SlideShare a Scribd company logo
DATA ENCRYPTION
STANDARD (DES)
MUHAMMAD HARIS AHMED
M.HARIS@STU.SMIU.EDU.PK
12CS45
SYMMETRIC SYSTEMS
• Several types of symmetric algorithms are used
today. They have different methods of
providing encryption and decryption
functionality
• The one thing they all have in common is that
they are symmetric algorithms, meaning the
sender and receiver are using two instances of
the same key
SYMMETRIC ALGORITHMS
• Data Encryption Standard (DES)
• 3DES (Triple DES)
• Blowfish
• Twofish
• IDEA (International Data Encryption Algorithm)
• RC4, RC5, RC6
• AES (Advanced Encryption Standard)
• SAFER (Secure and Fast Encryption Routine
DES FIRST BREAK!
• In 1998, the Electronic Frontier Foundation
built a computer system for $250,000 that
broke DES in three days by using a brute force
attack against the keyspace
DES FIRST BREAK!
• It contained 1,536 microprocessors running at
40MHz, which performed 60 million test
decryptions per second per chip
WHAT IS DES?
DES Use Symmetric system means both sender
and receiver side we used same key for
encryption and decryption.
WHAT IS DES?
DES used 64 bits of block for encryption and
decryption.
 Sixteen rounds of transposition and
substitution are performed in order to achieve
DES.
DES ADVANCEMENT CYCLE
HOW DOES DES WORK ?
• DES is a symmetric block encryption algorithm.
When 64-bit blocks of plaintext go in, 64-bit
blocks of cipher text come out.
• It is also a symmetric algorithm, meaning the
same key is used for encryption and
decryption.
• It uses a 64-bit key: 56 bits make up the true
key, and 8 bits are used for parity.
HOW DOES DES WORK ? ….
• When the DES algorithm is applied to data, it
divides the message into blocks and operates
on them one at a time.
• The blocks are put through 16 rounds of
transposition and substitution functions.
• The result is 64-bit blocks of ciphertext.
DES MODES
• Block ciphers have several modes of operation.
Each mode specifies how a block cipher will
operate.
DES MODES
• Electronic Code Book (ECB)
• Cipher Block Chaining (CBC)
• Cipher Feedback (CFB)
• Output Feedback (OFB)
• Counter Mode (CTR)
• It Inherit core functionality from their parent
block which is Symmetric System.
• Like 64 bits of block use for encryption and
decryption.
• Use Same key for encryption and decryption of
all blocks of data.
ELECTRONIC CODE BOOK MODE
ELECTRONIC CODE BOOK MODE
• User for the Small amount of text not for large
amount of data.
• Reason
• Same block of plain text and key generate same
cypher text each time
• Easy to find Pattern with large amount of data
ELECTRONIC CODE BOOK MODE
ELECTRONIC CODE BOOK MODE
ECB mode operates like a code book. A 64-
bit data block is entered into the algorithm
with a key, and a block of ciphertext is
produced
For a given block of plaintext and a given
key, the same block of ciphertext is always
produced
ECB is the easiest and fastest mode to use,
but as we will see, it has its dangers
ELECTRONIC CODE BOOK
MODE…
•So, two bad things can happen here:
• An attacker could uncover the key and
thus have the key to decrypt all the
blocks of data, or
• An attacker could gather the ciphertext
and plaintext of each block and build
the code book that was used, without
needing the key.
CIPHER BLOCK CHAINING MODE
• Cipher Block Chaining (CBC) does not reveal a
pattern, because each block of text, the key,
and the value based on the previous blocks.
• This results in more random ciphertext
• This provides dependence between the blocks,
in a sense chaining them together
CIPHER BLOCK CHAINING MODE
CIPHER BLOCK CHAINING MODE
• This chaining effect means that a particular
ciphertext block is dependent upon all blocks
before it, not just the previous block.
• When we encrypt our very first block using
CBC, we do not have a previous block of
ciphertext
• If we do not add a piece of randomness when
encrypting this first block to save from
hackers.
• So, The solution is to use Initialization Vector
that generate randomness in first block.
CIPHER BLOCK CHAINING MODE
CIPHER FEEDBACK MODE (CFB)
• The CBC mode is great to use when you need
to send large chunks of data at a time but
when the need of send small amount of data at
a time we use CFB.
• Cipher Feedback is the combination of block
cipher and stream cipher.
CIPHER FEEDBACK MODE (CFB)
• Keep One copy of Cipher text.
DIFFERENCE BETWEEN CFB &
CBC
• Major Difference between both of them is CBC
works with 64 bits of data only but CFB also
work with 8 bits or so on.
DIFFERENCE BETWEEN CFB &
CBC
OUTPUT FEEDBACK MODE
• It Cover the weakness of Cipher feedback
mode.
• Almost Same process of encryption and
decryption.
OUTPUT FEEDBACK MODE
• It’s similar to the Cipher Block Chaining Mode
but there is one minor changing in it.
DIFFERENCE IN OFB & CFB
COUNTER MODE (CTR)
• There is no chaining involved in Counter Mode
(CTR) like other three types.
I. Cipher block Chaining.
II. Cipher Feedback.
III. Output Feeback.
COUNTER MODE (CTR)
• Each block is individually decrypted without
depending on other blocks.
• the encryption of the individual blocks can
happen in parallel, which increases the
performance.
COUNTER MODE (CTR)
• No use of initialization Vector instead it use
counter.
THANK YOU

