SlideShare a Scribd company logo
1 of 20
Simplified DES:
• A teaching tool
• Designed by Prof. Edward Schaeter,
Santa Clara University, 1996
Given:
plaintext 8-bit, Key 10-bit
Output:
ciphertext 8-bit
Simplified DES
 SDES ‘s five steps:
 IP - an initial permutation
 fk - a complex, 2-input function
 SW - switches the left half and the right
half of a data string
 fk - a complex, 2-input function; again
 IP-1 - inverse permutation of the initial
permutation
SDES may be said to have two ROUNDS of the
function fk.
3
Simplified DES scheme:
Ciphertext = IP-1 (fk2 (SW (fk1 ( IP (plaintext)))))
Plaintext = IP-1 (fk1 (SW (fk2 ( IP (ciphertext)))))
SW
IP
fk
fk
Shift
P8
Shift
P10
P8
IP
fk
SW
fk
IP-1
ENCRYPTION
8-bit
plaintext
10-bit Key
DECRYPTION
8-bit plaintext
8-bit ciphertext 8-bit ciphertext
IP-1
K1 K1
K2 K2
Initial Permutation (IP)
 Move the bits of the original character
around a little…
Inverse Permutation (IP-1)
1 2 3 4 5 6 7 8
4 1 3 5 7 2 8 6
1 2 3 4 5 6 7 8
2 6 3 1 4 8 5 7
4 1 3 5 7 2 8 6
IP-1(IP(X))=X
Expansion/Permutation (E/P)
 Expand 4 bits into 8 and permutate
them…
P10 Permutation
P8 Permutation
 Permutate 10 into 8
LS-1
 Left circular shift 1 each 5 bit group
LS-2
 Left circular shift 2 each 5 bit group
P4 Permutation
1 2 3 4
2 4 3 1
12
S0 and S1 boxes:
1 0 3 2
3 2 1 0
0 2 1 3
3 1 3 2
0
1
2
3
0 1 2 3
S0 =
0 1 2 3
2 0 1 3
3 0 1 0
2 1 0 3
0 1 2 3
0
1
2
3
2 4 3 1 P4
S1 =
13
Key generation for simplified DES:
K1 = P8 ( Shift (P10 (Key)))
K2 = P8 ( Shift ( Shift (P10 (Key))))
P10
LS-1 LS-1
P8
LS-2
P8
LS-2
K1
K2
5
5
5 5
8
5 5
5 5
1 10
10 bit key
3 5 2 7 4 10 1 9 8 6
6 3 7 4 8 5 10 9
Circular left shift by 1, separately on
the left and the right halves
Circular left shift by 2 , separately on
the left and the right halves
8
6 3 7 4 8 5 10 9
P10
P8
P8
14
SDES (continued)
K1 = P8 ( Shift (P10 (Key)))
Plaintext = IP-1 (fk1 (SW (fk2 ( IP (ciphertext))))).
• To obtain K1 and K2 :
• Given: K = (k1 k2 k3 k4 k5 k6 k7 k8 k9 k10)
• Step1: Permutation P10
P10 :
• Step2: Left shift (circular) by one bit
• for the left half and
• for the right half separately.
3 5 2 7 4 10 1 9 8 6
15
To obtain K1 and K2
• Step3: Permutation for producing an 8 bit key K1
from a 10 bit input.
P8:
• Step4: Take the result of step2. On it use Left Shift
(circular) by 2 bits
• for the left half and
• for the right half separately.
• Step5: Another instance of P8 is used to produce
the second 8 bit key K2 .
K1 = P8 ( Shift (P10 (Key)))
K2 = P8 ( Shift ( Shift (P10 (Key)))).
6 3 7 4 8 5 10 9
Simplified DES Encryption
The function fk
Permutation IP is applied to the 8-bit plaintext to
generate L1 and R1, the left and the right halves.
INPUT to fk:
• 4-bit left half (L1) and
• 4-bit Right half (R1) of a data string.
• Step1: E/P: Expansion/Permutation on R1 to
produce an 8 bit data string called EPR.
• Step2: XOR of EPR with key K1 for fk1 to produce
the left half (L2) and right half (R2).
• Step3 (a): L2 S0 box L22
4 2
18
The function fk (continued):
• Step3(b): R2
Given the 4 bits of L2 (or R2) part. Pick up the ijth
element of S0 (or of S1), where
i = 1st and 4th bits; j = 2nd and 3rd bits.
Then convert this element to a 2-bit binary number.
 AUTOKEYING (also called autoclaving): In
step 3, the selection of the element in the S-
box depends on both data & key. This feature
is called autokeying.
S1 box R22
4 2
19
The function fk (continued)
Step4: (L22 : R22) goes through a permutation P4
to produce a 4-bit R3.
P4
• Step5: L3 = L1  R3
• Step6: L3 & R1 is then the input to SW .
• The second instance of fk is similar to the first,
except that the key K2 is used.
2 4 3 1
Switch function (SW)
 Interchange the left and right 4 bits
 So, second instances of fk operates on
different 4 bits with different key K2

