SlideShare una empresa de Scribd logo
1 de 55
Data Encryption Standard
(DES)
M.Golyani
Tehran University – Kish campus
Fall 2013
Copyright ©GPL
Mohammad.golyani@gmail.com
S-Box P-Box
DES
DES

-
DES

NBS

NIST

NSA

-

-

NBS

-

IBM

-
DES

-

-

S-Box
NSA

DES

-

-
DES

-

-
-

XOR

-
k

f

-

k
0 1 1 0 0 1 0 1

1 0 0 1 1 0 1 0

K=2

F = mirror(each K bit of input)

1 0 0 1 1 0 1 0

K=2

F = mirror(each K bit of input)
-

•

•
•
•
(R)

•

(L)
XOR

•
m

0

0

1

1

1

1

0

0

0

1

0

0

1

1

0

f

1

-

R0

L0

K0
L1

R1

DES

K1

-

Kn

Kn-1
Rn

C

0

1

Ln XOR f(Kn,Rn)
1

0

0

1

1

0

C = (Rn+1,Ln+1)

Kn
Li+1 = Ri
Ri+1 = Li XOR f ( Ri , Ki )
c
Rn

0

0

1

1

1

1

0

0

0

1

0

0

1

1

0

Ln XOR f(Kn,Rn)

1

-

Kn
Ln-1

-

Rn-1
Kn-1

-

f
K0

Ri = Li+1

L0

m

0

1

R0
1

0

0

1

m = (L0 , R0)
1

0

Li = Ri+1 XOR f ( Li+1, Ki )
DES Feistel function
f
Backdoor

DES

-

P-Box S-Box

DES

-
P-Box S-Box
P-Box S-Box

-

S-Box

-

P-Box
Confusion
P-Box

S-Box
Diffusion
P-Box S-Box
P-Box

S-Box
BlowFish

S-Box

P-Box

-

-

DES
P-Box
S-Box

S-Box

-
P-Box S-Box
P-Box

Straight
P-Box
I0

O0

0

0

I1

O1

1

0

I2

O2

1

1

I3

O3

0

1

I4

O4

0

0

I5

O5

1

1

I6

O6

0

0

I7

O7

1

-
P-Box S-Box
P-Box

S-Box

-

y = 3x2 + 4x -1
S-Box

S-Box

-

-

-
P-Box S-Box
m0

m1

m2

m1

m0

m2
Lookup Table:
00

01

10

11

0

010

101

110

001

1

111

100

011

000

m0

n

m0
m1

0

m2

0

Straight
S-Box

1
1

n
DES

S-Box

S-Box

S-Box

-

S-Box

DES

-

S1

0

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

0

14

4

13

1

2

15

11

8

3

10

6

12

5

9

0

7

1

0

15

7

4

14

2

13

1

10

6

12

11

9

5

3

8

2

4

1

14

8

13

6

2

11

15

12

9

7

3

10

5

0

3

15

12

8

2

4

9

1

7

5

11

3

14

10

0

6

13

m1,m2,m3,m4

m0,m5

S-Box

Diffusion
DES

S-Box

DES
S-

S-Box

backdoor
Box
IBM

S-Box
S-Box

NSA
DES
DES

-

DES

-

DES

XOR
-

-
DES
DES

Ri
f

XOR

Li

Ri
DES
P-Box

-

(Initial
Permutation)
58

50

42

34

26

18

60

52

44

36

28

62

54

46

38

64

56

48

57

49

59

IP

10

2

20

12

4

30

22

14

6

40

32

24

16

8

41

33

25

17

9

1

51

43

35

27

19

11

3

61

53

45

37

29

21

13

5

63

55

47

39

31

23

15

7

-
DES
DES
-

“_MAGMAG_”
IP

DES

M

77

01001101

A

65

01000001

G

71

01000111

_

95

01011111

-

0101111101001101010000010100011101001101010000010100011101011111
DES
IP
IP

–

58

50

42

34

26

18

10

2

60

52

44

36

28

20

12

4

62

54

46

38

30

22

14

6

64

56

48

40

32

24

16

8

57

49

41

33

25

17

9

1

59

51

43

35

27

19

11

3

61

53

45

37

29

21

13

5

63

55

47

39

31

23

15

7

IP

-
DES
R

L

P-Box

-

”4950515253545556”
P-Box
(L0)

(R0)
m

0

1

1

0

0

32 bit

1

0

DES

1

-

32 bit
R0

L0

K0
L1

f

R1

DES

-

K1

f
K16

Ri

XOR

-

Li
Ri+1

R14

L14 XOR f(K14,R14)

