The Data Encryption Standard (DES) By Danny Gibbs 4/19/2005.

Slides:



Advertisements
Similar presentations
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Advertisements

Conventional Encryption: Algorithms
1 Lecture 3: Secret Key Cryptography Outline concepts DES IDEA AES.
Cryptology  Terminology  plaintext - text that is not encrypted.  ciphertext - the output of the encryption process.  key - the information required.
Digital Signatures and Hash Functions. Digital Signatures.
Cryptography & Security Presented April 16, 2010 By Dave Stycos, Zocalo Data Systems.
Week 2 - Friday.  What did we talk about last time?  Substitution ciphers  Vigenère ciphers  One-time pad.
Data Encryption Standard (DES)
Cryptography. 2 Objectives Explain common terms used in the field of cryptography Outline what mechanisms constitute a strong cryptosystem Demonstrate.
Cryptography1 CPSC 3730 Cryptography Chapter 3 DES.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
BY MUKTADIUR RAHMAN MAY 06, 2010 INTERODUCTION TO CRYPTOGRAPHY.
Secure Hashing and DSS Sultan Almuhammadi ICS 454 Principles of Cryptography.
Introduction to Modern Cryptography Instructor: Amos Fiat Strongly based on presentation and class by Benny Chor School of Computer Science Tel- Aviv Univ.
CS470, A.SelcukLucifer & DES1 Block Ciphers Lucifer & DES CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Hash Functions Nathanael Paul Oct. 9, Hash Functions: Introduction Cryptographic hash functions –Input – any length –Output – fixed length –H(x)
Overview of Cryptography and Its Applications Dr. Monther Aldwairi New York Institute of Technology- Amman Campus INCS741: Cryptography.
Cryptography and Network Security Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown/Mod. & S. Kondakci.
What is Cryptography? Definition: The science or study of the techniques of secret writing, esp. code and cipher systems, methods, and the like Google.
APPLICATIONS OF POLYNOMIALS IN CRYPTOGRAPHY
Encryption Methods By: Michael A. Scott
Data Encryption Standard (DES). Symmetric Cryptography  C = E(P,K)  P = D(C,K)  Requirements  Given C, the only way to obtain P should be with  the.
Encryption is a way to transform a message so that only the sender and recipient can read, see or understand it. The mechanism is based on the use of.
Kevin Orr JT Schratz AES ENCRYPTION. OVERVIEW History Algorithm Uses Brute Force Attack.
Chapter 12 Cryptography (slides edited by Erin Chambers)
Lecture slides prepared for “Computer Security: Principles and Practice”, 2/e, by William Stallings and Lawrie Brown, Chapter 21 “Public-Key Cryptography.
Dan Johnson. What is a hashing function? Fingerprint for a given piece of data Typically generated by a mathematical algorithm Produces a fixed length.
Cryptography Lecture 4 Stefan Dziembowski
Contact Information Cryptography 8/10/2015 | pag. 2 Professor Assistant Office Webpage Course Text Ann Dooms Adriaan Barri
Cryptography, Authentication and Digital Signatures
Cryptography By, Anthony Lonigro & Valentine Mbah.
Chapter 21 Public-Key Cryptography and Message Authentication.
Cracking DES Cryptosystem A cryptosystem is made of these parts: Two parties who want to communicate over an insecure channel An encryption algorithm that.
Strength of Cryptographic Systems Dr. C F Chong, Dr. K P Chow Department of Computer Science and Information Systems The University of Hong Kong.
Lecture 3 Feistel based algorithms. Today 1.Block ciphers - basis 2.Feistel cipher 3.DES 4.DES variations 5.IDEA 5.NEWDES.
1 Lect. 7 : Data Encryption Standard. 2 Data Encryption Standard (DES)  DES - History 1976 – adopted as a federal standard 1977 – official publication.
Computer Security Cryptography. Cryptography Now and Before  In the past – mainly used for confidentiality  Today –Still used for confidentiality –Data.
CRYPTOGRAPHY. TOPICS OF SEMINAR Introduction & Related Terms Categories and Aspects of cryptography Model of Network Security Encryption Techniques Public.
Cryptographic Hash Functions and Protocol Analysis
24-Nov-15Security Cryptography Cryptography is the science and art of transforming messages to make them secure and immune to attacks. It involves plaintext,
Welcome to Cryptology 1 st Semester – Room B310. Syllabus.
Cracking the DES Encryption
COMP 424 Lecture 04 Advanced Encryption Techniques (DES, AES, RSA)
Encryption Basics Module 7 Section 2. History of Encryption Secret - NSA National Security Agency –has powerful computers - break codes –monitors all.
K. Salah1 Cryptography Module I. K. Salah2 Cryptographic Protocols  Messages should be transmitted to destination  Only the recipient should see it.
Plaintextciphertext encryption algorithmdecryption algorithm plaintext.
© Information Security Group, ICU1 Block Cipher- introduction  DES Description: Feistel, S-box Exhaustive Search, DC and LC Modes of Operation  AES Description:
Block Cipher- introduction
CRYPTOGRAPHY Gayathri V.R. Kunapuli. OUTLINE History of Cryptography Need for cryptography Private Key Cryptosystems Public Key Cryptosystems Comparison.
DES: Data Encryption Standard
Network Security Lecture 3 Secret Key Cryptography
CSE 5/7353 – January 25 th 2006 Cryptography. Conventional Encryption Shared Key Substitution Transposition.
Lecture 5 Page 1 CS 236 Online More on Cryptography CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
PGP Stephen Smith – December 11, Outline - Pretty Good Privacy  History  How It Works  How To Use It  Questions  I Get Taken Away In Handcuffs.
ENGR 101 Compression and Encryption. Todays Lecture  Encryption  Symmetric Ciphers  Public Key Cryptography  Hashing.
CRYPTOGRAPHY – DES EMMANUEL M. BIBANGAMBA. TABLE OF CONTENTS Cryptography defined Definitions used Brief history of Cryptography DES & it’s history Technical.
Security. Security Needs Computers and data are used by the authorized persons Computers and their accessories, data, and information are available to.
CRYPTOGRAPHY Cryptography is art or science of transforming intelligible message to unintelligible and again transforming that message back to the original.
Data Encryption Standard (DES) Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
Triple DES.
Symmetric Algorithm of Cryptography
Asynchronous Cryptology: Implementations and Applications
ICS 454 Principles of Cryptography
مروري برالگوريتمهاي رمز متقارن(كليد پنهان)
Introduction to Symmetric-key and Public-key Cryptography
ICS 454 Principles of Cryptography
DISSERTATION ON CRYPTOGRAPHY.
Presentation transcript:

