0% found this document useful (0 votes)
10 views3 pages

DES Algo.

Des algorithms in cyber security

Uploaded by

06 Vinit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views3 pages

DES Algo.

Des algorithms in cyber security

Uploaded by

06 Vinit
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

What is DES Algorithm?

At the start of the 1970s, the IBM team created a symmetric-key cipher block
algorithm known as DES (Data Encryption Standard) Algorithm. The term
symmetric key means that the same key is used for encryption & decryption of
plain text or message. The National Institute of Standards and Technology (NIST)
later adopted this algorithm.
The DES algorithm takes the plain text of 64-bit as input & produces a ciphertext
of 64-bit using a key of 56 bits. Initially, a 64-bit key length is used but an 8-bit is
discarded.
The Data Encryption Standard (DES) was discovered vulnerable to powerful
attacks and hence DES has slightly declined in use. The 56 bits key length used in
DES makes it unsafe against cyber attacks like brute force because 56 bits key
length requires 2^56 attempts for an attacker to find the correct key, which is not
enough to protect sensitive data against brute-force attacks with modern
computers.

How does the DES Algorithm work?

DES is a Feistel Block Cipher implementation, known as LUCIFER. It uses a


Feistel structure with 16 rounds, where a different key is used for each round.
The DES algorithm steps are given below:

1. The process begins by giving 64-bit plain text as input to an initial


permutation function (IP).
2. The initial permutation (IP) is then carried out on plain text.
3. The initial permutation (IP) generates two halves of the permuted block,
known as RPT (Right Plain Text) and LPT (Left Plain Text).
4. Each Left Plain Text (LPT) and Right Plain Text (RPT) is encrypted
through16rounds.
This encryption process consists of five stages:
1. Key Transformation
2. Expansion permutation
3. S-box permutation
4. P-box permutation
5. XOR & Swap
5. Finally Left Plain Text (LPT) is combined with Right Plain Text (RPT).
After that, on the newly combined block generated, a final permutation is
performed.
6. The output of this process will produce a 64-bit ciphertext.

You might also like