0% found this document useful (0 votes)
1 views

Data encryption standard

The Data Encryption Standard (DES) is a block cipher that uses a 56-bit key to encrypt data in 64-bit blocks, but its popularity has declined due to vulnerabilities. DES operates through 16 rounds involving key transformation, expansion permutation, and substitution to produce ciphertext from plaintext. For modern encryption needs, stronger alternatives like AES are recommended.

Uploaded by

FBI
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
1 views

Data encryption standard

The Data Encryption Standard (DES) is a block cipher that uses a 56-bit key to encrypt data in 64-bit blocks, but its popularity has declined due to vulnerabilities. DES operates through 16 rounds involving key transformation, expansion permutation, and substitution to produce ciphertext from plaintext. For modern encryption needs, stronger alternatives like AES are recommended.

Uploaded by

FBI
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Data encryption standard (DES)

What is DES?
Data Encryption Standard (DES) is a block cipher with a 56-bit key
length that has played a significant role in data security.
Data encryption standard (DES) has been found vulnerable to very
powerful attacks therefore, the popularity of DES has been found
slightly on the decline. DES is a block cipher and encrypts data in
blocks of size of 64 bits each, which means 64 bits of plain text go
as the input to DES, which produces 64 bits of ciphertext. The same
algorithm and key are used for encryption and decryption, with
minor differences. The key length is 56 bits.

The basic idea is shown below:


We have mentioned that DES uses a 56-bit key. Actually,

The initial key consists of 64 bits. However, before the DES process
even starts, every 8th bit of the key is discarded to produce a 56-bit
key.

That is bit positions 8, 16, 24, 32, 40, 48, 56, and 64 are discarded.

Thus, the discarding of every 8th bit of the key produces a 56-bit
key from the original 64-bit key.

DES is based on the two fundamental attributes of cryptography:

substitution (also called confusion) and transposition (also called


diffusion).
DES consists of 16 steps, each of which is called a round. Each round
performs the steps of substitution and transposition.

Let us now discuss the broad-level steps in DES.


 In the first step, the 64-bit plain text block is handed over to
an initial Permutation (IP) function.
 The initial permutation is performed on plain text.
 Next, the initial permutation (IP) produces two halves of the
permuted block; saying Left Plain Text (LPT) and Right Plain
Text (RPT).
 Now each LPT and RPT go through 16 rounds of the
encryption process.
 In the end, LPT and RPT are rejoined and a Final
Permutation (FP) is performed on the combined block
 The result of this process produces 64-bit ciphertext.

Initial Permutation (IP)

As we have noted, the initial permutation (IP) happens only once


and it happens before the first round.

It suggests how the transposition in IP should proceed, as shown in


the figure. For example, it says that the IP replaces the first bit of
the original plain text block with the 58th bit of the original plain
text, the second bit with the 50th bit of the original plain text block,
and so on.
This is nothing but jugglery of bit positions of the original plain text
block. the same rule applies to all the other bit positions shown in
the figure.

As we have noted after IP is done, the resulting 64-bit permuted text


block is divided into two half blocks. Each half-block consists of 32
bits, and each of the 16 rounds, in turn, consists of the broad-level
steps outlined in the figure.

Step 1: Key transformation

We have noted initial 64-bit key is transformed into a 56-bit key by


discarding every 8th bit of the initial key. Thus, for each a 56-bit key
is available. From this 56-bit key, a different 48-bit Sub Key is
generated during each round using a process called key
transformation. For this, the 56-bit key is divided into two halves,
each of 28 bits. These halves are circularly shifted left by one or two
positions, depending on the round.
For example: if the round numbers 1, 2, 9, or 16 the shift is done
by only one position for other rounds, the circular shift is done by
two positions. The number of key bits shifted per round is shown in
the figure.

After an appropriate shift, 48 of the 56 bits are selected. From the


48 we might obtain 64 or 56 bits based on requirement which helps
us to recognize that this model is very versatile and can handle any
range of requirements needed or provided. for selecting 48 of the 56
bits the table is shown in the figure given below. For instance, after
the shift, bit number 14 moves to the first position, bit number 17
moves to the second position, and so on.

If we observe the table , we will realize that it contains only 48-bit


positions. Bit number 18 is discarded (we will not find it in the table),
like 7 others, to reduce a 56-bit key to a 48-bit key. Since the key
transformation process involves permutation as well as a selection
of a 48-bit subset of the original 56-bit key it is called Compression
Permutation.

Because of this compression permutation technique, a different


subset of key bits is used in each round. That makes DES not easy to
crack.

Step 2: Expansion Permutation

Recall that after the initial permutation, we had two 32-bit plain text
areas called Left Plain Text(LPT) and Right Plain Text(RPT). During
the expansion permutation, the RPT is expanded from 32 bits to 48
bits. Bits are permuted as well hence called expansion permutation.
This happens as the 32-bit RPT is divided into 8 blocks, with each
block consisting of 4 bits. Then, each 4-bit block of the previous step
is then expanded to a corresponding 6-bit block, i.e., per 4-bit block,
2 more bits are added.

This process results in expansion as well as a permutation of the


input bit while creating output. The key transformation process
compresses the 56-bit key to 48 bits. Then the expansion
permutation process expands the 32-bit RPT to 48-bits. Now the
48-bit key is XOR with 48-bit RPT and the resulting output is given to
the next step, which is the S-Box substitution.

Conclusion
In conclusion, the Data Encryption Standard (DES) is a block
cipher with a 56-bit key length that has played a significant role in
data security. However, due to vulnerabilities, its popularity has
declined. DES operates through a series of rounds involving key
transformation, expansion permutation, and substitution, ultimately
producing ciphertext from plaintext. While DES has historical
significance, it’s crucial to consider more
secure encryption alternatives for modern data protection needs.
Frequently Asked Questions
Q.1: What should be considered as an alternative to DES
for data encryption?
Answer:
For modern data encryption needs, consider using stronger
encryption algorithms like AES (Advanced Encryption Standard).
Q.2: How is the 48-bit subkey generated for each round
in DES?
Answer:
The 48-bit subkey for each round in DES is derived from the 56-bit
key through a process of circular shifting and permutation, ensuring
key diversity.

You might also like