SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Computer Security
Prepared by: Assistant Prof. Eman Sanad
Faculty of computers and Artificial Intelligence
Cairo University 1
Lecture 6
• Feistel cipher
• DES
• DES encryption overview
• DES Round structure
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
2
Feistel cipher cont…
Example:
The fifteenth round of encryption, corresponding to the second round of
decryption. “prove that”
• Suppose that the blocks at each stage are 32 bits (two 16-bit halves)
• the key size is 24 bits.
• at the end of encryption round fourteen, the value of the intermediate
block (in hexadecimal) is DE7F03A6.
LE 14 = DE7F and RE 14 = 03A6.
• Also assume that the value of K 15 is 12DE52.
• After round 15, we have LE 15 = 03A6
RE 15 = F(03A6, 12DE52) ⊕ DE7F.
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
3
Feisel cipher cont…
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
4
Feisel cipher cont…
• assume that :
LD 1 = RE 15 , RD 1 = LE 15
• prove that:
LD 2 = RE 14 , RD 2 = LE 14
• start with:
LD 1 = F(03A6, 12DE52) ⊕ DE7F
RD 1 = 03A6
LD 2 = 03A6 = RE 14 ,
RD 2 = F(03A6, 12DE52) ⊕ [F(03A6, 12DE52) ⊕ DE7F]
= DE7F = LE14
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
5
Feisel cipher cont…
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
6
Data Encryption Standard (DES)
• Most widely used block cipher in world
• Adopted in 1977 by NBS (now NIST)
• Encrypts 64-bit data using 56-bit key
• Has widespread use
• has been considerable controversy over
its security
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
7
DES Encryption Overview
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
8
Initial Permutation IP
• first step of the data computation
• IP reorders the input data bits
• quite regular in structure (easy in h/w)
Example:
IP(675a6967 5e5a6b5a) = (ffb2194d 004df6fb)
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
9
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
10
Initial Permutation (IP)
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
11
DES Round Structure
• uses two 32-bit L & R halves
• As for any Feistel cipher can describe as:
L i = R i–1
R i = L i–1 ⊕ F(R i–1 , K i )
• F takes 32-bit R half and 48-bit subkey:
• expands R to 48-bits using perm E
• adds to subkey using XOR
• passes through 8 (S-boxes) to get 32-bit result
• finally permutes using 32-bit perm P
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
12
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
13
Single round of DES algorithm
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
14
8 S-Boxes
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
15
Substitution Boxes S
• have eight S-boxes which map 6 to 4 bits
o each S-box is actually 4 little 4 bit boxes
o outer bits 1 & 6 (row bits) select one row of 4
o inner bits 2-5 (col bits) are substituted
o result is 8 lots of 4 bits, or 32 bits
• row selection depends on both data & key
• feature known as autoclaving (autokeying)
Example:
S(18 09 12 3d 11 17 38 39) = 5fd25e03
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
16
Substitution Boxes S
Example:
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
17
Substitution Boxes S
• The S-boxes are the core of DES in
terms of cryptographic strength. They
are the only nonlinear element in the
algorithm and provide confusion.
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
18
Substitution Boxes S
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
19
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
20
Thank you

Más contenido relacionado

Similar a lecture 6 DES part1.pdf

Introduction to cryptography part2-final
Introduction to cryptography  part2-finalIntroduction to cryptography  part2-final
Introduction to cryptography part2-finalTaymoor Nazmy
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
cryptography and network security chap 3
cryptography and network security chap 3cryptography and network security chap 3
cryptography and network security chap 3Debanjan Bhattacharya
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptxCA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptxtrupeace
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptxModule 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptxSridharCS7
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...Scality
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESijtsrd
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 

Similar a lecture 6 DES part1.pdf (20)

Introduction to cryptography part2-final
Introduction to cryptography  part2-finalIntroduction to cryptography  part2-final
Introduction to cryptography part2-final
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
cryptography and network security chap 3
cryptography and network security chap 3cryptography and network security chap 3
cryptography and network security chap 3
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptxCA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cyber security
Cyber securityCyber security
Cyber security
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptxModule 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptx
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
 
Class3
Class3Class3
Class3
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 

Último

VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shardsChristopher Curtin
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...OnePlan Solutions
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profileakrivarotava
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolsosttopstonverter
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?Alexandre Beguel
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...OnePlan Solutions
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsJean Silva
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingShane Coughlan
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...Bert Jan Schrijver
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slidesvaideheekore1
 

Último (20)

VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024VictoriaMetrics Anomaly Detection Updates: Q1 2024
VictoriaMetrics Anomaly Detection Updates: Q1 2024
 
2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards2024 DevNexus Patterns for Resiliency: Shuffle shards
2024 DevNexus Patterns for Resiliency: Shuffle shards
 
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
Revolutionizing the Digital Transformation Office - Leveraging OnePlan’s AI a...
 
