DES Algorithm Data Encryption Standard. DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode.

Slides:



Advertisements
Similar presentations
6.1.2 Overview DES is a block cipher, as shown in Figure 6.1.
Advertisements

The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
CS 483 – SD SECTION BY DR. DANIYAL ALGHAZZAWI (3) Information Security.
1 CIS 5371 Cryptography 5b. Pseudorandom Objects in Practice Block Ciphers.
Cryptography and Network Security Chapter 3
Rachana Y. Patil 1 Data Encryption Standard (DES) (DES)
Data Encryption Standard (DES)
Symmetric Encryption Example: DES Weichao Wang. 2 Overview of the DES A block cipher: – encrypts blocks of 64 bits using a 64 bit key – outputs 64 bits.
1 The AES block cipher Niels Ferguson. 2 What is it? Block cipher: encrypts fixed-size blocks. Design by two Belgians. Chosen from 15 entries in a competition.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
AES clear a replacement for DES was needed
DES 1 Data Encryption Standard DES 2 Data Encryption Standard  DES developed in 1970’s  Based on IBM Lucifer cipher  U.S. government standard  DES.
1 Overview of the DES A block cipher: –encrypts blocks of 64 bits using a 64 bit key –outputs 64 bits of ciphertext A product cipher –basic unit is the.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
1 Chapter 3 – Block Ciphers and the Data Encryption Standard Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types.
ICS 454: Principles of Cryptography
Lecture 23 Symmetric Encryption
Dr. Lo’ai Tawalbeh 2007 Chapter 5: Advanced Encryption Standard (AES) Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus.
Encryption Schemes Second Pass Brice Toth 21 November 2001.
CSE 651: Introduction to Network Security
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
The Digital Encryption Standard CSCI 5857: Encoding and Encryption.
Chapter 5 Advanced Encryption Standard. Origins clear a replacement for DES was needed –have theoretical attacks that can break it –have demonstrated.
The Data Encryption Standard - see Susan Landau’s paper: “Standing the test of time: the data encryption standard.” DES - adopted in 1977 as a standard.
Cryptography and Network Security Chapter 3. Modern Block Ciphers  now look at modern block ciphers  one of the most widely used types of cryptographic.
1 Chapter 3 Ciphers Mechanism that decides the process of encryption/decryption Stream Cipher: Bit-by-bit encryption / decryption Block Cipher: Block-by-block.
Chapter 20 Symmetric Encryption and Message Confidentiality.
TE/CS 536 Network Security Spring 2006 – Lectures 6&7 Secret Key Cryptography.
Chapter 20 Symmetric Encryption and Message Confidentiality.
Block ciphers Structure of a multiround block cipher
Feistel Cipher Structure
13. Other Block Ciphers 13.1 LUCIFER 13.2 MADRYGA 13.3 NEWDES 13.4 FEAL 13.5 REDOC 13.6 LOKI.
Data Encryption Standard (DES) © 2000 Gregory Kesden.
BLOCK CIPHER SYSTEMS OPERATION MODES OF DATA ENCRYPTION STANDARD (DES)
Introduction to Computer Security ©2004 Matt Bishop Information Security Principles Assistant Professor Dr. Sana’a Wafa Al-Sayegh 1 st Semester
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Security.
Classical &ontemporyryptology 1 Block Cipher Today’s most widely used ciphers are in the class of Block Ciphers Today’s most widely used ciphers are in.
Stream Ciphers and Block Ciphers A stream cipher is one that encrypts a digital data stream one bit or one byte at a time. Examples of classical stream.
AES Advanced Encryption Standard. Requirements for AES AES had to be a private key algorithm. It had to use a shared secret key. It had to support the.
Data Encryption Standard CS-471/971. Category of Standard: Computer Security. Explanation: The Data Encryption Standard (DES) specifies a FIPS approved.
Lecture 23 Symmetric Encryption
Fifth Edition by William Stallings
Advanced Encryption Standard Dr. Shengli Liu Tel: (O) Cryptography and Information Security Lab. Dept. of Computer.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
Network Security Cryptology Cryptography Cryptanalysis.
DATA & COMPUTER SECURITY (CSNB414) MODULE 3 MODERN SYMMETRIC ENCRYPTION.
1 The Data Encryption Standard. 2 Outline 4.1 Introduction 4.4 DES 4.5 Modes of Operation 4.6 Breaking DES 4.7 Meet-in-the-Middle Attacks.
Instructor: Dania Alomar
Data Encryption Standard (DES) most widely used block cipher in world adopted in 1977 by NBS (now NIST) – as FIPS PUB 46 encrypts 64-bit data using 56-bit.
Lecture 4 Overview. Data Encryption Standard Combination of substitution and transposition – Repeated for 16 cycles – Provides confusion and diffusion.
Computer Science and Engineering Computer System Security CSE 5339/7339 Lecture 7 September 9, 2004.
Network Security Lecture 3 Secret Key Cryptography
Module :MA3036NI Symmetric Encryption -3 Lecture Week 4.
Block Ciphers and the Data Encryption Standard. Modern Block Ciphers  One of the most widely used types of cryptographic algorithms  Used in symmetric.
CPIT 425 Chapter Three: Symmetric Key Cryptography.
Information and Computer Security CPIS 312 Lab 6 & 7 1 TRIGUI Mohamed Salim Symmetric key cryptography.
@Yuan Xue Announcement Project Release Team forming Homework 1 will be released next Tuesday.
Data Encryption Standard - DES DES was developed as a standard for communications and data protection by an IBM research team, in response to a public.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Lecture 4 Data Encryption Standard (DES) Dr. Nermin Hamza
Provides Confidentiality
Data Encryption Standard
Lecture 3: Symmetric Key Encryption
Some of this slide set is from Section 2,
ICS 454: Principles of Cryptography
Block Ciphers: DES and AES
ICS 555: Block Ciphers & DES Sultan Almuhammadi.
Data Encryption Standard (DES)
Presentation transcript:

DES Algorithm Data Encryption Standard

DES Features Block cipher, 64 bits per block 64-bit key, with only 56 bits effective ECB mode and CBC mode

DES – Key Scheduling Specify a 64-bit key There are eight parity bits The key structure is in the next page

Bit 0 Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Bit 6 Bit 7 Bit 0~7 Effective Key Parity Bit Bit 8~15 Effective Key Parity Bit Bit 16~23 Effective Key Parity Bit Bit 24~31 Effective Key Parity Bit Bit 32~39 Effective Key Parity Bit Bit 40~47 Effective Key Parity Bit Bit 48~55 Effective Key Parity Bit Bit 56~63 Effective Key Parity Bit

DES – Key Scheduling Key permutation according to “Permuted Choice 1”(PC-1) After permutation, the key length will be only 56 bits 64 bits → 56 bits? Why? The explanation is in the next page

Permuted Choice 1 Bit Note: The 8n-th bit is disappeared!!

DES – Key Scheduling We separate the 56-bit key to two 28-bit keys: L k and R k “Left rotate” the L k and R k according to SRT (Subkey Rotation Table) After rotation, merge L k and R k Permutation according to Permuted Choice 2 (PC-2) We get a 48-bit subkey now

DES – Key Scheduling Repeat the operation 16 times to get 16 subkeys Use rotated L k and R k Why each subkey has length of only 48 bits instead of 56 bits? The answer is similar to PC-1

Subkey Rotation Table Round Number Bits to Rotate Bit Permuted Choice 2

DES – Key Scheduling Flow Chart “<<<” is the operation of SRT We will call the subkeys K[1], K[2], …, K[16] later

Plaintext Preparation Cut the plaintext into 64-bit blocks Each 64-bit block should be permuted according to Initial Permutation Table (IP Table) Besides, we make an Inverse Initial Permutation Table (IP -1 ), which has effect opposite to IP

IP: Initial Permutation Bit IP -1 : Inverse Initial Permutation Bit

DES – Core Function L[0] to L[15], R[0] to R[15] Feistel (F) function Inverse Initial Permutation

Feistel Function Expansion: using E-bit Selection Table Key Mixing: XOR with subkeys Substitution: S-box Permutation: P-box

Feistel Function - Expansion Copy R[0] to a buffer R b R b : 32 bits → 48 bits E-Bit Selection Table Bit

Feistel Function – Key Mixing After the expansion operation, just “XOR” with subkey K[1]

Feistel Function - Substitution 48-bit buffer becomes eight 6-bit blocks 8 S-boxes have output from 0 to 15 which can be represented with 4 bits How do S-boxes work? Wait and see… 8 4-bit outputs can be merged, and store it in a 32-bit buffer

How do S-boxes Work? Bit 0 Bit 1 Bit 2 Bit 3 Bit 4 Bit 5 Row Column Use the Row and Column number to find the corresponding output number from the S-box. Besides, the n-th block must use the n-th S-box.

S-Box 1: Substitution Box 1 Row / Column S-Box 2: Substitution Box 2 Row / Column

S-Box 3: Substitution Box 3 Row / Column S-Box 4: Substitution Box 4 Row / Column

S-Box 5: Substitution Box 5 Row / Column S-Box 6: Substitution Box 6 Row / Column

S-Box 7: Substitution Box 7 Row / Column S-Box 8: Substitution Box 8 Row / Column

Feistel Function - Permutation After the substitution, do permutation according to the P-box P Permutation Bit

DES – Core Function After one round of Feistel Function is completed, the buffer is “XORed” with L, becoming the next R Previous R becomes the next L Repeat the operations mentioned above 16 times

DES – Core Function When 16 rounds are finished, L and R are swapped and merged, then becomes a 64-bit “pre-output” Use IP -1 to become the final cipher output

DES - Decryption Almost all operations are the same as those of encryption Only one is different: use the subkeys in descending order

DES – Other Form Triple-DES: quite literally. A Triple-DES key has length of 192 bits. It can be considered three 64-bit DES key. DES40: a key is pre-processed to make it a 40-bit effective key

DES - Modes ECB (Electronic Code Book) CBC (Cipher Block Chaining)

DES – Cryptanalysis