(L15)

C

0

1

(R15)
1

0

0

1

1

0

Ri

Li+1

-
DES
XOR

L0

f

K0 R0

-

L0

K0

R0

f
L1

R1
Li+1 = Ri

L1 = R0

Ri+1 = Li XOR f ( Ri , Ki )

R1 = L0 XOR f ( R0 , K0 )
DES
K0
XOR

K

K0

K0

-

-

K0 = 101100 001001 001011 001010 011100 001000 000101 000101

K8 = 001110 010001 101010 001010 010100 011100 001000 111000

K1 = 101100 000001 101011 010010 011101 101000 000001 001100

K9 = 001100 000011 100011 001100 000100 010001 110000 001100

K
“4950515253545556”= 000100 000110 110001 010100 100010 000011 000010 110100 -

K2 = 001101 000111 101001 010000 000000 001011 010111 001010

10

K3 = 000001 100111 010101 010100 001011 001011 010000 100001

K11= 010001 000110 110100 110100 001000 010110 101010 100101

K4 = 010011 100100 010101 010101 011010 100100 110001 100010

K12= 110001 101010 010100 100101 001100 100000 100010 010011

K5 = 010011 111100 000100 101001 000011 001100 100100 011010

K13= 110010 111000 011000 100011 100001 110000 000100 010111

K6 = 100010 111000 000110 101011 100001 010101 010001 010000

K14= 111010 011001 001010 101010 000001 110010 001111 000000

K7 = 101110 010000 101010 001011 110010 011000 001001 100000

K15= 101000 011001 001010 101010 010101 000010 001001 000011
DES
-

L0

f
L1

K0

R0

R1
f

DES
DES
XOR

-

XOR

f
-

S-Box

S-Box
P-Box

-
DES
DES
-

R0

E

48-bit

E(R0)
DES
DES
m

0

1

1

0

32 bit

0

1

0

1

32 bit
R0

L0

K0
L1

R1
K1

K16

R14

L14 XOR f(K14,R14)

(L15)

C

0

1

(R15)
1

0

0

1

1

0
DES
XOR

K0 E(R0)

0

0

0

0

1
0

1

1

1

1

1

1

1

1

1

0

0

0

1

0

1

1

1

48-bit

48-bit

48-bit

E(R0)

