0% found this document useful (0 votes)
2 views20 pages

Session 8

Uploaded by

2200031695cseh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views20 pages

Session 8

Uploaded by

2200031695cseh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

SESSION 8

DATA ENCRYPTION STANDARD


(DES)

CREATED BY K. VICTOR BABU


INTRODUCTION

This session provides an overview of encryption and


decryption procedures of DES along with key generation.

CREATED BY K. VICTOR BABU


DATA ENCRYPTION STANDARD (DES) - ENCRYPTION

CREATED BY K. VICTOR BABU


DES-ENCRYPTION:

• Consider 64 bits of plaintext and give to Initial Permutation


(IP). IP permutes the order of plaintext bits.
• Then it passes through 16 rounds. The output of last round is
passed to Swap function.

• Swap function swaps left and right halves.


• After the swap function we apply Inverse Initial Permutation
(IP-1).

CREATED BY K. VICTOR BABU


DES– SINGLE ROUND PROCESS IN ENCRYPTION

CREATED BY K. VICTOR BABU


CREATED BY K. VICTOR BABU
DES– SINGLE ROUND OPERATION

• The 64 bits input to each round is divided into two equal 32


bit halves. Consider right half 32 bit half and give it to
Expansion/Permutation (E/P).
• E/P expands 32 bits into 48 bits and permutes the order of
bits.
• Output of E/P is XORed with subkey K1 whose length 48 bits.
48 bits are given to substitution boxes.

CREATED BY K. VICTOR BABU


CALCULATION OF F(R,K)

CREATED BY K. VICTOR BABU


CREATED BY K. VICTOR BABU
KEY GENERATION

• A 64-bit key is used as input to the algorithm. The bits of the key are
numbered from 1 through 64; every eighth bit is ignored, 56 bits are
left out. The key is first subjected to a permutation governed by a table
labeled Permuted Choice One.
• The resulting 56-bit key is then treated as two 28-bit quantities,
subjected to a circular left shift or (rotation) of 1 or 2 bits.
• These shifted values serve as input to the next round.
• They also serve as input to the part labeled Permuted Choice 2, which
produces a 48-bit output that serves as input to the function F(Ri -1, Ki).

CREATED BY K. VICTOR BABU


CREATED BY K. VICTOR BABU
CRYPTANALYSIS ON DES:

Brute Force Attacks:


• The easiest way to attack DES is using an exhaustive key
search. The process entails attempting each of the 256
possible keys until the right key is discovered. Despite
requiring a lot of computing work, the comparatively modest
key size makes it effective against DES. Now, with the
technological improvements, DES may be attacked via brute
force.

CREATED BY K. VICTOR BABU


CRYPTANALYSIS ON DES:

Linear Cryptanalysis:
• Selecting a candidate for a linear approximation using a known plaintext-
ciphertext pair.
• Building a linear expression using input and output bits that are known.
• Calculating the linear expression's bias or correlation with the key bits.
• Repeating the procedure with numerous plaintext-ciphertext pairs will
increase the attack's dependability.
• C[a1,a2,……an] XOR K[b1,b2,…..bn] = P[p1,p2,…..pn]

CREATED BY K. VICTOR BABU


CRYPTANALYSIS ON DES:

Differential Cryptanalysis:
• A substantial number of plaintext-ciphertext pairings with known
variations are gathered in order to execute differential cryptanalysis on
the DES algorithm. These pairs were carefully selected in order to
investigate how discrepancies spread through DES rounds.
• The investigation of the differences in the intermediate steps, especially
focusing on the function of the S-boxes, is a component of the differential
cryptanalysis of DES. Due to their 6-bit input and 4-bit output, S-boxes
are excellent candidates for differential cryptanalysis.

CREATED BY K. VICTOR BABU


SUMMARY

• Although DES has tremendous advantages and contributed significantly


to the development of cryptography, its short key size and susceptibility
to attacks make it unsuitable for use in contemporary applications.
• For maintaining the confidentiality and integrity of sensitive information,
it is advised to employ more secure and powerful encryption methods,
such as AES. Stronger block cipher designs are required, and linear
cryptanalysis has proven this.
• The creation of more secure cryptographic primitives and the
advancement of encryption algorithms were both influenced by it.

CREATED BY K. VICTOR BABU


SELF ASSESSMENT QUESTIONS

1. What is DES an acronym for?


a. Data Encryption Scheme
b. Digital Encryption Standard
c. Data Encoding System
d. Decrypting Encoding Standard

2. Which organization invented the symmetric


key encryption method known as DES?
a. IBM b. NSA c. NIST d. MIT

CREATED BY K. VICTOR BABU


SELF ASSESSMENT QUESTIONS

3. What key size does DES use?


a. 64 bits b. 56 bits c. 48 bits d. 128 bits
4. How many encryption rounds are used in DES?
a. 8 b. 16 c. 10 d. 12
5. What is the DES block size?
a. 64 bits b. 56 bits c. 48 bits d. 128 bits
6. Which cryptographic operation does DES employ
most frequently?
a. Substitution b. Permutation c. XOR d. Shift

CREATED BY K. VICTOR BABU


TERMINAL QUESTIONS

1. Demonstrate key generation process of DES.


2. Summarize cryptanalysis on DES.
3. Illustrate encryption of plaintext using DES
algorithm with a neat diagram.
4. Demonstrate Single round operation of DES
algorithm.
5. Illustrate DES algorithm with neat diagram.

CREATED BY K. VICTOR BABU


REFERENCES
1. Cryptography and Network Security Principles and Practice, by William
stallings, Pearson, 5th edition.

2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce


Schneier, Second Edition , John Wiley & Sons, Inc., 2015.

3.Applied Cryptography for Cyber Security and Defense: Information Encryption


and Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011

4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).

CREATED BY K. VICTOR BABU


THANK YOU

Dr Gandharba Swain

CREATED BY K. VICTOR BABU

You might also like