6.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Data Encryption Standard (DES)

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

Copyright © 2002 Pearson Education, Inc. Slide 1.
Copyright © 2002 Pearson Education, Inc. Slide 1.
Copyright © 2002 Pearson Education, Inc. Slide 1.
Principles & Applications
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. *See PowerPoint Lecture Outline for a complete, ready-made.
Chapter 1 The Study of Body Function Image PowerPoint
1 Copyright © 2010, Elsevier Inc. All rights Reserved Fig 3.1 Chapter 3.
Copyright © 2011, Elsevier Inc. All rights reserved. Chapter 4 Author: Julia Richards and R. Scott Hawley.
1 Copyright © 2013 Elsevier Inc. All rights reserved. Chapter 14.
1 Chapter 40 - Physiology and Pathophysiology of Diuretic Action Copyright © 2013 Elsevier Inc. All rights reserved.
Chapter 1 Image Slides Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
0 - 0.
DES The Data Encryption Standard (DES) is a classic symmetric block cipher algorithm. DES was developed in the 1970’s as a US government standard The block.
© 2014, The McGraw-Hill Companies, Inc. All Rights Reserved. capitolo 4 Ascoltiamo! La famiglia italiana oggi p. 107 Cultura © 2014, The McGraw-Hill Companies,
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chemistry Seventh Edition Raymond Chang Chapter 7 PowerPoint.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2001 Chapter 20 SONET/SDH.
Chapter 14 Switching Circuit Switching Packet Switching Message Switching WCB/McGraw-Hill  The McGraw-Hill Companies, Inc., 1998.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter Four Trusses.
Mathematics of Cryptography Part II: Algebraic Structures
19.1 Chapter 19 Network Layer: Logical Addressing Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Encryption Standard (DES)
Data Encryption Standard (DES)
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Advanced Encryption Standard
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Feistel Cipher Structure
DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.
30.1 Chapter 30 Cryptography Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Introduction to Modern Symmetric-key Ciphers
1 Data Encryption Standard (DES) An example of secret key (i.e., symmetric) encryption system Note: These figures are meant to help illustrating a few.
Fifth Edition by William Stallings
CSC 386 – Computer Security Scott Heggen. Agenda Cryptography (i.e., Confusion and Diffusion)
5.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 5 Introduction to Modern Symmetric-key Ciphers.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 7.
Information and Network Security Lecture 2 Dr. Hadi AL Saadi.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
CS480 Cryptography and Information Security
Introduction to Modern Symmetric-key Ciphers
Copyright © The McGraw-Hill Companies, Inc
Chapter 3 Image Slides Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Advanced Encryption Standard (Symmetric key Algorithm)
Introduction to Modern Symmetric-key Ciphers
DES Examples Chater#3 DES.
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 12 Image Slides Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Computer Security IT423 Semester II
Copyright © The McGraw-Hill Companies, Inc
CHAPTER 6 SKELETAL SYSTEM
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Journey to the Cosmic Frontier
Journey to the Cosmic Frontier
Journey to the Cosmic Frontier
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Advanced Encryption Standard
Copyright © 2004 The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 3 Introduction to Physical Design of Transportation Facilities.
Presentation transcript:

6.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 2 Data Encryption Standard (DES)

6.2 DES is a block cipher, as shown in Figure Overview Figure 6.1 Encryption and decryption with DES

DES STRUCTURE The encryption process is made of two permutations (P- boxes), which we call initial and final permutations, and sixteen Feistel rounds Initial and Final Permutations Rounds Cipher and Reverse Cipher Examples Topics discussed in this section:

Continue Figure 6.2 General structure of DES

Initial and Final Permutations Figure 6.3 Initial and final permutation steps in DES

6.6 DES uses 16 rounds. Each round of DES is a Feistel cipher Rounds Figure 6.4 A round in DES (encryption site)

6.7 The heart of DES is the DES function. The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-bit output Continued DES Function Figure 6.5 DES function

6.8 Expansion P-box Since R I1 is a 32-bit input and K I is a 48-bit key, we first need to expand R I1 to 48 bits Continue Figure 6.6 Expansion permutation

6.9 Although the relationship between the input and output can be defined mathematically, DES uses Table 6.2 to define this P-box Continue Table 6.6 Expansion P-box table

6.10 Whitener (XOR) After the expansion permutation, DES uses the XOR operation on the expanded right section and the round key. Note that both the right section and the key are 48-bits in length. Also note that the round key is used only in this operation Continue

6.11 S-Boxes The S-boxes do the real mixing (confusion). DES uses 8 S- boxes, each with a 6-bit input and a 4-bit output. See Figure Continue Figure 6.7 S-boxes

Continue Figure 6.8 S-box rule

6.13 Table 6.3 shows the permutation for S-box 1. For the rest of the boxes see the textbook Continue Table 6.3 S-box 1

6.14 Example Continued The input to S-box 1 is What is the output? If we write the first and the sixth bits together, we get 11 in binary, which is 3 in decimal. The remaining bits are 0001 in binary, which is 1 in decimal. We look for the value in row 3, column 1, in Table 6.3 (S-box 1). The result is 12 in decimal, which in binary is So the input yields the output Solution

6.15 Example Continued The input to S-box 8 is What is the output? If we write the first and the sixth bits together, we get 00 in binary, which is 0 in decimal. The remaining bits are 0000 in binary, which is 0 in decimal. We look for the value in row 0, column 0, in Table 6.10 (S-box 8). The result is 13 in decimal, which is 1101 in binary. So the input yields the output Solution