SlideShare a Scribd company logo
1 of 16
Data Encryption
Standards
•DATA ENCRYPTION STANDARD (DES) HAS BEEN FOUND
VULNERABLE TO VERY POWERFUL ATTACKS AND THEREFORE, THE
POPULARITY OF DES HAS BEEN FOUND SLIGHTLY ON THE DECLINE.
•DES IS A BLOCK CIPHER AND ENCRYPTS DATA IN BLOCKS OF SIZE
OF 64 BITS EACH, WHICH MEANS 64 BITS OF PLAIN TEXT GO AS
THE INPUT TO DES, WHICH PRODUCES 64 BITS OF CIPHER TEXT.
•THE SAME ALGORITHM AND KEY ARE USED FOR ENCRYPTION AND
DECRYPTION, WITH MINOR DIFFERENCES.
•THE KEY LENGTH IS 56 BITS
The basic idea is shown in the figure.
 We have mentioned that DES uses a 56-bit key. Actually,
the initial key consists of 64 bits. However, before the
DES process even starts, every 8th bit of the key is
discarded to produce a 56-bit key. That is bit positions 8,
16, 24, 32, 40, 48, 56, and 64 are discarded.
 Thus, the discarding of every 8th bit of the key produces
a 56-bit key from the original 64-bit key
 DES is based on the two fundamental attributes of cryptography:
substitution (also called confusion) and transposition (also called
diffusion).
 DES consists of 16 steps, each of which is called a round. Each round
performs the steps of substitution and transposition.
steps in DES:
Steps in DES:
 In the first step, the 64-bit plain text block is handed over to an
initial Permutation (IP) function.
 The initial permutation is performed on plain text.
 Next, the initial permutation (IP) produces two halves of the
permuted block; saying Left Plain Text (LPT) and Right Plain Text
(RPT).
 Now each LPT and RPT go through 16 rounds of the encryption
process.
 In the end, LPT and RPT are rejoined and a Final Permutation (FP) is
performed on the combined block
 The result of this process produces 64-bit cipher text.
 Initial Permutation (IP): As we have noted, the
initial permutation (IP) happens only once and it
happens before the first round.
 It suggests how the transposition in IP should
proceed.
 If the IP replaces the first bit of the original plain
text block with the 58th bit of the original plain
text, the second bit with the 50th bit of the
original plain text block, and so on.
 This is nothing but jugglery of bit positions of
the original plain text block. the same rule
applies to all the other bit positions
Round Function
 The heart of this cipher is the DES function, f. The DES
function applies a 48-bit key to the rightmost 32 bits to
produce a 32-bit output.
Expansion Permutation Box − since right input is 32-bit and
round key is a 48-bit, we first need to expand right input
to 48 bits. Permutation logic is graphically depicted in
the following illustration .
 The graphically depicted permutation logic is generally described as
table in DES specification illustrated as shown −
 XOR (Whitener). − After the expansion permutation, DES does XOR
operation on the expanded right section and the round key. The round key is
used only in this operation.
 Substitution Boxes. − The S-boxes carry out the real mixing (confusion).
DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output. Refer the
following illustration −
The S-box rule is illustrated below −
There are a total of eight S-box tables. The output of all eight s-boxes is
then combined in to 32 bit section.
Straight Permutation − The 32 bit output of S-boxes is then subjected to the
straight permutation with rule shown in the following illustration:
Key Generation
 The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher
key. The process of key generation is depicted in the following illustration −
Parity Drop the preprocess before key expansion is a compression transposition step
that we call parity bit drop. It drops the parity bits (bits 8, 16, 24, 32, …, 64) from the
64-bit key and permutes the rest of the bits according to Table 6.12. The remaining 56-
bit value is the actual cipher key which is used to generate round keys. The parity drop
step (a compression D-box) is shown in Table

More Related Content

Similar to Data Encryption Standards (1).pptx

symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithmsRashmi Burugupalli
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptxseethal9
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Shiraz316
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptographyRAMPRAKASHT1
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithmsAnamika Singh
 
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)Topic4 data encryption standard(des)
Topic4 data encryption standard(des)MdFazleRabbi18
 
Data encryption techniques and standard
Data encryption techniques and standardData encryption techniques and standard
Data encryption techniques and standardSarika Jadhav
 
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer ScienceNetwork security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer ScienceRathnaDeepa1
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-IIrathnadeepa2
 

