SlideShare a Scribd company logo
1 of 23
Chapter 5
Secret key cryptography
Secret key cryptography
PRODUCT CIPHERS
secret-key ciphers are typically synthesized
using the
- Substitution Box (S-Box)
- and the Permutation Box (P-Box).
Substitution Box (S-Box)
• An S-box is a device that takes as
- input a (binary) string of length m
- returns a (binary) string 1 of length n.
While it is often the case that m = n, this need
not always be so.
• An S-box is implemented
- using a table (or array) of 2m rows with
each row containing an n-bit value.
• The input to the S-box is used to index the
table which returns the n-bit output of the
S-Box.
Permutation Box (P-Box).
• A P-Box performs a permutation or
rearrangement of the bits in the input.
• A permutation is more restrictive than a
substitution.
• For example, the number of zeros in the
output of the P-Box is equal to the number of
zeros in its input while an S-box imposes no
such restriction.
• A P-Box or S-box by itself is not sufficiently
powerful to create a secure cipher.
• cascading P-Boxes and S-Boxes alternately, the
strength of a cipher can be greatly increased.
• Such a cipher is referred to as a product
cipher.
• The three operations that take place in
sequence as shown in Fig.
• An Operation Involving Function Of The
Encryption Key
• A Substitution
• A Permutation
.
• These operations are repeated over many rounds or iterations
• Of the three operations, the first is the only one that involves the
encryption key.
• It is an ⊕(ex or) of the input with the "round" key.
• Each round key is a function of the bits in the encryption key.
• the S-box is usually implemented as a table.
• If the block size of the cipher is b, the size of the table that implement
b x b
• S-box is b x 2b bits.
• Thus, the table size increases exponentially with the number of inputs.
• As an example, for b = 64, the size of the table is 270 bits
which is a thousand billion billion bits!
• To save table space, a single S-box is broken into multiple
S-boxes as shown in each round
• If s is the number of S-boxes, the number of inputs to each
S-box is b/s.
• Each S-box is now implemented using a table of size
(b/s)2b/s bits.
• Thus, the total size of all the S-boxes is b x 2b/s bits.
• For a block size of 64, the use of eight S-boxes (each with 8 inputs)
would bring down the storage requirements to about 16,000 bits.
• Usage of s box injects non-linearity into the design of the cipher.
• Non-linearity implies the absence of a linear relationship between
any subset of bits in the plaintext, cipher text, and key.
• Finally, the third step in each round or iteration is a permutation.
• A P-Box re-orders the inputs that it receives. it diffuses or spreads
contiguous bits of the input across the entire block.
• Without the P-Box, the first b/s bits of the output would be a
function of the first b/s bits of the input, the second b/s bits of the
output would be a function of the second b/s bits of the input and
so on.
DES CONSTRUCTION
• DES is the successor to a cipher called Lucifer
designed by cryptographers at IBM in the 1960's.
• It was first published in March 1975 and was
chosen by the U.S. National Bureau of Standards
or NBS (later re-named National Institute of
Standards and Technology or NIST) as the
standard cipher for secret key cryptography in
January 1977.
Fiestel Structure
• The DES data block size is 64 bits.
• DES uses either 56 or 128 bit keys.
• A single block of plaintext is transformed into
ciphertext after passing through the following
stages
– An initial permutation
– 16 rounds of a given function
– a 32-bit left-right swap and
– a final permutation
• Each of the 16 rounds is functionally identical.
• The structure of each DES round is explained below.
• Let Li-1 and Ri-1 be the left and right halves of the input to
round i.
• Li =Ri-1
• Ri = Li-1 ⊕ f(Ri-1, Ki)
• The function f is applied at each round and is referred to as
the "round" function.
• Each round uses a round key, which is one of the inputs to f.
• Each round key is derived from the DES key.
• The process of decryption involves obtaining
Li-1 and Ri-1 from Li and Ri.
Execution proceeds from bottom to top and is
summarized by the following equations
Ri-1 = Li
Li-1= Ri ⊕ f(Li , Ki)
• The structure of such a cipher is attributed to Horst Feistel
(one of the key designers of DES).
• A cipher that has such a structure is referred to as a Feistel
cipher.
Round Function
• A round function [involves four operations:
- Expansion
- ⊕ with the round key
- Substitution
- Permutation
• The input to the round function is Ri-1, a 32-bit quantity
• This is first expanded into 48 bits by repeating some bits and
interchanging their positions.
• The bits in a round key are a function of the bits in the original
56-bit key.
• The result of the ⊕ operation is divided into
eight 6-bit chunks.
• Each chunk is substituted by a 4-bit chunk
• A total of 8 different S-boxes provide the eight
substitutions.
• An S-box is implemented using a 4 x 16 array.
• Each row of the array is a permutation of the
numbers 0 through 15.
• Two bits of the i-th chunk serve as a row index
(i5,i0)into the i-th table
• the remaining four bits serve as a column
index(i4, i3, i2, i1).
• The output of the S-box is simply the 4-bit
string pointed to by the row and column
indices.
•
Cryptography chapter 5
Cryptography chapter 5
Cryptography chapter 5
Cryptography chapter 5

