Computer Networks
Computer Networks
Hema A Murthy
Network Security
Security
L I ( 32-bit) R I (32-bit)
Li-1 Ri-1
F Ki
Li-1 = Ri-1
+
LI RI = Li-1 + F(Ri-1,Ki)
RI
DES (Decryption)
• Algorithm works exactly the same as that of
encryption
• Apply keys in reverse
– K16, K15, K14, …, K1
• Encryption of large messages
– Cipher block chaining
B1 B2
Initialising
vector + +
DES DES
Cipher 1 Cipher 2
Message Digest
Initial Digiest Message Padded
(128 bit)
512 512 512
Transform
Transform
Transform
Message Digest
Indian Institute of Technology Madras
Computer Networks Prof. Hema A Murthy
Message Digest
• Modern day: Operates on 32-bit quantities
• Current digest (d0, d1, d2, d3)
• Works on the hope that it is difficult to
create the transformations and the initial
digest.