Lecture4 Information Security - 230108 - 235829
Lecture4 Information Security - 230108 - 235829
• Next, the initial permutation (IP) produces two halves of the permuted
block; saying Left Plain Text (LPT) and Right Plain Text (RPT).
• In the end, LPT and RPT are rejoined and a Final Permutation (FP) is
performed on the combined block.
• For example: if the round numbers 1, 2, 9, or 16 the shift is done by only one
position for other rounds, the circular shift is done by two positions. The
number of key bits shifted per round is shown in the figure.
• After the shift, 48 of the 56 bits are selected.
• For instance, after the shift, bit number 14 moves to the
first position, bit number 17 moves to the second
position, and so on.
• The key contains only 48-bit positions. Bit number 18 is
discarded (we will not find it in the table), like seven
others, to reduce a 56-bit key to a 48-bit key.
• The32-bit plain text areas called Left Plain Text(LPT) and
Right Plain Text(RPT) are expanded from 32 bits to 48
bits.
• DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output.
• S-boxes
•
• The expanded right plain text now consists of 48 bits and is XORed with the 48-bit key.
• The result of the previous step is divided into 8 boxes. Each box contains 6 bits. After going through the
eight substitution boxes, each box is reduced from 6 bits to 4 bits..
• The result is transposed in accordance with the following rule:
• XOR the left half with the result from the above step. Store this in the right plain text.
• Store the initial right plain text in the left plain text.
• These halves are inputs for the next round. Remember that there are different keys for each round.
• After the 16 rounds of encryption, swap the left plain text and the right plain text.
• The 48-bit key is XOR with 48-bit RPT and the resulting output is given to the
next step, which is the S-Box substitution.
DES Analysis
• The DES satisfies both the desired properties of block cipher. These two
properties make cipher very strong.
• Input: 0 1 2 3 4 5 6 7
• S-box 0 output: 12 15 7 10 14 13 11 0
• S-box 1 output: 7 2 14 9 3 11 0 4
• Input: 8 9 10 11 12 13 14 15
• S-box 0 output: 2 6 3 1 9 4 5 8
• S-box 1 output: 12 13 1 10 6 15 8 5
The AES Cipher
Input 4 rows
1st row is unchanged
2nd row does 1 byte circular shift to left
3rd row does 2 byte circular shift to left
4th row does 3 byte circular shift to left
Symmetric Encryption Techniques
26