The Data Encryption Standard (DES) By Danny Gibbs 4/19/2005

Realization in 1970’s  Communication  Would rely on computers  A standard needed to ensure protection  tested and published

National Bureau of Standards  May 15, 1973  Federal Register notice  Asked Science and Industry to submit algorithms

Algorithm Criteria  Provide high level of security  Completely specified and easy to understand  Key based security; not in secrecy of algorithm  Available to all users  Adaptable  Economically implemented  Efficient  Must be validated  Exportable

IBM  August 6, 1974  Submitted algorithm named Lucifer  Based on mixing transpositions and substitutions  Only algorithm to match all criteria  17 man-years of effort into creating and analyzing the algorithm

Testing The Algorithm  NSA enlisted  Cryptographic expertise  Security authority

A Standard is Born  First official description  Published: January 15, 1977  Algorithm became  The Data Encryption Standard  July 15, 1977  Federal Information Processing Standards Publication  46 (initial publication)  46-3 (current version, 1999)

New Era in Cryptography  DES  First  published algorithm  algorithm asking for public scrutiny  NSA-evaluated algorithm to be published  Cryptography  Growing field  Had an NSA-evaluated algorithm to work with

Criticisms  Why involve NSA?  Possible trapdoors  Decrypt any message  Matter investigated  U.S. Senate Select Committee on Intelligence  1978  Found no tampering done by NSA

Criticisms (2)  NSA involvement  Ensure IBM did not implement trapdoors  Keys  Weak Keys  Semiweak Keys  Possibly weak Keys  Listed in Applied Cryptography by Bruce Schneier

Criticisms (3)  Key Length  Originally 112-bit but reduced  Now 56-bit Key  Studies in 1977 showed a brute force attack would cost $50-$200 million to implement  Considered not a possibility  So standard 56-bits

Today and DES  FIPS PUB 46-3  Recommends using Triple-DES  Brute force of DES easily possible  New systems implemented with Triple-DES

Triple-DES  Based on DES  Encryption  Input => DES E key1 => DES D key2 => DES E key3 => Output  Decryption  Input => DES D key3 => DES E key2 => DES D key1 => Output

Conclusion  DES algorithm  Changed cryptography  Many firsts  Still being used as part of Triple-DES  Thirty years later  Important to history of Cryptography

Works Cited  Beker, Henry, and Fred Piper. Cipher Systems: The Protection of Communications. New York: Wiley,  Daley, William M., U.S. Department of Commerce, Secretary. Kammer, Raymond G., National Institute of Standards and Technology, Director. Data Encryption Standard (DES). Federal Information Processing Standards Publication Gaithersburg, MD October 25.  Menezes, Alfred, Paul van Oorschot, and Scott Vanstone. Handbook of Applied Cryptography. New York: CRC,  Meyer, Carl, and Stephen Matyas. Cryptography: A New Dimenson In Computer Data Security: A Guide for the Design and Implementation of Secure Systems. New York: Wiley,  Patterson, Wayne. Mathematical Cryptology for Computer Scientists and Mathematicians. Totowa, NJ: Rowman & Littlefield,  Schneier, Bruce. Applied Cryptography: protocols, algorithms, and source code in C. New York: Wiley, 1996.