CH 4
CH 4
Network Security
Eighth Edition
by William Stallings
Confusion
•Seeks to make the relationship between the statistics of the ciphertext and the value of the
encryption key as complex as possible. → again to thwart attempts to discover the key.
•Even if the attacker can get some handle on the statistics of the ciphertext, the way in which
the key was used to produce that ciphertext is so complex as to make it difficult to deduce the
key
➢ These equations prove that DES decryption is an inverse process of DES encryption.
Example
▪ Example,
Using the initial permutation table, determine the output of the
initial permutation box when the input is given in hexadecimal
as: 0X0002 0000 0000 0001
✓ Solution
- The input has only two 1s (bits 15 and bit 64)
- From the previous table, 15 → 63 and 64 → 25
- Then, the output is 0x0000 0080 0000 0002
❑ DES Function
It applies a 48-bit key to the
rightmost 32 bits (Ri−1) to
produce a 32-bit output.
➢ Expansion P-box
- Expansion permutation
➢ S-Boxes
- Substitution-boxes do the real mixing (confusion).
- DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output.
❑ DES Function
➢ S-Boxes
- Because each S-box has its own table, we need eight tables.
- For example,
S-box 1
S-box 2
❑ DES Function
➢ S-Boxes
▪ Example,
If the input to S-box 1 is 100011. What is the output?
✓ Solution
100011
11 defines the row ; 3
❑ DES Function
➢ Straight P-box
- Straight permutation; 32-bit input → 32-bit output.
- Example of Straight permutation table
❑ DES Function
➢ Key Generation
▪ Parity Drop
– The preprocess before key
expansion; compression
transposition step.
– It drops the parity bits (bits
8, 16, 24, 32, …, 64)
from the 64-bit key and
permutes the rest of the
bits according to the flowing
Table.
© 2020 Pearson Education, Inc., Hoboken, NJ. All rights reserved.
DES Example
The plaintext, key, and
resulting ciphertext in
hexadecimal
The progression of
DES algorithm at
each round.
The Avalanche Effect
In general, the
criterion should be
If DES had 15 or
that the number of
The greater the fewer rounds,
rounds is chosen so
number of rounds, differential
that known
the more difficult it cryptanalysis would
cryptanalytic efforts
is to perform require less effort
require greater
cryptanalysis than a brute-force
effort than a simple
key search
brute-force key
search attack