K0

E(R0) xor K0

S-Box

f
DES
S-Box

P-Box
f

0

0

0

0

S1

1

0

1

1

S2

S3

S4

S5

Straigh P-Box

1

S6

1

1

1

1

0

0

0

1

S7

1

0

1

S8

1

1
DES
S-Box
14 4 13 1

S1

0 15 7
4

2 15 11 8

3 10 6 12 5

9

0

7

15 1

4 14 2 13 1 10 6 12 11 9

5

3

8

3 13 4

3 10 5

0

1 14 8 13 6

15 12 8

2

4

9

2 11 15 12 9
1

3 15 4

1 13 12 7 11 4

2

8

7 13 14 3

0

8

5 14 12 11 15 1

13 8 11 5

6 15 0

2 12 5 10 14 7

9

3

4

13 6

4

9

8 15 3

0 11 1

1 10 13 0

6

7

2 12 4

S5

0

7 10 11 6

1

14 11 2 12 4

4

2

6 10 2

7 13 1

1 11 10 13 7

11 8 12 7

4 15 14 3 11 5
8

5

5

0 15 10 3

8 15 9 12 5

S7

1

9

5

3

0 14

9 10 4

6

S6

2

9 14 15 5

5

0 15 14 2

9

2

3 12

S8

7 11 4
2

5 14 9

2

8

5 11 12 4 15

7

2 12 1 10 14 9

1

1 14 7

4

2

1 13 14 0 11 3

8 12 3

7

0

4 12 5

9 12 14 2

0

5 11
8

4 10 1 13 11 6

5 15 10 11 14 1

7

4

2 14

6

6 15 11 1 10 9

4 14 7

8

5

1 15 13 8 10 3

4

9

2 15

7 12 9

6

0

3

0 13 3

5 12 2 15 8
8

4

7 12 0

9 11 5

8

2 12 9
8

3

9

5 10

6

2

2

13 2

7

3

8 12 6

2 11 6

9 10 1

1 10 6

5 11 12 7

12 1 10 15 9
10 15 4

5

2 13 12 0

6 10 1 13 8

1

7 14 10 15 6

4 10 7

8

7

3 14 5

5 10 6

1 10 14 3

6 11 13 8

3 15 0

9

0 12 11 7 13 15 1

4

13 0 11 7

4 11 13 12 3

6

9

9

3

8 13 3 12 9

1

2 12

10 6

6

5

4 11 2 14 15 0
9

S4

3 15 13 0 14 9

1 14 2 13 6 15 0

4

0 14 7 11 10 4 13 1
13 8 10 1

13 7

4

8 14 12 0

6 13

3 15 5

8

7 15 2

5 11 3 14 10 0

9 14 6

9

S2

8 14 6 11 3

7

10 0

S3

7

-

7

6

3 14 5

0

8 13

0 12 7

6 11 0 14 9

6 10 13 15 3

4 10 8 13 15 12 9

0

3

5

5

2
8

6 11
DES
S-Box
0

-

0
0

S1 0

S1

1

2

3

0 14 4 13 1
1

0 15 7

2

4

4

5

7

2 15 11 8

8

9 10 11 12 13 14 15

3 10 6 12 5

9

0

7

4 14 2 13 1 10 6 12 11 9

5

3

8

3 10 5

0

1 14 8 13 6

3 15 12 8

6

2

4

9

2 11 15 12 9
1

7

7

5 11 3 14 10 0

6 13

S-Box

P-Box

S-Box
1 0 1 1 1 0 0 1 1 0 1 0 0 1 1 0 1 1 1 1 0 1 0 0 1 1 1 1 1 0 1 1
DES
m

0

1

1

0

32 bit

0

1

0

1

32 bit
R0

L0

K0
L1

R1
K1

K16

R14

L14 XOR f(K14,R14)

(L15)

C

0

1

(R15)
1

0

0

1

1

0
DES
P-Box

1

-

7

20

21

1

1

0

1

29

12

28

17

1

0

1

0

1

15

23

26

1

1

1

0

5

18

31

10

1

1

1

1

2

8

24

14

0

1

0

1

32

27

3

9

1

0

1

0

19

13

30

6

1

1

0

1

22

S-Box

16

11

4

25

0

0

1

1

P-Box

f
DES
DES
L0

K0

R0

f
L1

R1
Li+1 = Ri

L1 = R0

Ri+1 = Li XOR f ( Ri , Ki )

R1 = L0 XOR f ( R0 , K0 )
DES
XOR

L0
R1
1

1

0

1

1

0

1

0

1

1

1

0

1

1

1

1

0

1

0

1

1

0

1

0

1

1

0

1

0

0

1

1

0

=

0

1

1

1

0

1

1

1

0

1

0

1

0

0

0

0

1

0

1

0

1

f(K0,R0)

1

0

XOR

0

0

L0

1

0

=

0

1

0

0

R1
DES
m

0

1

1

0

32 bit

0

1

0

1

32 bit

DES

R0

L0

K0
L1

K16

R14

L14 XOR f(K14,R14)

(L15)
0

1

P-Box

R1
K1

C

-

(R15)
1

0

0

1

1

0

IP

P-Box

-
DES
0

1

0

1

0

0

1

0

0

0

1

1

0

1

1

1

0

0

0

0

0

0

0

0

0

0

1

1

0

0

1

1

0

0

0

0

1

1

0

0

1

1

0

0

0

1

1

0

0

1

0

0

1

1

R15 =

0

1

L15 =

1

0

1

0

1

1

1

1

0

1

0

1

0

1

0

0

1

1

0

0

0

1

1

0

1

1

1

0

0

0

0

0

0

0

0

0

0

1

1

0

0

1

1

0

0

0

0

1

1

0

0

1

1

0

0

0

1

1

0

0

1

0

0

1

1

0

1

0

1

1

1

1

0

1

0

1

0

1

0

0

40

8

48

16

56

24

64

32

1

1

0

0

0

1

1

0

39

7

47

15

55

23

63

31

1

1

1

0

0

0

0

0

38

6

46

14

54

22

62

30

0

0

0

0

0

1

1

0

37

5

45

13

53

21

61

29

0

1

1

0

0

0

0

1

36

4

44

12

52

20

60

28

1

0

0

1

1

0

0

0

35

3

43

11

51

19

59

27

1

1

0

0

1

0

0

1

34

2

42

10

50

18

58

26

1

0

1

0

1

1

1

1

33

1

41

9

49

17

57

25

f

IP-1

64 bit
DES
DES
DES

“_MAGMAG_”

“4950515253545556”

01000101 00100011 10100011 00010101 10010000 01001001 11101100 00111101
“4523a3159049ec3d”

