Professional Documents
Culture Documents
Data Encryption Standard
Data Encryption Standard
Data Encryption
26/08/2013
• Federal Information Processing Standard (FIPS)
2
DES Numerology
• DES is a Feistel cipher
• 64 bit block length
26/08/2013
• 56 bit key length (+8 bits parity check of each byte)
• 16 rounds
3
DES
26/08/2013
• These permutations are inverses of each other and operate
5
One Round of DES
26/08/2013
• Duplicating half of the bits.
7
Expansion Permutation - The E-box
26/08/2013
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
26/08/2013
• S-box number 1
26/08/2013
Reema Patel, M.Tech-I, ICS-2013
• What is the output if input is 101000?
• Row=10=2 Column=0100=4
13
• Please refer William Stallings for all 8 S-Box
Properties of the S-Box
• There are several properties
• The rows are permutations
26/08/2013
• The inputs are a non-linear combination of the inputs
• Change one bit of the input, and half of the output bits
14
One Round of DES
26/08/2013
16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
16
Key schedule of DES
• 16 nos. of 48-bit subkeys—
one for each round —are
26/08/2013
derived from the main key
using the key schedule
26/08/2013
• 56 bit DES key, 0,1,2,…,55
26/08/2013
• Let LK = (LK circular shift left by ri)
• Let RK = (RK circular shift left by ri)
26/08/2013
Reema Patel, M.Tech-I, ICS-2013
• Bits 8,17,21,24 of LK omitted each round
• Bits 6,9,14,25 of RK omitted each round
20
• Key schedule generates subkey
One Round of DES
26/08/2013
• Halves are swapped after last round.
23
Exercise
• Prove that decryption in DES can be done by applying the
encryption algorithm to the ciphertext, with the key
26/08/2013
schedule reversed.
26/08/2013
• Four out of the 256 keys are weak keys
26/08/2013
• For example, for the first weak key, all the round keys are 0.
• The second key leads to half 0s, and half 1s.
26/08/2013
• There are six key pairs that are called semi weak keys.
28
Semi weak keys
26/08/2013
Reema Patel, M.Tech-I, ICS-2013
30
Multiple DES
• The major criticism against DES is the key length.
26/08/2013
• So, we may try cascading several DES applications.
26/08/2013
• The total key size is 56x2=112 bits.
32
Meet in the middle attack
26/08/2013
• He notes the key pair (K1,K2)
26/08/2013
• The first and third stages use K1 as key.