More Related Content

What's hot

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSADr.Florence Dayana
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptographyzahid-mian
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniquesDr.Florence Dayana
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherNiloy Biswas
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyMd. Al-Amin Khandaker Nipu
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)SAurabh PRajapati
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)farazvirk554
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Mazin Alwaaly
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherMona Rajput
 

What's hot (20)

CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
Rc4
Rc4Rc4
Rc4
 
Ip security
Ip security Ip security
Ip security
 
Classical encryption techniques
Classical encryption techniquesClassical encryption techniques
Classical encryption techniques
 
Unit 2
Unit 2Unit 2
Unit 2
 
Cryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipherCryptography - Block cipher & stream cipher
Cryptography - Block cipher & stream cipher
 
Sha
ShaSha
Sha
 
Elliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve CryptographyElliptic Curves and Elliptic Curve Cryptography
Elliptic Curves and Elliptic Curve Cryptography
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Aes
AesAes
Aes
 
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere CipherCaesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
Caesar Cipher , Substitution Cipher, PlayFair and Vigenere Cipher
 
Feistel cipher
Feistel cipherFeistel cipher
Feistel cipher
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 

Similar to S-DES.ppt

334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdesBenny SmKr
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Othersnathanurag
 
DES Simplified
DES SimplifiedDES Simplified
DES SimplifiedShiraz316
 
06 Simplified Data Encryption Standard.pptx
06 Simplified Data Encryption Standard.pptx06 Simplified Data Encryption Standard.pptx
06 Simplified Data Encryption Standard.pptxpiyushlohia1857
 
class5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information securityclass5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information security23017156038
 
Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]
Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]
Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]RootedCON
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)SoumyaBhattacharyya14
 
TCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxTCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxssuserf9c51d
 
Is unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesIs unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesSarthak Patel
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkJaewook. Kang
 
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisDigital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisChandrashekhar Padole
 

Similar to S-DES.ppt (20)

334 recitation3-sdes
334 recitation3-sdes334 recitation3-sdes
334 recitation3-sdes
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Others
 
section-7.ppt
section-7.pptsection-7.ppt
section-7.ppt
 
DES Simplified
DES SimplifiedDES Simplified
DES Simplified
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
06 Simplified Data Encryption Standard.pptx
06 Simplified Data Encryption Standard.pptx06 Simplified Data Encryption Standard.pptx
06 Simplified Data Encryption Standard.pptx
 
class5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information securityclass5jf.pptx Block cipher in information security
class5jf.pptx Block cipher in information security
 
Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]
Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]
Ilfak Guilfanov - Decompiler internals: Microcode [rooted2018]
 
Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)Cryptography Symmetric Key Algorithm (CSE)
Cryptography Symmetric Key Algorithm (CSE)
 
Slide11 icc2015
Slide11 icc2015Slide11 icc2015
Slide11 icc2015
 
TCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docxTCN  5080  -­‐‑  Project  1  Description  C.docx
TCN  5080  -­‐‑  Project  1  Description  C.docx
 
Is unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniquesIs unit 2_conventional encryption techniques
Is unit 2_conventional encryption techniques
 
A Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB SimulinkA Simple Communication System Design Lab #3 with MATLAB Simulink
A Simple Communication System Design Lab #3 with MATLAB Simulink
 
03 UNIT-2.pdf
03 UNIT-2.pdf03 UNIT-2.pdf
03 UNIT-2.pdf
 
Merge sort-algorithm for computer science engineering students
Merge sort-algorithm for computer science engineering studentsMerge sort-algorithm for computer science engineering students
Merge sort-algorithm for computer science engineering students
 
Merge sort algorithm power point presentation
Merge sort algorithm power point presentationMerge sort algorithm power point presentation
Merge sort algorithm power point presentation
 
Bm33388392
Bm33388392Bm33388392
Bm33388392
 
Bm33388392
Bm33388392Bm33388392
Bm33388392
 
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysisDigital Signal Processing Tutorial:Chapt 3 frequency analysis
Digital Signal Processing Tutorial:Chapt 3 frequency analysis
 
3-Block Ciphers and DES.pdf
3-Block Ciphers and DES.pdf3-Block Ciphers and DES.pdf
3-Block Ciphers and DES.pdf
 

Recently uploaded

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 

Recently uploaded (20)

Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 

S-DES.ppt

  • 1. Simplified DES: • A teaching tool • Designed by Prof. Edward Schaeter, Santa Clara University, 1996 Given: plaintext 8-bit, Key 10-bit Output: ciphertext 8-bit
  • 2. Simplified DES  SDES ‘s five steps:  IP - an initial permutation  fk - a complex, 2-input function  SW - switches the left half and the right half of a data string  fk - a complex, 2-input function; again  IP-1 - inverse permutation of the initial permutation SDES may be said to have two ROUNDS of the function fk.
  • 3. 3 Simplified DES scheme: Ciphertext = IP-1 (fk2 (SW (fk1 ( IP (plaintext))))) Plaintext = IP-1 (fk1 (SW (fk2 ( IP (ciphertext))))) SW IP fk fk Shift P8 Shift P10 P8 IP fk SW fk IP-1 ENCRYPTION 8-bit plaintext 10-bit Key DECRYPTION 8-bit plaintext 8-bit ciphertext 8-bit ciphertext IP-1 K1 K1 K2 K2
  • 4. Initial Permutation (IP)  Move the bits of the original character around a little…
  • 5. Inverse Permutation (IP-1) 1 2 3 4 5 6 7 8 4 1 3 5 7 2 8 6 1 2 3 4 5 6 7 8 2 6 3 1 4 8 5 7 4 1 3 5 7 2 8 6 IP-1(IP(X))=X
  • 6. Expansion/Permutation (E/P)  Expand 4 bits into 8 and permutate them…
  • 9. LS-1  Left circular shift 1 each 5 bit group
  • 10. LS-2  Left circular shift 2 each 5 bit group
  • 11. P4 Permutation 1 2 3 4 2 4 3 1
  • 12. 12 S0 and S1 boxes: 1 0 3 2 3 2 1 0 0 2 1 3 3 1 3 2 0 1 2 3 0 1 2 3 S0 = 0 1 2 3 2 0 1 3 3 0 1 0 2 1 0 3 0 1 2 3 0 1 2 3 2 4 3 1 P4 S1 =
  • 13. 13 Key generation for simplified DES: K1 = P8 ( Shift (P10 (Key))) K2 = P8 ( Shift ( Shift (P10 (Key)))) P10 LS-1 LS-1 P8 LS-2 P8 LS-2 K1 K2 5 5 5 5 8 5 5 5 5 1 10 10 bit key 3 5 2 7 4 10 1 9 8 6 6 3 7 4 8 5 10 9 Circular left shift by 1, separately on the left and the right halves Circular left shift by 2 , separately on the left and the right halves 8 6 3 7 4 8 5 10 9 P10 P8 P8
  • 14. 14 SDES (continued) K1 = P8 ( Shift (P10 (Key))) Plaintext = IP-1 (fk1 (SW (fk2 ( IP (ciphertext))))). • To obtain K1 and K2 : • Given: K = (k1 k2 k3 k4 k5 k6 k7 k8 k9 k10) • Step1: Permutation P10 P10 : • Step2: Left shift (circular) by one bit • for the left half and • for the right half separately. 3 5 2 7 4 10 1 9 8 6
  • 15. 15 To obtain K1 and K2 • Step3: Permutation for producing an 8 bit key K1 from a 10 bit input. P8: • Step4: Take the result of step2. On it use Left Shift (circular) by 2 bits • for the left half and • for the right half separately. • Step5: Another instance of P8 is used to produce the second 8 bit key K2 . K1 = P8 ( Shift (P10 (Key))) K2 = P8 ( Shift ( Shift (P10 (Key)))). 6 3 7 4 8 5 10 9
  • 17. The function fk Permutation IP is applied to the 8-bit plaintext to generate L1 and R1, the left and the right halves. INPUT to fk: • 4-bit left half (L1) and • 4-bit Right half (R1) of a data string. • Step1: E/P: Expansion/Permutation on R1 to produce an 8 bit data string called EPR. • Step2: XOR of EPR with key K1 for fk1 to produce the left half (L2) and right half (R2). • Step3 (a): L2 S0 box L22 4 2
  • 18. 18 The function fk (continued): • Step3(b): R2 Given the 4 bits of L2 (or R2) part. Pick up the ijth element of S0 (or of S1), where i = 1st and 4th bits; j = 2nd and 3rd bits. Then convert this element to a 2-bit binary number.  AUTOKEYING (also called autoclaving): In step 3, the selection of the element in the S- box depends on both data & key. This feature is called autokeying. S1 box R22 4 2
  • 19. 19 The function fk (continued) Step4: (L22 : R22) goes through a permutation P4 to produce a 4-bit R3. P4 • Step5: L3 = L1  R3 • Step6: L3 & R1 is then the input to SW . • The second instance of fk is similar to the first, except that the key K2 is used. 2 4 3 1
  • 20. Switch function (SW)  Interchange the left and right 4 bits  So, second instances of fk operates on different 4 bits with different key K2