Similar to Data Encryption Standards (1).pptx (20)

doc4.pdf
doc4.pdfdoc4.pdf
doc4.pdf
 
sheet4.pdf
sheet4.pdfsheet4.pdf
sheet4.pdf
 
doc4.pdf
doc4.pdfdoc4.pdf
doc4.pdf
 
lecture3.pdf
lecture3.pdflecture3.pdf
lecture3.pdf
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
Module 2.pptx
Module 2.pptxModule 2.pptx
Module 2.pptx
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
Block ciphers & public key cryptography
Block ciphers & public key cryptographyBlock ciphers & public key cryptography
Block ciphers & public key cryptography
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Cryptographic algorithms
Cryptographic algorithmsCryptographic algorithms
Cryptographic algorithms
 
Topic4 data encryption standard(des)
Topic4 data encryption standard(des)Topic4 data encryption standard(des)
Topic4 data encryption standard(des)
 
Data encryption techniques and standard
Data encryption techniques and standardData encryption techniques and standard
Data encryption techniques and standard
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer ScienceNetwork security R.Rathna Deepa 2nd M.sc.,Computer Science
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Des
DesDes
Des
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-II
 

More from Santhosh Prabhu

data_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfdata_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfSanthosh Prabhu
 
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfWiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfSanthosh Prabhu
 
Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Santhosh Prabhu
 
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfPredictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfSanthosh Prabhu
 
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfDMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfSanthosh Prabhu
 
Concept of training.pptx
Concept of training.pptxConcept of training.pptx
Concept of training.pptxSanthosh Prabhu
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptxSanthosh Prabhu
 
methodsofdatacollectione.pptx
methodsofdatacollectione.pptxmethodsofdatacollectione.pptx
methodsofdatacollectione.pptxSanthosh Prabhu
 

More from Santhosh Prabhu (11)

data_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdfdata_analysis_step_by_step_booklet.pdf
data_analysis_step_by_step_booklet.pdf
 
DataAnalysis.pdf
DataAnalysis.pdfDataAnalysis.pdf
DataAnalysis.pdf
 
Wiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdfWiley_Excel_Pivot_Tables_and_Charts.pdf
Wiley_Excel_Pivot_Tables_and_Charts.pdf
 
Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...Predictive marketing _ easy ways every marketer can use customer analytics an...
Predictive marketing _ easy ways every marketer can use customer analytics an...
 
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdfPredictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
Predictive HR Analytics_ Mastering the HR Metric ( PDFDrive ).pdf
 
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdfDMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
DMBAR - Data Mining and Business Analytics with R - Johannes Ledolter.pdf
 
hrtdtna.pptx
hrtdtna.pptxhrtdtna.pptx
hrtdtna.pptx
 
Concept of training.pptx
Concept of training.pptxConcept of training.pptx
Concept of training.pptx
 
Social Engineering new.pptx
Social Engineering new.pptxSocial Engineering new.pptx
Social Engineering new.pptx
 
methodsofdatacollectione.pptx
methodsofdatacollectione.pptxmethodsofdatacollectione.pptx
methodsofdatacollectione.pptx
 
Decision Making.pptx
Decision Making.pptxDecision Making.pptx
Decision Making.pptx
 

Recently uploaded

Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改atducpo
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一ffjhghh
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxStephen266013
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingNeil Barnes
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...Suhani Kapoor
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfLars Albertsson
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiSuhani Kapoor
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxMohammedJunaid861692
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystSamantha Rae Coolbeth
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxolyaivanovalion
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionfulawalesam
 

Recently uploaded (20)

Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
(PARI) Call Girls Wanowrie ( 7001035870 ) HI-Fi Pune Escorts Service
 
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
代办国外大学文凭《原版美国UCLA文凭证书》加州大学洛杉矶分校毕业证制作成绩单修改
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一定制英国白金汉大学毕业证(UCB毕业证书)																			成绩单原版一比一
定制英国白金汉大学毕业证(UCB毕业证书) 成绩单原版一比一
 
B2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docxB2 Creative Industry Response Evaluation.docx
B2 Creative Industry Response Evaluation.docx
 
Brighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data StorytellingBrighton SEO | April 2024 | Data Storytelling
Brighton SEO | April 2024 | Data Storytelling
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
VIP High Profile Call Girls Amravati Aarushi 8250192130 Independent Escort Se...
 
