Professional Documents
Culture Documents
Type :- BLOCK
For encryption DES
For decryption DES with minor
• 64 bit data difference.
DATA block
Key length used key is 56bit.
• Apply Des
DES algorithm
• Encrypted
ENCRYPTE text 64bit
D DATA block.
Conceptual working of Des
• 64
Des key bitkey
• Discard
Discard every 8th
8th bit bit
• 56th bit
Des key key
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Discarded key
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48
49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
Substitution (Confusion)
Transpositions (diffusion)
Plain text is the simple text , information or msg to be send from sender to receiver.
Plain text may be very much confidential to user thus provide an encryption technique to provide
safety during transaction and storage format.
Step 2 Initial permutation.
Key Transformation
S-Box Substitution
P-box Substitution
56bit key
28bit 28bit
rounds 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
No of 1 2 1 1 1 2 1 2 1 2 1 1 1 1 1 1
bits
shifted
For each round different subset of the key is used that make not easy to
crack.
Here in each of the round the bits are shifted randomly.
Step 2 of 3 Expansion Permutation
Initial Permutation
32bit
16rounds 16rounds 1st block 2nd block 3rd block 4th block
4bit 4bit 4bit 4bit
Initial Permutation
5th block 6th block 7th block 8th block
32bit 32bit
Now we will talk about these 8 block of 4bit each in next slide.
These 4bit block are then expand to 6 bit block in a particular manner.
1 2 3 4 5 6 7 8 29 30 31 32
0
1
2
3
.
Key Transformation .
48bit key
56 bits 48 bits .
XOR .
Expansion .
48bit RPT after
permutation .
Rounds
32 bits 48 bits
.
44
45
46
47
0
0
1 6bit sbox1 4bit
1
2
6bit sbox2 4bit 2
3
3
. 6bit sbox3 4bit
.
. Input to p box
6bit sbox4 4bit .
. Permutation
.
.
6bit sbox5 4bit .
.
28
. 6bit sbox6 4bit
29
.
44
6bit sbox7 4bit 30
31
45 6bit sbox8 4bit
46
47
8 no of
Sbox
48bit 6bit
data block
1st bit 2nd bit 3rd bit 4th bit 5th bit 6th bit
b1 b2 b3 b4 b5 b6
b2 b3 b4 b5
S-box
output
Permutated using
P-box
Step 5 0f 3 XOR and Swap
16 Rounds
XOR
64 bit Block
Step5 Final Permutation.
64 bit Block
Final permutation
Random exchange of data
Final
permutation
64 bit Encrypted Block
Cipher text the text that is encrypted.
Though DES is later known as vulnerable which require the
revolution of des as double and Triple des but they were also fail
Step 6 cipher due to slow speed and more computation.
text Des algorithms are easily encode able with the help of cluster
computing.
However these algorithm can be used for decryption also by using
the same keys generated in the 16 rounds.
This presentation is heavily inspired by the book Information and
Thankyou… cyber security by Author Atul Kahate