More Related Content

What's hot

AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_reportNikhil Gupta
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementationRoman Oliynykov
 
Tugas basis data 2012110028
Tugas basis data 2012110028Tugas basis data 2012110028
Tugas basis data 2012110028UIGM
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Instruction set-of-8086
Instruction set-of-8086Instruction set-of-8086
Instruction set-of-8086mudulin
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture Dhaval Kaneria
 
Kernel Recipes 2013 - Persistent logs using UBI
Kernel Recipes 2013 - Persistent logs using UBIKernel Recipes 2013 - Persistent logs using UBI
Kernel Recipes 2013 - Persistent logs using UBIAnne Nicolas
 
Idea (international data encryption algorithm)
Idea (international data encryption algorithm)Idea (international data encryption algorithm)
Idea (international data encryption algorithm)AmanMishra208
 

What's hot (15)

694 lecture1aes
694 lecture1aes694 lecture1aes
694 lecture1aes
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
AES effecitve software implementation
AES effecitve software implementationAES effecitve software implementation
AES effecitve software implementation
 
Tugas basis data 2012110028
Tugas basis data 2012110028Tugas basis data 2012110028
Tugas basis data 2012110028
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Heapsort 1
Heapsort 1Heapsort 1
Heapsort 1
 
Instruction set-of-8086
Instruction set-of-8086Instruction set-of-8086
Instruction set-of-8086
 
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
Paper on Optimized AES Algorithm Core Using  FeedBack Architecture Paper on Optimized AES Algorithm Core Using  FeedBack Architecture
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
 
Idea
IdeaIdea
Idea
 
Kernel Recipes 2013 - Persistent logs using UBI
Kernel Recipes 2013 - Persistent logs using UBIKernel Recipes 2013 - Persistent logs using UBI
Kernel Recipes 2013 - Persistent logs using UBI
 
Idea (international data encryption algorithm)
Idea (international data encryption algorithm)Idea (international data encryption algorithm)
Idea (international data encryption algorithm)
 

Similar to Cryptography chapter 5

Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard desVaibhav Khanna
 
information security(Feistal Cipher)
information security(Feistal Cipher)information security(Feistal Cipher)
information security(Feistal Cipher)Zara Nawaz
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).pptMrsPrabhaBV
 
Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxeschuxuantinh
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptxseethal9
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptxSanthosh Prabhu
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipherUdit Mishra
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and AlternativesSam Bowne
 
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer ScienceNetwork security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer ScienceRathnaDeepa1
 
Modern Cryptography.pptx
Modern Cryptography.pptxModern Cryptography.pptx
Modern Cryptography.pptxwdwd10
 

Similar to Cryptography chapter 5 (20)

Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
 
information security(Feistal Cipher)
information security(Feistal Cipher)information security(Feistal Cipher)
information security(Feistal Cipher)
 
Des lecture
Des lectureDes lecture
Des lecture
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
 
DES-lecture (1).ppt
DES-lecture (1).pptDES-lecture (1).ppt
DES-lecture (1).ppt
 
AES.ppt
AES.pptAES.ppt
AES.ppt
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
3-Block Ciphers and DES.pdf
3-Block Ciphers and DES.pdf3-Block Ciphers and DES.pdf
3-Block Ciphers and DES.pdf
 
Modified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxesModified aes algorithm using multiple s boxes
Modified aes algorithm using multiple s boxes
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
 
Modern block cipher
Modern block cipherModern block cipher
Modern block cipher
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives
 
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer ScienceNetwork security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
 
Modern Cryptography.pptx
Modern Cryptography.pptxModern Cryptography.pptx
Modern Cryptography.pptx
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 

Recently uploaded (20)

