SlideShare una empresa de Scribd logo
1 de 22
Data Encryption
   Standard
Introduction
●   The Data Encryption Standard (DES) is a
    symmetric-key block cipher published by the
    National Institute of Standards and Technology
    (NIST).
●   In 1973, NIST published a request for proposals
    for a national symmetric-key cryptosystem. A
    proposal from IBM, a modification of a project
    called Lucifer, was accepted as DES. DES was
    published in the Federal Register in March 1975
    as a draft of the Federal Information Processing
    Standard (FIPS).
Overview
DES is a block cipher, as shown in Figure 6.1.
Structure of DES
Initial and Final Permutation
Intial and final permutation tables
The initial and final
permutations are straight P-
boxes that are inverses
of each other. They have no
cryptography significance in
DES.
Feistel cipher
DES function
The heart of DES is the DES function. The DES
function applies a 48-bit key to the rightmost 32
bits to produce a 32-bit output.
Expansion P-box
Since RI−1 is a 32-bit input and KI is a 48-bit key, we
first need to expand RI−1 to 48 bits.




 Although the relationship between the
 input and output can be defined
 mathematically, DES uses Table to define
 this P-box.
(XOR)
After the expansion permutation, DES uses the
XOR operation on the expanded right section and
the round key. Note that both the right section and
the key are 48-bits in length. Also note that the
round key is used only in this operation.
S-Boxes
S-Box Rule
S-Box 1
Straight Permutation Table
Algorithm for DES
Cipher(plain[64],keys[16,48],cipher[64]){
permute(64,64,plain,inblock,IniPerTab)
split(64,32,inblock,left,right)
for(round =1 to 16)
{
       mixer(left,right,keys[i])
       if(round!=16) swapper(left,right)
}
combine(32,64,left,right,outblock)
permute(64,64,outblock,cipher,FinPerTab)
}
mixer(left[32],right[32],keys[48]){
    Copy(32,right,T1)
    function(T1,keys,T2)
    XOR(32,left,T2,T3)
    Copy(32,T3,right)
}
swapper(left[32],right[32]){
    Copy(32,left,T)
    Copy(32,right,left)
    Copy(32,T,right)
}
function(input[32],key[48],output[32]){
    Permute(32,48,input,T1,ExpansionPerTab)
    XOR(48, T1, key, T2)
    substitute(T2,T3,SubstituteTab)
    Permute(32,32,T3,output,StraightPerTab)
}
Completeness Effect
●   One bit of cipher text depends upon more
    than one bit.
●   And in DES the cipher text shows
    completeness effect.
References
●   Behrouz Forouzan analysis
Thank You
●   Find the presentation on:-
    www.slideshare.com/anshuljmi

Más contenido relacionado

La actualidad más candente

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
Mohd Arif
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
Sina Manavi
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
7wounders
 

La actualidad más candente (20)

2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
Intro to modern cryptography
Intro to modern cryptographyIntro to modern cryptography
Intro to modern cryptography
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Cipher techniques
Cipher techniquesCipher techniques
Cipher techniques
 
symmetric key encryption algorithms
 symmetric key encryption algorithms symmetric key encryption algorithms
symmetric key encryption algorithms
 
What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Presentation about RSA
Presentation about RSAPresentation about RSA
Presentation about RSA
 
Ipsec
IpsecIpsec
Ipsec
 
Cryptography Intro
Cryptography IntroCryptography Intro
Cryptography Intro
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives3. The Data Encryption Standard (DES) and Alternatives
3. The Data Encryption Standard (DES) and Alternatives
 
Aes (advance encryption standard)
Aes (advance encryption standard) Aes (advance encryption standard)
Aes (advance encryption standard)
 
6. cryptography
6. cryptography6. cryptography
6. cryptography
 

Similar a Des

Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
NithyasriA2
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
ijtsrd
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
subhradeep mitra
 
AssignmentThe purpose of this assignment is to get you familiar .docx
AssignmentThe purpose of this assignment is to get you familiar .docxAssignmentThe purpose of this assignment is to get you familiar .docx
AssignmentThe purpose of this assignment is to get you familiar .docx
ssuser562afc1
 

Similar a Des (20)

Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
 
Data Encryption Standards (1).pptx
Data Encryption Standards (1).pptxData Encryption Standards (1).pptx
Data Encryption Standards (1).pptx
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
4-DES.pdf
4-DES.pdf4-DES.pdf
4-DES.pdf
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
paper4.pdf
paper4.pdfpaper4.pdf
paper4.pdf
 
doc4.pdf
doc4.pdfdoc4.pdf
doc4.pdf
 
sheet4.pdf
sheet4.pdfsheet4.pdf
sheet4.pdf
 
doc4.pdf
doc4.pdfdoc4.pdf
doc4.pdf
 
lecture3.pdf
lecture3.pdflecture3.pdf
lecture3.pdf
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
 
Renas Rajab Asaad
Renas Rajab AsaadRenas Rajab Asaad
Renas Rajab Asaad
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Different types of Symmetric key Cryptography
Different types of Symmetric key CryptographyDifferent types of Symmetric key Cryptography
Different types of Symmetric key Cryptography
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 
AssignmentThe purpose of this assignment is to get you familiar .docx
AssignmentThe purpose of this assignment is to get you familiar .docxAssignmentThe purpose of this assignment is to get you familiar .docx
AssignmentThe purpose of this assignment is to get you familiar .docx
 
MKG_ISS_04.ppt
MKG_ISS_04.pptMKG_ISS_04.ppt
MKG_ISS_04.ppt
 

Más de Anshul Sharma (12)

Understanding concurrency
Understanding concurrencyUnderstanding concurrency
Understanding concurrency
 
Interm codegen
Interm codegenInterm codegen
Interm codegen
 
Programming using Open Mp
Programming using Open MpProgramming using Open Mp
Programming using Open Mp
 
Open MPI 2
Open MPI 2Open MPI 2
Open MPI 2
 
Open MPI
Open MPIOpen MPI
Open MPI
 
Paralle programming 2
Paralle programming 2Paralle programming 2
Paralle programming 2
 
Parallel programming
Parallel programmingParallel programming
Parallel programming
 
Cuda 3
Cuda 3Cuda 3
Cuda 3
 
Cuda 2
Cuda 2Cuda 2
Cuda 2
 
Cuda intro
Cuda introCuda intro
Cuda intro
 
Intoduction to Linux
Intoduction to LinuxIntoduction to Linux
Intoduction to Linux
 
GCC
GCCGCC
GCC
 

Des