Professional Documents
Culture Documents
Part 6
Part 6
1
Objective
• Upon the completion of this session, the learner will be able to
Understand the DES algorithm and its working
Understand the strength and weakness of DES algorithm
• Summary
• Reference
DES algorithm
• The Data Encryption Standard (DES) is a symmetric-key block cipher.
• created in the early 1970s by an IBM team and adopted by the
National Institute of Standards and Technology (NIST)
• In this 64 bit plain text converted to 64 bit cipher text, using
56 bit key.
32 bit swap
Permutation
XOR Ci Di
Li Ri
Strength of DES
a. The use of 56-bit keys: 56-bit key is used in encryption, there are
256 possible keys. A brute force attack on such number of keys is
impractical.
b. The nature of algorithm: Cryptanalyst can perform cryptanalysis by
exploiting the characteristic of DES algorithm but no one has
succeeded in finding out the weakness.
Weakness of DES
a. Two chosen input to an S-box can create the same output.
b. The purpose of initial and final permutation is not clear.
Summary
• In this students understand about the
DES algorithm and its working
Strength and weakness of DES
References
• MichaelE.WhitmanandHerbertJ.Mattord.
(2012).PrinciplesofInformationSecurity,2ndEd.,T homson, CengageDelmarLearning.
• WilliamStalling.
(2012).NetworkSecurityEssentials:ApplicationsandStandards,4thEd.,Pear
sonEducation.
• BehrouzA.Forouzan,DebdeepMukhopadhyay.
(2011).CryptographyandNetworkSecur ity,2ndEd., SpecialIndianEdition,
TataMcGraw-Hill.