Des
Des
Key-Dependent Transformations
• Uses a secret key to transform the plaintext into ciphertext.
• The same key is used for both encryption and decryption (symmetric encryption).
Multiple Rounds
• Encryption involves multiple rounds of substitution and permutation.
• More rounds increase security by making it harder to break.
3. Round-Based Transformations:
1. Substitution (S-Box): Replaces bytes to introduce confusion.
3. Mixing with Key: Uses XOR operations to mix data with round keys.
4.Final Processing: The encrypted blocks are combined to form the ciphertext.
Decryption Process
• The process is reversed using the same key to recover the original plaintext.
Data Encryption Standard (DES)
• The Data Encryption Standard (DES) is a symmetric-key block cipher that was widely
used for data encryption. It was developed in the 1970s by IBM and later adopted by
the U.S. National Institute of Standards and Technology (NIST) in 1977.
4.Decryption:
1. Follows the same process in reverse using the same key.
The algorithm process breaks down into the following steps :
• The process begins with the 64-bit plain text block getting handed over to an initial permutation
(IP) function.
• The initial permutation (IP) is then performed on the plain text.
• Next, the initial permutation (IP) creates two halves of the permuted block, referred to as Left Plain
Text (LPT) and Right Plain Text (RPT).
• Each LPT and RPT goes through 16 rounds of the encryption process.
• Finally, the LPT and RPT are rejoined, and a Final Permutation (FP) is performed on the newly
combined block.
• The result of this process produces the desired 64-bit ciphertext.
• The encryption process step (step 4, above) is further broken down into five stages:
• Key transformation
• Expansion permutation
• S-Box permutation
• P-Box permutation
• XOR and swap
• For decryption, we use the same algorithm, and we reverse the order of the 16 round keys.
Weaknesses of DES:
1. Short Key Length (56-bit):
1. Vulnerable to brute-force attacks (modern computers can crack DES in hours).
2. Susceptibility to Cryptanalysis:
1. Differential and linear cryptanalysis can be used to break DES with enough known plaintext-ciphertext pairs.
Replacement of DES:
Due to its weaknesses, AES (Advanced Encryption Standard) replaced DES as the encryption standard in
2001.
Advanced Encryption Standard (AES)
• AES (Advanced Encryption Standard) is a symmetric-key block cipher used for secure data encryption. It was adopted by
NIST (National Institute of Standards and Technology) in 2001 as the successor to DES. AES is widely used in applications
2. Key Sizes:
1. Supports 128-bit, 192-bit, and 256-bit keys.
2. Longer keys provide stronger security
3. Number of Rounds:
1. 128-bit key → 10 rounds
2. 192-bit key → 12 rounds
3. 256-bit key → 14 rounds
4. Encryption Process:
1. SubBytes: Non-linear byte substitution using an S-box.
2. ShiftRows: Rows of the state matrix are shifted.
3. MixColumns: Columns are mixed using matrix multiplication.
4. AddRoundKey: The round key is XORed with the state.
Why is AES More Secure than DES?
Feature DES AES
2.Encryption: The sender encrypts data using the recipient’s public key.
3.Decryption: The recipient decrypts the data using their private key.
Since only the private key can decrypt the data encrypted by the
corresponding public key, the system ensures confidentiality and
security.
Common Applications
1. Secure Communication (TLS/SSL) – Used in HTTPS to encrypt web traffic.
5. Authentication & Key Exchange (SSH, VPNs) – Secure login and data transfer.
Popular Asymmetric Cryptography Algorithms
6. RSA (Rivest-Shamir-Adleman) – One of the most widely used algorithms for encryption
and digital signatures.
7. ECC (Elliptic Curve Cryptography) – More efficient than RSA, used in modern
cryptographic systems.
8. Diffie-Hellman Key Exchange – Allows secure key exchange over an insecure channel.
9. DSA (Digital Signature Algorithm) – Used for digital signatures to verify authenticity.
Advantages & Disadvantages
• Advantages:
• Higher security (even if the public key is exposed, data remains secure).