0% found this document useful (0 votes)
206 views6 pages

Assignment 3

The Data Encryption Standard (DES) was developed in 1974 by IBM and the U.S. government to set a standard for encrypting data using symmetric-key cryptography. DES operates on 64-bit blocks using a 56-bit secret key. The encryption process involves an initial and final permutation of the plaintext blocks, followed by 16 rounds of processing that includes substituting values using S-boxes and permuting bits. While secure for its time, DES is now considered insecure due to the short key length being susceptible to brute force attacks.

Uploaded by

Raja Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
206 views6 pages

Assignment 3

The Data Encryption Standard (DES) was developed in 1974 by IBM and the U.S. government to set a standard for encrypting data using symmetric-key cryptography. DES operates on 64-bit blocks using a 56-bit secret key. The encryption process involves an initial and final permutation of the plaintext blocks, followed by 16 rounds of processing that includes substituting values using S-boxes and permuting bits. While secure for its time, DES is now considered insecure due to the short key length being susceptible to brute force attacks.

Uploaded by

Raja Salman
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Muhammad Arslan

18-Arid-2792
BSIT 5-B Morning
Introduction to DES:
The Data Encryption Standard (DES) was jointly developed in 1974 by IBM and the U.S.
government (US patent 3,962,539) to set a standard that everyone could use to securely
communicate with each other. It operates on blocks of 64 bits using a secret key that is 56 bits
long. The original proposal used a secret key that was 64 bits long. It is widely believed that the
removal of these 8 bits from the key was done to make it possible for U.S. government agencies
to secretly crack messages. DES started out as the "Lucifer" algorithm developed by IBM. The
US National Security Agency (NSA) made several modifications, after which it was adopted as
Federal Information Processing Standard (FIPS) standard 46-3 and ANSI standard X3.92.

Outline of the Algorithm:


To put it in simple terms, DES takes 64-bit plain text and turns it into a 64-bit ciphertext. And
since we’re talking about a symmetric algorithm, the same key is used when it’s time to decrypt
the text.
The algorithm process breaks down into the following steps:
The process begins with the 64-bit plain text block getting handed over to an initial permutation
(IP) function.
The initial permutation (IP) is then performed on the plain text.
Next, the initial permutation (IP) creates two halves of the permuted block, referred to as Left
Plain Text (LPT) and Right Plain Text (RPT).
Each LPT and RPT goes through 16 rounds of the encryption process.
Finally, the LPT and RPT are rejoined, and a Final Permutation (FP) is performed on the newly
combined block.
The result of this process produces the desired 64-bit cipher text.
The encryption process step (step 4, above) is further broken down into five stages:
Key transformation
Expansion permutation
S-Box permutation
P-Box permutation
XOR and swap
For decryption, we use the same algorithm, and we reverse the order of the 16 round keys.
Security and Efficiency of the Algorithm:
It has a 56-bit key, which makes 2^56 possibilities. This means it would be a bit difficult for the
hackers to get the correct key from these many possibilities. The encryption and decryption
processes are done using the same algorithm, with the exception that the algorithm needs to be
reversed. This is quite convenient in terms of the hardware and software requirements.

It was a superb algorithm of its time. But at the starting of the 21st century, the DES appeared to
be insecure. The main reason was the length of its short secret key.Furthermore, DES can be a
victim of attack using the linear cryptanalysis

This secret key encryption algorithm uses a key that is 56 bits, or seven characters long. At the
time it was believed that trying out all 72,057,594,037,927,936 possible keys (a seven with 16
zeros) would be impossible because computers could not possibly ever become fast enough. In
1998 the Electronic Frontier Foundation (EFF) built a special-purpose machine that could
decrypt a message by trying out all possible keys in less than three days. The machine cost less
than $250,000 and searched over 88 billion keys per second.
DES Tables Design:
Permutation Tables for DES:
Definition of DES S-Boxes:
DES Key Schedule Calculation:

You might also like