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 

Cryptography chapter 5

  • 1. Chapter 5 Secret key cryptography
  • 2. Secret key cryptography PRODUCT CIPHERS secret-key ciphers are typically synthesized using the - Substitution Box (S-Box) - and the Permutation Box (P-Box).
  • 3. Substitution Box (S-Box) • An S-box is a device that takes as - input a (binary) string of length m - returns a (binary) string 1 of length n. While it is often the case that m = n, this need not always be so.
  • 4. • An S-box is implemented - using a table (or array) of 2m rows with each row containing an n-bit value. • The input to the S-box is used to index the table which returns the n-bit output of the S-Box.
  • 5. Permutation Box (P-Box). • A P-Box performs a permutation or rearrangement of the bits in the input. • A permutation is more restrictive than a substitution. • For example, the number of zeros in the output of the P-Box is equal to the number of zeros in its input while an S-box imposes no such restriction.
  • 6. • A P-Box or S-box by itself is not sufficiently powerful to create a secure cipher. • cascading P-Boxes and S-Boxes alternately, the strength of a cipher can be greatly increased. • Such a cipher is referred to as a product cipher.
  • 7. • The three operations that take place in sequence as shown in Fig. • An Operation Involving Function Of The Encryption Key • A Substitution • A Permutation
  • 8.
  • 9. . • These operations are repeated over many rounds or iterations • Of the three operations, the first is the only one that involves the encryption key. • It is an ⊕(ex or) of the input with the "round" key. • Each round key is a function of the bits in the encryption key. • the S-box is usually implemented as a table. • If the block size of the cipher is b, the size of the table that implement b x b • S-box is b x 2b bits. • Thus, the table size increases exponentially with the number of inputs.
  • 10. • As an example, for b = 64, the size of the table is 270 bits which is a thousand billion billion bits! • To save table space, a single S-box is broken into multiple S-boxes as shown in each round • If s is the number of S-boxes, the number of inputs to each S-box is b/s. • Each S-box is now implemented using a table of size (b/s)2b/s bits. • Thus, the total size of all the S-boxes is b x 2b/s bits.
  • 11. • For a block size of 64, the use of eight S-boxes (each with 8 inputs) would bring down the storage requirements to about 16,000 bits. • Usage of s box injects non-linearity into the design of the cipher. • Non-linearity implies the absence of a linear relationship between any subset of bits in the plaintext, cipher text, and key. • Finally, the third step in each round or iteration is a permutation. • A P-Box re-orders the inputs that it receives. it diffuses or spreads contiguous bits of the input across the entire block. • Without the P-Box, the first b/s bits of the output would be a function of the first b/s bits of the input, the second b/s bits of the output would be a function of the second b/s bits of the input and so on.
  • 12. DES CONSTRUCTION • DES is the successor to a cipher called Lucifer designed by cryptographers at IBM in the 1960's. • It was first published in March 1975 and was chosen by the U.S. National Bureau of Standards or NBS (later re-named National Institute of Standards and Technology or NIST) as the standard cipher for secret key cryptography in January 1977.
  • 14. • The DES data block size is 64 bits. • DES uses either 56 or 128 bit keys. • A single block of plaintext is transformed into ciphertext after passing through the following stages – An initial permutation – 16 rounds of a given function – a 32-bit left-right swap and – a final permutation
  • 15. • Each of the 16 rounds is functionally identical. • The structure of each DES round is explained below. • Let Li-1 and Ri-1 be the left and right halves of the input to round i. • Li =Ri-1 • Ri = Li-1 ⊕ f(Ri-1, Ki) • The function f is applied at each round and is referred to as the "round" function. • Each round uses a round key, which is one of the inputs to f. • Each round key is derived from the DES key.
  • 16. • The process of decryption involves obtaining Li-1 and Ri-1 from Li and Ri. Execution proceeds from bottom to top and is summarized by the following equations Ri-1 = Li Li-1= Ri ⊕ f(Li , Ki) • The structure of such a cipher is attributed to Horst Feistel (one of the key designers of DES). • A cipher that has such a structure is referred to as a Feistel cipher.
  • 17. Round Function • A round function [involves four operations: - Expansion - ⊕ with the round key - Substitution - Permutation • The input to the round function is Ri-1, a 32-bit quantity • This is first expanded into 48 bits by repeating some bits and interchanging their positions. • The bits in a round key are a function of the bits in the original 56-bit key.
  • 18. • The result of the ⊕ operation is divided into eight 6-bit chunks. • Each chunk is substituted by a 4-bit chunk • A total of 8 different S-boxes provide the eight substitutions. • An S-box is implemented using a 4 x 16 array. • Each row of the array is a permutation of the numbers 0 through 15.
  • 19. • Two bits of the i-th chunk serve as a row index (i5,i0)into the i-th table • the remaining four bits serve as a column index(i4, i3, i2, i1). • The output of the S-box is simply the 4-bit string pointed to by the row and column indices. •