Professional Documents
Culture Documents
Part IV
Week 06. Security in Computing
Revision
• Understood the key-generation algorithm for SDES algorithm.
• Learnt about the encryption algorithm for the SDES algorithm.
Step 2. Perform LS1 (Left circular shift 1) on the 28-bit halves separately.
Step 3. Apply PC2 (Permutated choice table 2) to get a 48-bit key K1 (ROUND KEY 1) from the 56-bit key.
Converting the plain text HEX into their respective binary format,
A = 1010 E = 1110 C = 1100 C = 1100 B = 1011 A = 1010
0 = 0000 8 = 1000 5 = 0101 9 = 1001 5 = 0101 4 = 0100
C = 1100 6 = 0110 0 = 0000 8 = 1000
E (Ro) = 101000
001110
100000
001011
110011
111110
101000
001010
101000 001010
100001 110101
001001 111111
now, the value for the next round of DES is equal to (Ro, R1), which is,
(Ro, R1) = 0100 0111 0000 0101 1001 1111 0100 0101 0111 1110 0100 0011 1111 1000 0100 0010
=47059F457E43F842