0% found this document useful (0 votes)
14 views22 pages

2024 01 30 - Reference Material II

The document discusses the Data Encryption Standard (DES), a symmetric-key block cipher published by NIST. It describes the structure and algorithm of DES, including initial and final permutations, the Feistel cipher structure, the DES function using a 48-bit key on 32 bits of input, expansion and substitution boxes, and how one bit of ciphertext depends on more than one bit of plaintext.

Uploaded by

Anant Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views22 pages

2024 01 30 - Reference Material II

The document discusses the Data Encryption Standard (DES), a symmetric-key block cipher published by NIST. It describes the structure and algorithm of DES, including initial and final permutations, the Feistel cipher structure, the DES function using a 48-bit key on 32 bits of input, expansion and substitution boxes, and how one bit of ciphertext depends on more than one bit of plaintext.

Uploaded by

Anant Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Data Encryption

Standard
Introduction
● The Data Encryption Standard (DES) is a
symmetric-key block cipher published by the
National Institute of Standards and Technology
(NIST).
● In 1973, NIST published a request for proposals
for a national symmetric-key cryptosystem. A
proposal from IBM, a modification of a project
called Lucifer, was accepted as DES. DES was
published in the Federal Register in March 1975
as a draft of the Federal Information Processing
Standard (FIPS).
Overview
DES is a block cipher, as shown in Figure 6.1.
Structure of DES
Initial and Final Permutation
Intial and final permutation tables
The initial and final
permutations are straight P-
boxes that are inverses
of each other. They have no
cryptography significance in
DES.
Feistel cipher
DES function
The heart of DES is the DES function. The DES
function applies a 48-bit key to the rightmost 32
bits to produce a 32-bit output.
Expansion P-box
Since RI−1 is a 32-bit input and KI is a 48-bit key, we
first need to expand RI−1 to 48 bits.

Although the relationship between the


input and output can be defined
mathematically, DES uses Table to define
this P-box.
(XOR)
After the expansion permutation, DES uses the
XOR operation on the expanded right section and
the round key. Note that both the right section and
the key are 48-bits in length. Also note that the
round key is used only in this operation.
S-Boxes
S-Box Rule
S-Box 1
Straight Permutation Table
Algorithm for DES
Cipher(plain[64],keys[16,48],cipher[64]){
permute(64,64,plain,inblock,IniPerTab)
split(64,32,inblock,left,right)
for(round =1 to 16)
{
mixer(left,right,keys[i])
if(round!=16) swapper(left,right)
}
combine(32,64,left,right,outblock)
permute(64,64,outblock,cipher,FinPerTab)
}
mixer(left[32],right[32],keys[48]){
Copy(32,right,T1)
function(T1,keys,T2)
XOR(32,left,T2,T3)
Copy(32,T3,right)
}
swapper(left[32],right[32]){
Copy(32,left,T)
Copy(32,right,left)
Copy(32,T,right)
}
function(input[32],key[48],output[32]){
Permute(32,48,input,T1,ExpansionPerTab)
XOR(48, T1, key, T2)
substitute(T2,T3,SubstituteTab)
Permute(32,32,T3,output,StraightPerTab)
}
Completeness Effect
● One bit of cipher text depends upon more
than one bit.
● And in DES the cipher text shows
completeness effect.
References
● Behrouz Forouzan analysis
Thank You
● Find the presentation on:-
www.slideshare.com/anshuljmi

You might also like