More Related Content

What's hot

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
Gopal Sakarkar
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
Cysinfo Cyber Security Community
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
Vasuki Ramasamy
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
SAurabh PRajapati
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
SHUBHA CHATURVEDI
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
Sathish Kumar
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
Devakumar Kp
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securitypatisa
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
Rashmi Burugupalli
 
Cryptography
CryptographyCryptography
Cryptography
jayashri kolekar
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
kusum sharma
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
Computer_ at_home
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
Dr.Florence Dayana
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
babak danyal
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
RAMESHBABU311293
 
Cryptography
CryptographyCryptography
Cryptography
Shivanand Arur
 
Web Security
Web SecurityWeb Security
Web Security
Dr.Florence Dayana
 

What's hot (20)

Public Key Cryptography
Public Key CryptographyPublic Key Cryptography
Public Key Cryptography
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Block Cipher and its Design Principles
Block Cipher and its Design PrinciplesBlock Cipher and its Design Principles
Block Cipher and its Design Principles
 
Unit 2
Unit 2Unit 2
Unit 2
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
Cryptography ppt
Cryptography pptCryptography ppt
Cryptography ppt
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
RC4&RC5
RC4&RC5RC4&RC5
RC4&RC5
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Diffie-hellman algorithm
Diffie-hellman algorithmDiffie-hellman algorithm
Diffie-hellman algorithm
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
CRYPTOGRAPHY & NETWORK SECURITY -  unit 1CRYPTOGRAPHY & NETWORK SECURITY -  unit 1
CRYPTOGRAPHY & NETWORK SECURITY - unit 1
 
Cryptography
CryptographyCryptography
Cryptography
 
Web Security
Web SecurityWeb Security
Web Security
 

Viewers also liked

Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard) Sina Manavi
 
Tema 5 criptografia y redes
Tema 5 criptografia y redesTema 5 criptografia y redes
Tema 5 criptografia y redesMariano Galvez
 
Criptografia
CriptografiaCriptografia
Criptografia
Cesar Cuamatzi
 
Criptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreCriptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreplinio.puello
 
Conceptos de Criptografía para Blockchains
Conceptos de Criptografía para BlockchainsConceptos de Criptografía para Blockchains
Conceptos de Criptografía para Blockchains
Jorge Zaccaro
 
Criptografia
Criptografia Criptografia
Criptografia
Alex Miguel
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
Animesh Shaw
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
university of education,Lahore
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
university of education,Lahore
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network securityJoe McCarthy
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
srivijaymanickam
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
babak danyal
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
babak danyal
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
PriSim
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
Alfred Ouyang
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
Rohan Bharadwaj
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
SecurityTube.Net
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
Netwax Lab
 
Cryptography
CryptographyCryptography
Cryptography
IGZ Software house
 

Viewers also liked (20)

Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
Tema 5 criptografia y redes
Tema 5 criptografia y redesTema 5 criptografia y redes
Tema 5 criptografia y redes
 
Criptografia
CriptografiaCriptografia
Criptografia
 
Criptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreCriptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libre
 
Conceptos de Criptografía para Blockchains
Conceptos de Criptografía para BlockchainsConceptos de Criptografía para Blockchains
Conceptos de Criptografía para Blockchains
 
Criptografia
Criptografia Criptografia
Criptografia
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
OSI Security Architecture
OSI Security ArchitectureOSI Security Architecture
OSI Security Architecture
 
Classical Encryption Techniques
Classical Encryption TechniquesClassical Encryption Techniques
Classical Encryption Techniques
 
02 introduction to network security
02 introduction to network security02 introduction to network security
02 introduction to network security
 
Types of attacks and threads
Types of attacks and threadsTypes of attacks and threads
Types of attacks and threads
 
Network Security 1st Lecture
Network Security 1st LectureNetwork Security 1st Lecture
Network Security 1st Lecture
 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
 
Computer security threats & prevention
Computer security threats & preventionComputer security threats & prevention
Computer security threats & prevention
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Different types of attacks in internet
Different types of attacks in internetDifferent types of attacks in internet
Different types of attacks in internet
 