SoftTeco - Software Development Company Profile
SoftTeco - Software Development Company ProfileSoftTeco - Software Development Company Profile
SoftTeco - Software Development Company Profile
 
eSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration toolseSoftTools IMAP Backup Software and migration tools
eSoftTools IMAP Backup Software and migration tools
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?SAM Training Session - How to use EXCEL ?
SAM Training Session - How to use EXCEL ?
 
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
Tech Tuesday Slides - Introduction to Project Management with OnePlan's Work ...
 
Strategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero resultsStrategies for using alternative queries to mitigate zero results
Strategies for using alternative queries to mitigate zero results
 
Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full RecordingOpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
OpenChain Education Work Group Monthly Meeting - 2024-04-10 - Full Recording
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
JavaLand 2024 - Going serverless with Quarkus GraalVM native images and AWS L...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Introduction to Firebase Workshop Slides
Introduction to Firebase Workshop SlidesIntroduction to Firebase Workshop Slides
Introduction to Firebase Workshop Slides
 

lecture 6 DES part1.pdf

  • 1. Computer Security Prepared by: Assistant Prof. Eman Sanad Faculty of computers and Artificial Intelligence Cairo University 1
  • 2. Lecture 6 • Feistel cipher • DES • DES encryption overview • DES Round structure Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 2
  • 3. Feistel cipher cont… Example: The fifteenth round of encryption, corresponding to the second round of decryption. “prove that” • Suppose that the blocks at each stage are 32 bits (two 16-bit halves) • the key size is 24 bits. • at the end of encryption round fourteen, the value of the intermediate block (in hexadecimal) is DE7F03A6. LE 14 = DE7F and RE 14 = 03A6. • Also assume that the value of K 15 is 12DE52. • After round 15, we have LE 15 = 03A6 RE 15 = F(03A6, 12DE52) ⊕ DE7F. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 3
  • 4. Feisel cipher cont… Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 4
  • 5. Feisel cipher cont… • assume that : LD 1 = RE 15 , RD 1 = LE 15 • prove that: LD 2 = RE 14 , RD 2 = LE 14 • start with: LD 1 = F(03A6, 12DE52) ⊕ DE7F RD 1 = 03A6 LD 2 = 03A6 = RE 14 , RD 2 = F(03A6, 12DE52) ⊕ [F(03A6, 12DE52) ⊕ DE7F] = DE7F = LE14 Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 5
  • 6. Feisel cipher cont… Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 6
  • 7. Data Encryption Standard (DES) • Most widely used block cipher in world • Adopted in 1977 by NBS (now NIST) • Encrypts 64-bit data using 56-bit key • Has widespread use • has been considerable controversy over its security Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 7
  • 8. DES Encryption Overview Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 8
  • 9. Initial Permutation IP • first step of the data computation • IP reorders the input data bits • quite regular in structure (easy in h/w) Example: IP(675a6967 5e5a6b5a) = (ffb2194d 004df6fb) Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 9
  • 10. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 10
  • 11. Initial Permutation (IP) Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 11
  • 12. DES Round Structure • uses two 32-bit L & R halves • As for any Feistel cipher can describe as: L i = R i–1 R i = L i–1 ⊕ F(R i–1 , K i ) • F takes 32-bit R half and 48-bit subkey: • expands R to 48-bits using perm E • adds to subkey using XOR • passes through 8 (S-boxes) to get 32-bit result • finally permutes using 32-bit perm P Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 12
  • 13. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 13
  • 14. Single round of DES algorithm Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 14
  • 15. 8 S-Boxes Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 15
  • 16. Substitution Boxes S • have eight S-boxes which map 6 to 4 bits o each S-box is actually 4 little 4 bit boxes o outer bits 1 & 6 (row bits) select one row of 4 o inner bits 2-5 (col bits) are substituted o result is 8 lots of 4 bits, or 32 bits • row selection depends on both data & key • feature known as autoclaving (autokeying) Example: S(18 09 12 3d 11 17 38 39) = 5fd25e03 Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 16
  • 17. Substitution Boxes S Example: Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 17
  • 18. Substitution Boxes S • The S-boxes are the core of DES in terms of cryptographic strength. They are the only nonlinear element in the algorithm and provide confusion. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 18
  • 19. Substitution Boxes S Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 19
  • 20. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 20 Thank you