0% found this document useful (0 votes)
37 views23 pages

Data Encryption Standard SUZ

The document discusses the Data Encryption Standard (DES) algorithm. It describes the key phases and steps of DES including initial permutation, generation of subkeys, round functions using S-boxes and P-boxes, and final permutation. It also provides examples of calculating round functions and questions to test understanding of DES concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
37 views23 pages

Data Encryption Standard SUZ

The document discusses the Data Encryption Standard (DES) algorithm. It describes the key phases and steps of DES including initial permutation, generation of subkeys, round functions using S-boxes and P-boxes, and final permutation. It also provides examples of calculating round functions and questions to test understanding of DES concepts.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

MCSE 568

Data Encryption Standard


Lecture 5
Feistel Cipher

MCSE 568 Department of CSE, Stamford University, Bangladesh


DES (Data Encryption Standard)

MCSE 568 Department of CSE, Stamford University, Bangladesh


DES (Data Encryption Standard)
Phases
i) Permutation and sub key generation
ii) Plaintext permutation and division
iii) Round Functions
iv) Final Permutation

MCSE 568 Department of CSE, Stamford University, Bangladesh


DES : Block Diagram
Lkey(28) RKey(28)
LPT(32) RPT(32)
32 bits
Lkey(28) RKey(28)
Expansion Permutation
48 bits Permuted
Choice-2
XOR
48 bits
48 bits
S-Box
32 bits 32 bits
32 bits
Lkey(28) RKey(28)
P-Box
32 bits

XOR
32 bits
32 bits 32 bits
Left(32) Right (32)
MCSE 568 Department of CSE, Stamford University, Bangladesh
Step 1: Generating Sub Keys
64-bit Key=133457799BBCDFF1

PC-1

MCSE 568 Department of CSE, Stamford University, Bangladesh


Step 1: Generating Sub Keys
64 bit 56 bit 48 bit
PC1 PC2

Use PC2 to calculate key k1

(1st Sub key) All 16 Sub keys each of 48 bits

MCSE 568 Department of CSE, Stamford University, Bangladesh


Step 2: Initial Permutation

MCSE 568 Department of CSE, Stamford University, Bangladesh


Step 3: Round Function
32 bits
32 bits

48 bits
32 bits
Expand 32 to 48 bit

48 bits
48 bits
f(R0,K1)= 48 bits
MCSE 568 Department of CSE, Stamford University, Bangladesh
Step 3: Round Function
As L0 is 32 bits, k1+E(R0) need to
compressed to 32 bits,
48 bits

B1=011000
Row No. = 00 (First bit & Last bit)
Col No. = 1100 (Middle four bits)
So S1(B1)= 0101 (5)

MCSE 568 Department of CSE, Stamford University, Bangladesh


Step 3: Round Function

48 bits

B2=010001
Row No. = 01 (First bit & Last bit)
Col No. = 1000 (Middle four bits)
So S2(B2)= 1100 (12)

S2
MCSE 568 Department of CSE, Stamford University, Bangladesh
Step 3: Round Function

48 bits

B3=011110
Row No. = 00 (First bit & Last bit)
Col No. = 1111 (Middle four bits)
So S3(B3)= 1000 (8)

S3
MCSE 568 Department of CSE, Stamford University, Bangladesh
Step 3: Round Function

48 bits

B4=111010
Row No. = 10 (First bit & Last bit)
Col No. = 1101 (Middle four bits)
So S4(B4)= 0010 (2)

S4
MCSE 568 Department of CSE, Stamford University, Bangladesh
Step 3: Round Function

32 bits MCSE 568 Department of CSE, Stamford University, Bangladesh


Step 3: Round Function

32 bits

32 bits
32 bits
For Round 2
32 bits
L2=R1
32 bits R2=L1 + f(R1,K2)
32 bits
32 bits
Continue upto round 16…
32 bits
MCSE 568 Department of CSE, Stamford University, Bangladesh
Step 4: Final Permutation

32 bits
32 bits
64 bits

64 bits

Same procedure must be repeated for other blocks


Check the result online using https://emvlab.org/descalc/
MCSE 568 Department of CSE, Stamford University, Bangladesh
DES (Data Encryption Standard)

MCSE 568 Department of CSE, Stamford University, Bangladesh


DES (Data Encryption Standard)

MCSE 568 Department of CSE, Stamford University, Bangladesh


Q1: The DES Algorithm Cipher System
consists of ____________rounds (iterations)

A 12

B 16

C 18

D 8
Q2: The DES algorithm has a key length of __

A 32 bits

B 48 bits

C 56 bits

D 64 bits
Q3: The input and output of S-Box are _____

A 48 & 32 bits

B 32 & 48 bits

C 56 & 32 bits

D 32 & 32 bits
Q4: The Initial Permutation table/matrix is of
size _____

A 8x4

B 12x8

C 8x8

D 16x8
Q5: The number of tests required to break the
DES algorithm is______

A 2.8x1014

B 4.2x109

C 1.84x1019

D 7.2x1016

You might also like