Network Attacks
Network AttacksNetwork Attacks
Network Attacks
 
Network Security & Attacks
Network Security & AttacksNetwork Security & Attacks
Network Security & Attacks
 
Cryptography
CryptographyCryptography
Cryptography
 

Similar to Data Encryption Standard (DES)

Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
FRSecure
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
Mazin Alwaaly
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
Showkot Usman
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
Samant Khajuria
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
ch06.ppt
ch06.pptch06.ppt
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
Block cipher modes of operations
Block cipher modes of operationsBlock cipher modes of operations
Block cipher modes of operations
AkashRanjandas1
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
trilokchandra prakash
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
DR RICHMOND ADEBIAYE
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
Amna Magzoub
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
huachuhulk
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
Sam Bowne
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)ceng
 

Similar to Data Encryption Standard (DES) (20)

Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
2018 FRSecure CISSP Mentor Program- Session 5
2018 FRSecure CISSP Mentor Program-  Session 52018 FRSecure CISSP Mentor Program-  Session 5
2018 FRSecure CISSP Mentor Program- Session 5
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Modes of Operation
Modes of Operation Modes of Operation
Modes of Operation
 
CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)CNIT 125 Ch 4. Security Engineering (Part 2)
CNIT 125 Ch 4. Security Engineering (Part 2)
 
Slidecast - Workshop
Slidecast - WorkshopSlidecast - Workshop
Slidecast - Workshop
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHMTHE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
ch06.ppt
ch06.pptch06.ppt
ch06.ppt
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
Block Cipher and Operation Modes
Block Cipher  and Operation Modes Block Cipher  and Operation Modes
Block Cipher and Operation Modes
 
Block cipher modes of operations
Block cipher modes of operationsBlock cipher modes of operations
Block cipher modes of operations
 
Encryption algorithms
Encryption algorithmsEncryption algorithms
Encryption algorithms
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Fundamentals of Information Encryption
Fundamentals of Information EncryptionFundamentals of Information Encryption
Fundamentals of Information Encryption
 
Encryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptxEncryption techniqudgfhgvj,hbkes (2).pptx
Encryption techniqudgfhgvj,hbkes (2).pptx
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)Cryptography for Penetration Testers (PDF version)
Cryptography for Penetration Testers (PDF version)
 

Recently uploaded

Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
AMB-Review
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
Jelle | Nordend
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
Globus
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
NaapbooksPrivateLimi
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
Tendenci - The Open Source AMS (Association Management Software)
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
XfilesPro
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
Ortus Solutions, Corp
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
wottaspaceseo
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
IES VE
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Anthony Dahanne
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
Globus
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus
 

Recently uploaded (20)

Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdfDominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
Dominate Social Media with TubeTrivia AI’s Addictive Quiz Videos.pdf
 
De mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FMEDe mooiste recreatieve routes ontdekken met RouteYou en FME
De mooiste recreatieve routes ontdekken met RouteYou en FME
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
How to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good PracticesHow to Position Your Globus Data Portal for Success Ten Good Practices
How to Position Your Globus Data Portal for Success Ten Good Practices
 
Visitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.appVisitor Management System in India- Vizman.app
Visitor Management System in India- Vizman.app
 
Corporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMSCorporate Management | Session 3 of 3 | Tendenci AMS
Corporate Management | Session 3 of 3 | Tendenci AMS
 
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, BetterWebinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
Webinar: Salesforce Document Management 2.0 - Smarter, Faster, Better
 
Into the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdfInto the Box 2024 - Keynote Day 2 Slides.pdf
Into the Box 2024 - Keynote Day 2 Slides.pdf
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
How Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptxHow Recreation Management Software Can Streamline Your Operations.pptx
How Recreation Management Software Can Streamline Your Operations.pptx
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
Using IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New ZealandUsing IESVE for Room Loads Analysis - Australia & New Zealand
Using IESVE for Room Loads Analysis - Australia & New Zealand
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
Paketo Buildpacks : la meilleure façon de construire des images OCI? DevopsDa...
 
Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024Globus Compute Introduction - GlobusWorld 2024
Globus Compute Introduction - GlobusWorld 2024
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024Globus Compute wth IRI Workflows - GlobusWorld 2024
Globus Compute wth IRI Workflows - GlobusWorld 2024
 

Data Encryption Standard (DES)

  • 1. DATA ENCRYPTION STANDARD (DES) MUHAMMAD HARIS AHMED M.HARIS@STU.SMIU.EDU.PK 12CS45
  • 2. SYMMETRIC SYSTEMS • Several types of symmetric algorithms are used today. They have different methods of providing encryption and decryption functionality • The one thing they all have in common is that they are symmetric algorithms, meaning the sender and receiver are using two instances of the same key
  • 3. SYMMETRIC ALGORITHMS • Data Encryption Standard (DES) • 3DES (Triple DES) • Blowfish • Twofish • IDEA (International Data Encryption Algorithm) • RC4, RC5, RC6 • AES (Advanced Encryption Standard) • SAFER (Secure and Fast Encryption Routine
  • 4. DES FIRST BREAK! • In 1998, the Electronic Frontier Foundation built a computer system for $250,000 that broke DES in three days by using a brute force attack against the keyspace
  • 5. DES FIRST BREAK! • It contained 1,536 microprocessors running at 40MHz, which performed 60 million test decryptions per second per chip
  • 6. WHAT IS DES? DES Use Symmetric system means both sender and receiver side we used same key for encryption and decryption.
  • 7. WHAT IS DES? DES used 64 bits of block for encryption and decryption.  Sixteen rounds of transposition and substitution are performed in order to achieve DES.
  • 9. HOW DOES DES WORK ? • DES is a symmetric block encryption algorithm. When 64-bit blocks of plaintext go in, 64-bit blocks of cipher text come out. • It is also a symmetric algorithm, meaning the same key is used for encryption and decryption. • It uses a 64-bit key: 56 bits make up the true key, and 8 bits are used for parity.
  • 10. HOW DOES DES WORK ? …. • When the DES algorithm is applied to data, it divides the message into blocks and operates on them one at a time. • The blocks are put through 16 rounds of transposition and substitution functions. • The result is 64-bit blocks of ciphertext.
  • 11. DES MODES • Block ciphers have several modes of operation. Each mode specifies how a block cipher will operate.
  • 12. DES MODES • Electronic Code Book (ECB) • Cipher Block Chaining (CBC) • Cipher Feedback (CFB) • Output Feedback (OFB) • Counter Mode (CTR)
  • 13. • It Inherit core functionality from their parent block which is Symmetric System. • Like 64 bits of block use for encryption and decryption. • Use Same key for encryption and decryption of all blocks of data. ELECTRONIC CODE BOOK MODE
  • 15. • User for the Small amount of text not for large amount of data. • Reason • Same block of plain text and key generate same cypher text each time • Easy to find Pattern with large amount of data ELECTRONIC CODE BOOK MODE
  • 16. ELECTRONIC CODE BOOK MODE ECB mode operates like a code book. A 64- bit data block is entered into the algorithm with a key, and a block of ciphertext is produced For a given block of plaintext and a given key, the same block of ciphertext is always produced ECB is the easiest and fastest mode to use, but as we will see, it has its dangers
  • 17. ELECTRONIC CODE BOOK MODE… •So, two bad things can happen here: • An attacker could uncover the key and thus have the key to decrypt all the blocks of data, or • An attacker could gather the ciphertext and plaintext of each block and build the code book that was used, without needing the key.
  • 18. CIPHER BLOCK CHAINING MODE • Cipher Block Chaining (CBC) does not reveal a pattern, because each block of text, the key, and the value based on the previous blocks. • This results in more random ciphertext • This provides dependence between the blocks, in a sense chaining them together
  • 20. CIPHER BLOCK CHAINING MODE • This chaining effect means that a particular ciphertext block is dependent upon all blocks before it, not just the previous block. • When we encrypt our very first block using CBC, we do not have a previous block of ciphertext • If we do not add a piece of randomness when encrypting this first block to save from hackers.
  • 21. • So, The solution is to use Initialization Vector that generate randomness in first block. CIPHER BLOCK CHAINING MODE
  • 22. CIPHER FEEDBACK MODE (CFB) • The CBC mode is great to use when you need to send large chunks of data at a time but when the need of send small amount of data at a time we use CFB. • Cipher Feedback is the combination of block cipher and stream cipher.
  • 23. CIPHER FEEDBACK MODE (CFB) • Keep One copy of Cipher text.
  • 24. DIFFERENCE BETWEEN CFB & CBC • Major Difference between both of them is CBC works with 64 bits of data only but CFB also work with 8 bits or so on.
  • 26. OUTPUT FEEDBACK MODE • It Cover the weakness of Cipher feedback mode. • Almost Same process of encryption and decryption.
  • 27. OUTPUT FEEDBACK MODE • It’s similar to the Cipher Block Chaining Mode but there is one minor changing in it.
  • 29. COUNTER MODE (CTR) • There is no chaining involved in Counter Mode (CTR) like other three types. I. Cipher block Chaining. II. Cipher Feedback. III. Output Feeback.
  • 30. COUNTER MODE (CTR) • Each block is individually decrypted without depending on other blocks. • the encryption of the individual blocks can happen in parallel, which increases the performance.
  • 31. COUNTER MODE (CTR) • No use of initialization Vector instead it use counter.