Data Encryption Standard

Slides:



Advertisements
Similar presentations
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
Advertisements

EECC694 - Shaaban #1 lec #16 Spring Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able.
Cryptography & Number Theory
Lecture 23 Symmetric Encryption
8: Network Security8-1 Symmetric key cryptography symmetric key crypto: Bob and Alice share know same (symmetric) key: K r e.g., key is knowing substitution.
Chapter 13: Electronic Commerce and Information Security Invitation to Computer Science, C++ Version, Fourth Edition SP09: Contains security section (13.4)
Decryption Algorithms Characterization Project ECE 526 spring 2007 Ravimohan Boggula,Rajesh reddy Bandala Southern Illinois University Carbondale.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
A Cryptography Education Tool Anna Yu Department of Computer Science College of Engineering North Carolina A&T State University June 18, 2009.
Dr. Khalid A. Kaabneh Amman Arab University
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Module 3 – Cryptography Cryptography basics Ciphers Symmetric Key Algorithms Public Key Algorithms Message Digests Digital Signatures.
Feistel Cipher Structure
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
Lecture 3 Overview. Ciphers The intent of cryptography is to provide secrecy to messages and data Substitutions – ‘hide’ letters of plaintext Transposition.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Network Security Lecture 3 Secret Key Cryptography
Simplified DES.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Data Security B. R. Chandavarkar Asst. Prof., CSE Dept., NITK, Surathkal. brc.nitk.ac.in.
Triple DES.
Blowfish Algorithm.
6b. Practical Constructions of Symmetric-Key Primitives.
Symmetric Algorithm of Cryptography
Chapter-2 Classical Encryption Techniques.
Encryption
Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Unit -1.
Simplified IDEA Cryptography and Network Security.
SYMMETRIC KEY ALGORITHMS
Lecture 2.2: Private Key Cryptography II
Networks and Communication Systems Department
NET 311 Information Security
BLOWFISH ENCRYPTION ALGORITHM Presented by: Simranjit Singh ( ) M.Tech (CSE) LPU.
NET 311 Information Security
Cryptography and Network Security Chapter 3
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Advanced Encryption Standard (Symmetric key Algorithm)
RFID Security Tony Arous Vincent Yu.
PART VII Security.
Some of this slide set is from Section 2,
ICS 454: Principles of Cryptography
Block Ciphers and the Data Encryption Standard (DES)
Lecture 6 Overview.
ADVANCED ENCRYPTION STANDARDADVANCED ENCRYPTION STANDARD
NET 311 Information Security
Chapter -2 Block Ciphers and the Data Encryption Standard
DES (Data Encryption Standards)
SYMMETRIC KEY ALGORITHMS
Block Ciphers: DES and AES
About Blowfish Encryption Video made by: Tudor Mare Sorin Nita Valentina Sociu Stefan Stefanescu.
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
International Data Encryption Algorithm
DES (Data Encryption Standard)
DATA ENCRYPTION STANDARD (DES)
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Advanced Encryption Standard
Cipher-Based MAC Network Security.
Elect. Codebook, Cipher Block Chaining
Feistel Cipher Structure
Data Encryption Standard (DES)
Presentation transcript:

Data Encryption Standard Mirza Abu Daud Baig 315139 Comp. Sc. II

Introduction What is DES ? It is an encryption algorithm. An encryption scheme has five ingredients: Plaintext original data in unencrypted format Encryption Algorithm applied to plaintext to encrypt Secret Key input to the encryption algorithm Cipher text result of plaintext and secret key Decryption Algorithm encryption algorithm run in reverse to produce plaintext

Introduction What is DES ? It is a Symmetric system. Symmetric, Single key or private key encryption. These algorithms require that the sender and the receiver agree on a key before they can communicate securely. Asymmetric, two key or public key encryption. In these Algorithms there exists 2 keys viz. public and private keys, thereby eliminating the options of sharing any secret keys.

Encryption

Encryption Algorithm Symmetric DES AES 3DES Asymmetric RSA

FEATURES DES is a cryptographic algorithm (cipher). It is a block cipher. It encrypts data in blocks in size of 64 bits each i.e. 64 bit of plain text goes as the input to DES which produce 64 bits of cipher text. The same algorithm and key are used for encryption and decryption, with minor differences. The key length is 56 bits. Actually, the initial key consists of 64 bits before the DES process even starts, every eight bit of the key is discarded to produce a 56-bit key. DES consists of 16 rounds.

Data Encryption Standard DES has 16 rounds, meaning the main algorithm is repeated 16 times to produce the ciphertext.As the number of rounds increases, the security of the algorithm increases exponentially. To do the encryption, DES uses "keys" where are also apparently 16 hexadecimal numbers long, or apparently 64 bits long. However, every 8th key bit is ignored in the DES algorithm, so that the effective key size is 56 bits. But, in any case, 64 bits (16 hexadecimal digits) is the round number upon which DES is organized.

THE PHASES DES Algorithm consists of 2 stages. Key Scheduling Text Scheduling

Key Scheduling STEP - 1 The first step is to pass the 64-bit key through a permutation called Permuted Choice 1

Key Scheduling Step-2 The next step is to use this 56 bit key to generate 16, 48 bit subkeys, called K[1]-K[16], which are used in the 16 rounds of DES for encryption and decryption.

Key Scheduling STEP - 3 The output after rotation is submitted to PC-2.

Text Scheduling step-1 The first step is to pass the plaintext through a permutation called the Initial Permutation, or IP.

Text Scheduling step-2 These 32 bits are passed to the E- table to get 48 bits as output.

Text Scheduling step-3 These 48 bits from E- table is XORed with the key K[i] to get 48 bit output. The 48 bit is passed to the Substitution table called S-box.

Text Scheduling step-4 Each table returns 4 bits i.e.32 bits are submitted to Permutation table which gives 32 bits output.

Text Scheduling step-5 32 bits output from Permutation table is XORed with left half of Original Text. The 32 bits output from XORed operation is now the right half of entire 64 bits output. This entire cycle is repeated 16 times for the 16 phases of DES to get the 64 bits of output. At the end of the sixteenth round we left shift the 64 bits by 32 bits.

Text Scheduling step-6 A final permutation IP-1 is applied as defined by the following table giving the complete encrypted cipher text.

DECRYPTION The same algorithm can be used for encryption as well as decryption. The method described above encrypts a block of plaintext and returns a block of cipher text. In order to decrypt the cipher text and get the original plaintext again, the procedure is simply repeated but the subkeys are applied in reverse order, from K[16]-K[1].

Thank you ?