Data Encryption Standards
Data Encryption Standards
Thus, the discarding of every 8th bit of the key produces a 56-
bit key from the original 64-bit key
DES is based on the two fundamental attributes of cryptography:
substitution (also called confusion) and transposition (also called
diffusion).
DES consists of 16 steps, each of which is called a round. Each round
performs the steps of substitution and transposition.
steps in DES:
Steps in DES:
In the first step, the 64-bit plain text block is handed over to an initial
Permutation (IP) function.
The initial permutation is performed on plain text.
Next, the initial permutation (IP) produces two halves of the permuted
block; saying Left Plain Text (LPT) and Right Plain Text (RPT).
Now each LPT and RPT go through 16 rounds of the encryption process.
In the end, LPT and RPT are rejoined and a Final Permutation (FP) is
performed on the combined block
The result of this process produces 64-bit cipher text.
Initial Permutation (IP): As we have noted, the
initial permutation (IP) happens only once and it
happens before the first round.
Itsuggests how the transposition in IP should
proceed.
Ifthe IP replaces the first bit of the original plain text
block with the 58th bit of the original plain text, the
second bit with the 50th bit of the original plain text
block, and so on.
This is nothing but jugglery of bit positions of the
original plain text block. the same rule applies to all
the other bit positions
Round Function
The heart of this cipher is the DES function, f. The DES
function applies a 48-bit key to the rightmost 32 bits to
produce a 32-bit output.
Expansion Permutation Box − since right input is 32-bit and
round key is a 48-bit, we first need to expand right input to 48
bits. Permutation logic is graphically depicted in the following
illustration .
The graphically depicted permutation logic is generally described as table
in DES specification illustrated as shown −
XOR (Whitener). − After the expansion permutation, DES does XOR
operation on the expanded right section and the round key. The round key is
used only in this operation.
Substitution Boxes. − The S-boxes carry out the real mixing (confusion).
DES uses 8 S-boxes, each with a 6-bit input and a 4-bit output. Refer the
following illustration −
The S-box rule is illustrated below −
There are a total of eight S-box tables. The output of all eight s-boxes is
then combined in to 32 bit section.
Straight Permutation − The 32 bit output of S-boxes is then subjected to the
straight permutation with rule shown in the following illustration:
Key Generation
The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key.
The process of key generation is depicted in the following illustration −
Parity Drop the preprocess before key expansion is a compression transposition step
that we call parity bit drop. It drops the parity bits (bits 8, 16, 24, 32, …, 64) from the
64-bit key and permutes the rest of the bits according to Table 6.12. The remaining 56-
bit value is the actual cipher key which is used to generate round keys. The parity drop
step (a compression D-box) is shown in Table