0% found this document useful (0 votes)
13 views2 pages

DES 64 Bit Abstract

This document is a project report submitted by four students - Ravi Teja Kurra, Lakshman Kumar T, Sandhya Gandebathula, and Vivek Gurram - to fulfill the requirements for a Bachelor of Technology degree in Computer Science and Engineering from K L University. The report discusses the design and implementation of the Data Encryption Standard (DES) block cipher, which operates on 64-bit blocks using a 56-bit key. DES is based on a Feistel cipher structure involving bit shuffling, substitution boxes, and exclusive OR operations over multiple rounds. It is a symmetric cipher that uses the same key for encryption and decryption.

Uploaded by

Ravi Teja Kurra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views2 pages

DES 64 Bit Abstract

This document is a project report submitted by four students - Ravi Teja Kurra, Lakshman Kumar T, Sandhya Gandebathula, and Vivek Gurram - to fulfill the requirements for a Bachelor of Technology degree in Computer Science and Engineering from K L University. The report discusses the design and implementation of the Data Encryption Standard (DES) block cipher, which operates on 64-bit blocks using a 56-bit key. DES is based on a Feistel cipher structure involving bit shuffling, substitution boxes, and exclusive OR operations over multiple rounds. It is a symmetric cipher that uses the same key for encryption and decryption.

Uploaded by

Ravi Teja Kurra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 2

A

PROJECT BASED LAB REPORT


On

Design and Implementation of Block Cipher DES


Submitted in partial fulfilment of the
Requirements for the award of the Degree of

Bachelor of Technology
In
Computer Science & Engineering
By
Ravi Teja Kurra
(13003352)

Lakshman Kumar T
(13003212)

Sandhya Gandebathula
(13003051)

Vivek Gurram
(13003130)
Batch No: 09

DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING

K L University
Green Fields, Vaddeswaram, Guntur District-522 502

Design and Implementation of Block Cipher DES (64 bit Cipher)


K L UNIVERSITY

Department Of Computer Science & Engineering

DES is based on a cipher known as the Feistel block cipher. This was a block cipher
developed by the IBM cryptography researcher Horst Feistel in the early 70s. It consists of a
number of rounds where each round contains bit-shuffling, non-linear substitutions (S-boxes)
and exclusive OR operations. Most symmetric encryption schemes today are based on this
structure (known as a feistel network).
As with most encryption schemes, DES expects two inputs - the plaintext to be encrypted and
the secret key. The manner in which the plaintext is accepted, and the key arrangement used
for encryption and decryption, both determine the type of cipher it is. DES is therefore a
symmetric, 64 bit block cipher as it uses the same key for both encryption and decryption
and only operates on 64 bit blocks of data at a time (be they plaintext or cipher text). The key
size used is 56 bits, however a 64 bit (or eight-byte) key is actually input. The least
significant bit of each byte is either used for parity (odd for DES) or set arbitrarily and does
not increase the security in any way. All blocks are numbered from left to right which makes
the eight bit of each byte the parity bit. Once a plain-text message is received to be encrypted,
it is arranged into 64 bit blocks required for input. If the number of bits in the message is not
evenly divisible by 64, then the last block will be padded. Multiple permutations and
substitutions are incorporated throughout in order to increase the difficulty of performing a
cryptanalysis on the cipher. However, it is generally accepted that the initial and final
permutations offer little or no contribution to the security of DES and in fact some software
implementations omit them (although strictly speaking these are not DES as they do not
adhere to the standard).

K L UNIVERSITY

Ravi Teja Kurra

(13003352)

Lakshman Kumar T

(13003212)

Sandhya Gandebathula

(13003051)

Vivek Gurram

(13003130)

Department Of Computer Science & Engineering

You might also like