed Loey

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
Mohamed Loey
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
Mohamed Loey
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
Mohamed Loey
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
Mohamed Loey
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
Mohamed Loey
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
Mohamed Loey
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
Mohamed Loey
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
Mohamed Loey
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
Mohamed Loey
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
Mohamed Loey
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
Mohamed Loey
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
Mohamed Loey
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
Mohamed Loey
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
Mohamed Loey
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
Mohamed Loey
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
Mohamed Loey
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
Mohamed Loey
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
Mohamed Loey
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
Mohamed Loey
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
Mohamed Loey
 

More from Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
 

Recently uploaded

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

Computer Security Lecture 4.1: DES Supplementary Material

  • 1. DES Supplementary Material DES Supplementary Material
  • 2. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 3. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 4. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 5. DES Supplementary Material 57 49 41 33 25 17 9 1 58 50 42 34 26 18 10 2 59 51 43 35 27 19 11 3 60 52 44 36 63 55 47 39 31 23 15 7 62 54 46 38 30 22 14 6 61 53 45 37 29 21 13 5 28 20 12 4
  • 6. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 7. DES Supplementary Material Key # 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Left Shift 1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1
  • 8. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 9. DES Supplementary Material 14 17 11 24 1 5 3 28 15 6 21 10 23 19 12 4 26 8 16 7 27 20 13 2 41 52 31 37 47 55 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32
  • 10. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 11. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 12. DES Supplementary Material 58 50 42 34 26 18 10 2 60 52 44 36 28 20 12 4 62 54 46 38 30 22 14 6 64 56 48 40 32 24 16 8 57 49 41 33 25 17 9 1 59 51 43 35 27 19 11 3 61 53 45 37 29 21 13 5 63 55 47 39 31 23 15 7
  • 13. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 14. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 15. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 16. DES Supplementary Material 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 23 1 24 bit 24 bit 16 bit 16 bit
  • 17. DES Supplementary Material 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 32 1
  • 18. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 19. DES Supplementary Material 24 bit 24 bit 16 bit 16 bit S-Box 1 S-Box 2 S-Box 3 S-Box 4 S-Box 5 S-Box 6 S-Box 7 S-Box 8
  • 20. DES Supplementary Material 0 1 2 . . . 15 0 1 2 3 S-Box 6 bits 4 bits
  • 21. DES Supplementary Material  S-Box 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7 1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0 3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
  • 22. DES Supplementary Material  S-Box 2 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10 1 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5 2 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15 3 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
  • 23. DES Supplementary Material  S-Box 3 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8 1 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1 2 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7 3 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
  • 24. DES Supplementary Material  S-Box 4 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15 1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9 2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4 3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
  • 25. DES Supplementary Material  S-Box 5 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9 1 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6 2 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14 3 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
  • 26. DES Supplementary Material  S-Box 6 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11 1 10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8 2 9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6 3 4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
  • 27. DES Supplementary Material  S-Box 7 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1 1 13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6 2 1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2 3 6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
  • 28. DES Supplementary Material  S-Box 8 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7 1 1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2 2 7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8 3 2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
  • 29. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 30. DES Supplementary Material 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
  • 31. DES Supplementary Material 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
  • 32. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 33. DES Supplementary Material 40 8 48 16 56 24 64 32 39 7 47 15 55 23 63 31 38 6 46 14 54 22 62 30 37 5 45 13 53 21 61 29 36 4 44 12 52 20 60 28 35 3 43 11 51 19 59 27 34 2 42 10 50 18 58 26 33 1 41 9 49 17 57 25
  • 34. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 36. DES Supplementary Material www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME