Influencing policy (training slides from Fast Track Impact)
Des1
1. (DES)Data Encryption Standard:
A block cipher processes the plaintext
input in fixed-sized blocks and produces a
block of cipher text of equal size for each
plaintext block
The plaintext is 64 bits in length and the key
(k) is 56 bits in length (16 rounds of
processing (16 sub keys (k (left shift to k1)
k1…..k16 are generated for each round
based on left shift)
The plaintext block is divided into two
halves, LE0 and RE0. The two halves of the
data pass through 16 rounds of processing
and then combine to produce the cipher
text block.
A substitution is performed on the left half
of the data. This is done by applying a
round function F(left circular shift shuffles
the input block) to the right half of the data
and then taking the exclusive-OR (XOR) of
2. the output of that function and the left half
of the data.
Permutation is performed that consists of
the interchange of the two halves of the
data.
3. Implemtation of simple DES
Algorithm
Program:
import java.security.*; // Java Security
Packages There are three security-
related packages in java 1. JCA/JCE
(Java Cryptography Architecture & Java
Cryptography Extensions) 2. JSSE( Java
Secure-Sockets Extension). 3. JAAS( Java
Authentication & Authorization Service)
import javax.crypto.*; // Provides the
classes and interfaces for cryptographic
operations. Operation include
encryption, key generation and key
agreement, and Message Authentication
Code (MAC) generation.
public class PrivateExample