Schema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdfSchema on read is obsolete. Welcome metaprogramming..pdf
Schema on read is obsolete. Welcome metaprogramming..pdf
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in  KishangarhDelhi 99530 vip 56974 Genuine Escort Service Call Girls in  Kishangarh
Delhi 99530 vip 56974 Genuine Escort Service Call Girls in Kishangarh
 
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service BhilaiLow Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
Low Rate Call Girls Bhilai Anika 8250192130 Independent Escort Service Bhilai
 
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptxBPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
BPAC WITH UFSBI GENERAL PRESENTATION 18_05_2017-1.pptx
 
Unveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data AnalystUnveiling Insights: The Role of a Data Analyst
Unveiling Insights: The Role of a Data Analyst
 
BabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptxBabyOno dropshipping via API with DroFx.pptx
BabyOno dropshipping via API with DroFx.pptx
 
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Punjabi Bagh 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Week-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interactionWeek-01-2.ppt BBB human Computer interaction
Week-01-2.ppt BBB human Computer interaction
 

Data Encryption Standards (1).pptx

  • 1. Data Encryption Standards •DATA ENCRYPTION STANDARD (DES) HAS BEEN FOUND VULNERABLE TO VERY POWERFUL ATTACKS AND THEREFORE, THE POPULARITY OF DES HAS BEEN FOUND SLIGHTLY ON THE DECLINE. •DES IS A BLOCK CIPHER AND ENCRYPTS DATA IN BLOCKS OF SIZE OF 64 BITS EACH, WHICH MEANS 64 BITS OF PLAIN TEXT GO AS THE INPUT TO DES, WHICH PRODUCES 64 BITS OF CIPHER TEXT. •THE SAME ALGORITHM AND KEY ARE USED FOR ENCRYPTION AND DECRYPTION, WITH MINOR DIFFERENCES. •THE KEY LENGTH IS 56 BITS
  • 2. The basic idea is shown in the figure.
  • 3.  We have mentioned that DES uses a 56-bit key. Actually, the initial key consists of 64 bits. However, before the DES process even starts, every 8th bit of the key is discarded to produce a 56-bit key. That is bit positions 8, 16, 24, 32, 40, 48, 56, and 64 are discarded.  Thus, the discarding of every 8th bit of the key produces a 56-bit key from the original 64-bit key
  • 4.  DES is based on the two fundamental attributes of cryptography: substitution (also called confusion) and transposition (also called diffusion).  DES consists of 16 steps, each of which is called a round. Each round performs the steps of substitution and transposition. steps in DES:
  • 5. Steps in DES:  In the first step, the 64-bit plain text block is handed over to an initial Permutation (IP) function.  The initial permutation is performed on plain text.  Next, the initial permutation (IP) produces two halves of the permuted block; saying Left Plain Text (LPT) and Right Plain Text (RPT).  Now each LPT and RPT go through 16 rounds of the encryption process.  In the end, LPT and RPT are rejoined and a Final Permutation (FP) is performed on the combined block  The result of this process produces 64-bit cipher text.
  • 6.  Initial Permutation (IP): As we have noted, the initial permutation (IP) happens only once and it happens before the first round.  It suggests how the transposition in IP should proceed.  If the IP replaces the first bit of the original plain text block with the 58th bit of the original plain text, the second bit with the 50th bit of the original plain text block, and so on.  This is nothing but jugglery of bit positions of the original plain text block. the same rule applies to all the other bit positions
  • 7.
  • 8. Round Function  The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-bit output.
  • 9. Expansion Permutation Box − since right input is 32-bit and round key is a 48-bit, we first need to expand right input to 48 bits. Permutation logic is graphically depicted in the following illustration .
  • 10.  The graphically depicted permutation logic is generally described as table in DES specification illustrated as shown −
  • 11.  XOR (Whitener). − After the expansion permutation, DES does XOR operation on the expanded right section and the round key. The round key is used only in this operation.  Substitution Boxes. − The S-boxes carry out the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output. Refer the following illustration −
  • 12. The S-box rule is illustrated below −
  • 13. There are a total of eight S-box tables. The output of all eight s-boxes is then combined in to 32 bit section. Straight Permutation − The 32 bit output of S-boxes is then subjected to the straight permutation with rule shown in the following illustration:
  • 14.
  • 15. Key Generation  The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key. The process of key generation is depicted in the following illustration −
  • 16. Parity Drop the preprocess before key expansion is a compression transposition step that we call parity bit drop. It drops the parity bits (bits 8, 16, 24, 32, …, 64) from the 64-bit key and permutes the rest of the bits according to Table 6.12. The remaining 56- bit value is the actual cipher key which is used to generate round keys. The parity drop step (a compression D-box) is shown in Table