DES 1 Data Encryption Standard
DES 2 Data Encryption Standard DES developed in 1970’s Based on IBM Lucifer cipher U.S. government standard DES development was controversial o NSA was secretly involved o Design process not open o Key length was reduced o Subtle changes to Lucifer algorithm
DES 3 DES Numerology DES is a Feistel cipher o 64 bit block length o 56 bit key length o 16 rounds o 48 bits of key used each round (subkey) Each round is simple (for a block cipher) Security depends primarily on “S-boxes” o Each S-boxes maps 6 bits to 4 bits
DES 4 LR expand shift key S-boxes compress LR One Round of DES KiKi P box
DES 5 DES Expansion Permutation Input 32 bits Output 48 bits
DES 6 DES S-box 8 “substitution boxes” or S-boxes Each S-box maps 6 bits to 4 bits S-box number 1 input bits (0,5) input bits (1,2,3,4) | | | | |
DES 7 DES P-box Input 32 bits Output 32 bits
DES 8 DES Subkey 56 bit DES key, numbered 0,1,2,…,55 Left half key bits, LK Right half key bits, RK
DES 9 DES Subkey For rounds i=1,2,...,16 o Let LK = (LK circular shift left by r i ) o Let RK = (RK circular shift left by r i ) o Left half of subkey K i is of LK bits o Right half of subkey K i is RK bits
DES 10 DES Subkey For rounds 1, 2, 9 and 16 the shift r i is 1, and in all other rounds r i is 2 Bits 8,17,21,24 of LK omitted each round Bits 6,9,14,25 of RK omitted each round Compression permutation yields 48 bit subkey K i from 56 bits of LK and RK Key schedule generates subkey
DES 11 DES Last Word (Almost) An initial perm P before round 1 Halves are swapped after last round A final permutation (inverse of P ) is applied to (R 16,L 16 ) to yield ciphertext None of these serve any security purpose
DES 12 Security of DES Security of DES depends a lot on S-boxes o Everything else in DES is linear Thirty years of intense analysis has revealed no “back door” Attacks today use exhaustive key search Inescapable conclusions o Designers of DES knew what they were doing o Designers of DES were ahead of their time