_MAGMAG_

5f4d41474d41475f

4950515253545556

IPQRSTUV

4523a3159049ec3d
DES
DES

-

RSA

-

DES

RSA

DES

DESCHALL

-
DES
DES

DESCHALL

-

-

Usenix
DES
DES

RSA

Distributed.net

DES

-

DES

RSA

EFF
Deepcrack

-

-
DES

DES
DES

-
DES
DES

cryptome

PicoComputing

FPGA

-

DES

FPGA

AES

3DES

-

DES
DES

ARM
Secure MCU with 32-bit ARM SC300 CPU, SWP interface, NESCRYPT cryptoprocessor and high-density Flash memory
DES

-

XOR
Electronic Code Book

ECB

DES
CBC, CFB, OFB, CTR

DES
DES

DES

-

-
-

Introduction to modern cryptography, Jonathan Katz, Yehuda Lindell

-

The Day DES Died, SANS Institute InfoSec Reading Room

-

Practically secure Feistel ciphers, Lars R. Knudsen, Arhus University, Denmark

-

Implementation of Data Encryption Standard Using Reversible Gate Logic, Nuthan.A.C

-

DES, CSIS 5857: Encoding and Encryption

-

DES Walk Through, Kathryn Neugent, April 16, 2011

-

United States Patent, 3,798,359 Mar.19,1974

-

Cryptography and Network Security, Behruz Forouzan

-

,…

Más contenido relacionado

Destacado

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Haris Ahmed
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DESHuawei Technologies
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)Mecheko Sha
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standardPrasad Prabhu
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation finaladrigee12
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationsarhadisoftengg
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardShafaan Khaliq Bhatti
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DESchatsiri
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DESHemant Sharma
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.pptUday Meena
 
54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-project54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-projectveenanandkakarla
 
The des algorithm illustrated
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustratedNIKKHILK111
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and CryptographyAdam Reagan
 

Destacado (20)

Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Data encryption, Description, DES
Data encryption, Description, DESData encryption, Description, DES
Data encryption, Description, DES
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Cryptography
CryptographyCryptography
Cryptography
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Encryption presentation final
Encryption presentation finalEncryption presentation final
Encryption presentation final
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
DES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentationDES (Data Encryption Standard) pressentation
DES (Data Encryption Standard) pressentation
 
Cryptography
CryptographyCryptography
Cryptography
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption StandardChapter 3: Block Ciphers and the Data Encryption Standard
Chapter 3: Block Ciphers and the Data Encryption Standard
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Double DES & Triple DES
Double DES & Triple DESDouble DES & Triple DES
Double DES & Triple DES
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-project54522002 triple-des-vhdl-project
54522002 triple-des-vhdl-project
 
The des algorithm illustrated
The des algorithm illustratedThe des algorithm illustrated
The des algorithm illustrated
 
Network Security and Cryptography
Network Security and CryptographyNetwork Security and Cryptography
Network Security and Cryptography
 

Similar a Data encryption standard

Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialMohamed Loey
 
Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...
Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...
Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...Hsien-Hsin Sean Lee, Ph.D.
 
IFIR法による逆回復特性測定回路図
IFIR法による逆回復特性測定回路図IFIR法による逆回復特性測定回路図
IFIR法による逆回復特性測定回路図Tsuyoshi Horigome
 
Unit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdf
Unit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdfUnit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdf
Unit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdfJaysonPalma4
 
5 LogicAndShiftInstructions.pdf
5 LogicAndShiftInstructions.pdf5 LogicAndShiftInstructions.pdf
5 LogicAndShiftInstructions.pdfRoopaPatil24
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Othersnathanurag
 
Ciclotron dynamic 12000 h 2ω
Ciclotron   dynamic 12000 h 2ωCiclotron   dynamic 12000 h 2ω
Ciclotron dynamic 12000 h 2ωMuniz Rodrigues
 
Electrónica digital: Display de 7 segmentos con compuertas lógicas
Electrónica digital: Display de 7 segmentos con compuertas lógicasElectrónica digital: Display de 7 segmentos con compuertas lógicas
Electrónica digital: Display de 7 segmentos con compuertas lógicasSANTIAGO PABLO ALBERTO
 
Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...
Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...
Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...Hsien-Hsin Sean Lee, Ph.D.
 
