Data Encryption Standard (DES)

Slides:



Advertisements
Similar presentations
Cryptography and Network Security Chapter 3
Advertisements

Simplified DES CS-480b Network Security Dick Steflik.
ICS 454: Principles of Cryptography
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Network Security Lecture 14 Presented by: Dr. Munam Ali Shah.
Feistel Cipher Structure
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
Data Security and Encryption (CSE348) 1. Lecture # 7 2.
Block Cipher- introduction
Simplified DES.
CST 312 Pablo Breuer. A block of plaintext is treated as a whole and used to produce a ciphertext block of equal length Typically a block size of 64 or.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
1 CPCS425: Information Security (Topic 5) Topic 5  Symmetrical Cryptography  Understand the principles of modern symmetric (conventional) cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Chapter3: Block Ciphers and the Data Encryption Standard
Triple DES.
6b. Practical Constructions of Symmetric-Key Primitives.
Understanding Cryptography – A Textbook for Students and Practitioners by Christof Paar and Jan Pelzl Chapter 3 – The Data Encryption.
Block Ciphers and the Data Encryption Standard
Symmetric Algorithm of Cryptography
Classical Encryption techniques
Data Encryption Standard
Simplified IDEA Cryptography and Network Security.
SYMMETRIC KEY ALGORITHMS
Lecture 2.2: Private Key Cryptography II
Networks and Communication Systems Department
NET 311 Information Security
NET 311 Information Security
Cryptography Lecture 18.
Cryptography and Network Security Chapter 3
Advanced Encryption Standard (Symmetric key Algorithm)
PART VII Security.
Some of this slide set is from Section 2,
Block cipher & Fiestel Structure
ICS 454: Principles of Cryptography
Fifth Edition by William Stallings
Block Ciphers and the Data Encryption Standard (DES)
NET 311 Information Security
Chapter -2 Block Ciphers and the Data Encryption Standard
SYMMETRIC KEY ALGORITHMS
Block Ciphers: DES and AES
SYMMETRIC ENCRYPTION.
Computer Security IT423 Semester II
Feistel & DES -Sheetal Thapaliya.
International Data Encryption Algorithm
DES (Data Encryption Standard)
DATA ENCRYPTION STANDARD (DES)
Triple DES Network Security.
Basics Of Symmetric Encryption
Cryptanalysis Network Security.
Florida State University
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
The RSA Public-Key Encryption Algorithm
Counter With Cipher Block Chaining-MAC
Counter Mode, Output Feedback Mode
Advanced Encryption Standard
Digital Signature Standard (DSS)
Cipher-Based MAC Network Security.
Elect. Codebook, Cipher Block Chaining
The RC4 Algorithm Network Security.
Stream Cipher Structure
Feistel Cipher Structure
Simple Hash Functions Network Security.
Presentation transcript:

Data Encryption Standard (DES) Network Security

Data Encryption Standard (DES) Objectives of the Topic After completing this topic, a student will be able to describe data encryption standard.

Data Encryption Standard (DES) Figures and material in this topic have been adapted from “Network Security Essentials: Applications and Standards”, 2014, by William Stallings.

Data Encryption Standard (DES) A block cipher processes plaintext input in fixed-sized blocks and produces a block of ciphertext of equal size for each plaintext block. The two users share a common encryption key. DES is an example.

Data Encryption Standard (DES) Block Ciphers

Data Encryption Standard (DES) Data Encryption Standard (DES) was issued in 1977 as Federal Information Processing Standard 46 (FIPS 46) by the National Institute of Standards and Technology (NIST).

Data Encryption Standard (DES) DES Encryption Data are encrypted in 64-bit blocks using a 56-bit key. The algorithm transforms 64-bit input in a series of steps into a 64-bit output.

Data Encryption Standard (DES) There are two inputs to the encryption function: the plaintext to be encrypted and the key. The function expects a 64-bit key out of which only 56 are used; other 8 bits can be set arbitrarily.

Data Encryption Standard (DES) Plaintext proceeds in three phases. First, the 64-bit plaintext passes through an initial permutation (IP) that rearranges the bits to produce the permuted input.

Data Encryption Standard (DES) The 2nd phase consists of 16 rounds of the same function, which involves both permutation and substitution functions. The output of the last round consists of 64 bits that are a function of the input plaintext and the key.

Data Encryption Standard (DES) The left and right halves of the output are swapped to produce preoutput. Finally, the preoutput is passed through a permutation that is the inverse of the initial permutation function, to produce the 64-bit ciphertext.

Data Encryption Standard (DES) Subkey Generation Initially, the key is passed through a permutation function. Then, for each of the 16 rounds, a subkey (Ki) is produced by the combination of a left circular shift and a permutation.

Data Encryption Standard (DES) The permutation function is the same for each round, but a different subkey is produced because of the repeated shifts of the key bits.

Data Encryption Standard (DES) Working of DES

Data Encryption Standard (DES) Working of DES

Data Encryption Standard (DES) DES Decryption It uses the same algorithm as encryption, except that the application of the subkeys is reversed. Also, the initial and final permutations are reversed.

Data Encryption Standard (DES) Concerns about DES 1.The algorithm itself Refers to the possibility that cryptanalysis is possible by exploiting the characteristics of the algorithm

Data Encryption Standard (DES) 2.The use of a 56-bit key 256 = 7.2 × 1016 keys Time required if PC works at 109 decryptions/s, then 255 ns = 1.125 years. Time required if PC works at 1013 decryptions/s, then 1 hour.

Data Encryption Standard (DES) DES finally proved insecure in July 1998. Electronic Frontier Foundation (EFF) have broken it using a machine that took less than three days. End