What is in All of Those SSTable Files Not Just the Data One but All the Rest ...
What is in All of Those SSTable Files Not Just the Data One but All the Rest ...What is in All of Those SSTable Files Not Just the Data One but All the Rest ...
What is in All of Those SSTable Files Not Just the Data One but All the Rest ...DataStax
 
Fun and Easy UART - How the UART Protocol Works
Fun and Easy UART - How the UART Protocol WorksFun and Easy UART - How the UART Protocol Works
Fun and Easy UART - How the UART Protocol WorksRitesh Kanjee
 
Numerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolationNumerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolationNikolai Priezjev
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Amir Masinaei
 

Similar a Data encryption standard (20)

Computer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary MaterialComputer Security Lecture 4.1: DES Supplementary Material
Computer Security Lecture 4.1: DES Supplementary Material
 
Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...
Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...
Lec20 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Da...
 
IFIR法による逆回復特性測定回路図
IFIR法による逆回復特性測定回路図IFIR法による逆回復特性測定回路図
IFIR法による逆回復特性測定回路図
 
Unit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdf
Unit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdfUnit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdf
Unit II-Lesson 3- Dihedral and Multiplicative Groups (PALMA).pdf
 
5 LogicAndShiftInstructions.pdf
5 LogicAndShiftInstructions.pdf5 LogicAndShiftInstructions.pdf
5 LogicAndShiftInstructions.pdf
 
Ch03 Ch06 Des And Others
Ch03 Ch06 Des And OthersCh03 Ch06 Des And Others
Ch03 Ch06 Des And Others
 
Bottomupparser
BottomupparserBottomupparser
Bottomupparser
 
Bottomupparser
BottomupparserBottomupparser
Bottomupparser
 
Bottomupparser
BottomupparserBottomupparser
Bottomupparser
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Ciclotron dynamic 12000 h 2ω
Ciclotron   dynamic 12000 h 2ωCiclotron   dynamic 12000 h 2ω
Ciclotron dynamic 12000 h 2ω
 
DES Block Cipher Hao Qi
DES Block Cipher Hao QiDES Block Cipher Hao Qi
DES Block Cipher Hao Qi
 
Electrónica digital: Display de 7 segmentos con compuertas lógicas
Electrónica digital: Display de 7 segmentos con compuertas lógicasElectrónica digital: Display de 7 segmentos con compuertas lógicas
Electrónica digital: Display de 7 segmentos con compuertas lógicas
 
Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...
Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...
Lec16 Intro to Computer Engineering by Hsien-Hsin Sean Lee Georgia Tech -- Fi...
 
Blockchain economy
Blockchain economyBlockchain economy
Blockchain economy
 
Slr parser
Slr parserSlr parser
Slr parser
 
What is in All of Those SSTable Files Not Just the Data One but All the Rest ...
What is in All of Those SSTable Files Not Just the Data One but All the Rest ...What is in All of Those SSTable Files Not Just the Data One but All the Rest ...
What is in All of Those SSTable Files Not Just the Data One but All the Rest ...
 
Fun and Easy UART - How the UART Protocol Works
Fun and Easy UART - How the UART Protocol WorksFun and Easy UART - How the UART Protocol Works
Fun and Easy UART - How the UART Protocol Works
 
Numerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolationNumerical Methods: curve fitting and interpolation
Numerical Methods: curve fitting and interpolation
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 

Más de Mohammad Golyani

Más de Mohammad Golyani (9)

A holistic Control Flow Integrity
A holistic Control Flow IntegrityA holistic Control Flow Integrity
A holistic Control Flow Integrity
 
C++ How to program
C++ How to programC++ How to program
C++ How to program
 
GCC, Glibc protections
GCC, Glibc protectionsGCC, Glibc protections
GCC, Glibc protections
 
GCC, Glibc protections
GCC, Glibc protectionsGCC, Glibc protections
GCC, Glibc protections
 
Exec-shield
Exec-shieldExec-shield
Exec-shield
 
ASLR
ASLRASLR
ASLR
 
Advanced c programming in Linux
Advanced c programming in Linux Advanced c programming in Linux
Advanced c programming in Linux
 
How to get LBR contents on Intel x86
How to get LBR contents on Intel x86How to get LBR contents on Intel x86
How to get LBR contents on Intel x86
 
Linux Protections Against Exploits
Linux Protections Against ExploitsLinux Protections Against Exploits
Linux Protections Against Exploits
 

Último

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 

Último (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

Data encryption standard

Notas del editor

  1. توضیح اینکه از نظر ریاضی ثابت نشده که کلید کلّی نداره
  2. Demo of MD5sum
  3. سوال انحرافی: مگر نباید عملیات تابع برگشت پذیر باشد؟ پس عمل برگشت در این Sbox های چند به یک چگونه خواهد بود؟