SlideShare uma empresa Scribd logo
1 de 20
Baixar para ler offline
Computer Security
Prepared by: Assistant Prof. Eman Sanad
Faculty of computers and Artificial Intelligence
Cairo University 1
Lecture 6
• Feistel cipher
• DES
• DES encryption overview
• DES Round structure
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
2
Feistel cipher cont…
Example:
The fifteenth round of encryption, corresponding to the second round of
decryption. “prove that”
• Suppose that the blocks at each stage are 32 bits (two 16-bit halves)
• the key size is 24 bits.
• at the end of encryption round fourteen, the value of the intermediate
block (in hexadecimal) is DE7F03A6.
LE 14 = DE7F and RE 14 = 03A6.
• Also assume that the value of K 15 is 12DE52.
• After round 15, we have LE 15 = 03A6
RE 15 = F(03A6, 12DE52) ⊕ DE7F.
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
3
Feisel cipher cont…
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
4
Feisel cipher cont…
• assume that :
LD 1 = RE 15 , RD 1 = LE 15
• prove that:
LD 2 = RE 14 , RD 2 = LE 14
• start with:
LD 1 = F(03A6, 12DE52) ⊕ DE7F
RD 1 = 03A6
LD 2 = 03A6 = RE 14 ,
RD 2 = F(03A6, 12DE52) ⊕ [F(03A6, 12DE52) ⊕ DE7F]
= DE7F = LE14
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
5
Feisel cipher cont…
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
6
Data Encryption Standard (DES)
• Most widely used block cipher in world
• Adopted in 1977 by NBS (now NIST)
• Encrypts 64-bit data using 56-bit key
• Has widespread use
• has been considerable controversy over
its security
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
7
DES Encryption Overview
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
8
Initial Permutation IP
• first step of the data computation
• IP reorders the input data bits
• quite regular in structure (easy in h/w)
Example:
IP(675a6967 5e5a6b5a) = (ffb2194d 004df6fb)
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
9
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
10
Initial Permutation (IP)
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
11
DES Round Structure
• uses two 32-bit L & R halves
• As for any Feistel cipher can describe as:
L i = R i–1
R i = L i–1 ⊕ F(R i–1 , K i )
• F takes 32-bit R half and 48-bit subkey:
• expands R to 48-bits using perm E
• adds to subkey using XOR
• passes through 8 (S-boxes) to get 32-bit result
• finally permutes using 32-bit perm P
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
12
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
13
Single round of DES algorithm
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
14
8 S-Boxes
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
15
Substitution Boxes S
• have eight S-boxes which map 6 to 4 bits
o each S-box is actually 4 little 4 bit boxes
o outer bits 1 & 6 (row bits) select one row of 4
o inner bits 2-5 (col bits) are substituted
o result is 8 lots of 4 bits, or 32 bits
• row selection depends on both data & key
• feature known as autoclaving (autokeying)
Example:
S(18 09 12 3d 11 17 38 39) = 5fd25e03
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
16
Substitution Boxes S
Example:
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
17
Substitution Boxes S
• The S-boxes are the core of DES in
terms of cryptographic strength. They
are the only nonlinear element in the
algorithm and provide confusion.
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
18
Substitution Boxes S
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
19
Dr. Eman Sanad, faculty of computers and
Artificial Intelligence , Cairo University
20
Thank you

Mais conteúdo relacionado

Semelhante a lecture 6 DES part1.pdf

Introduction to cryptography part2-final
Introduction to cryptography  part2-finalIntroduction to cryptography  part2-final
Introduction to cryptography part2-finalTaymoor Nazmy
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...Cyber Security Alliance
 
cryptography and network security chap 3
cryptography and network security chap 3cryptography and network security chap 3
cryptography and network security chap 3Debanjan Bhattacharya
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptxCA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptxtrupeace
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystemSamdish Arora
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Ahmed Mohamed Mahmoud
 
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptxModule 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptxSridharCS7
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...Scality
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESijtsrd
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 

Semelhante a lecture 6 DES part1.pdf (20)

Introduction to cryptography part2-final
Introduction to cryptography  part2-finalIntroduction to cryptography  part2-final
Introduction to cryptography part2-final
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
1 DES.pdf
1 DES.pdf1 DES.pdf
1 DES.pdf
 
Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key CiphersCRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
CRYPTOGRAPHY & NETWOK SECURITY- Symmetric key Ciphers
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
App secforum2014 andrivet-cplusplus11-metaprogramming_applied_to_software_obf...
 
Cryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie BrownCryptography and Network Security William Stallings Lawrie Brown
Cryptography and Network Security William Stallings Lawrie Brown
 
cryptography and network security chap 3
cryptography and network security chap 3cryptography and network security chap 3
cryptography and network security chap 3
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptxCA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
CA-Lec4-RISCV-Instructions-1aaaaaaaaaa.pptx
 
Cryptography using rsa cryptosystem
Cryptography using rsa cryptosystemCryptography using rsa cryptosystem
Cryptography using rsa cryptosystem
 
Cyber security
Cyber securityCyber security
Cyber security
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptxModule 1-Block Ciphers and the Data Encryption Standard.pptx
Module 1-Block Ciphers and the Data Encryption Standard.pptx
 
QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...QuadIron An open source library for number theoretic transform-based erasure ...
QuadIron An open source library for number theoretic transform-based erasure ...
 
Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DESPerformance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
 
Class3
Class3Class3
Class3
 
block ciphers
block ciphersblock ciphers
block ciphers
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 

Último

Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...masabamasaba
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfkalichargn70th171
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyviewmasabamasaba
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...SelfMade bd
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024VictoriaMetrics
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Hararemasabamasaba
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Bert Jan Schrijver
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastPapp Krisztián
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension AidPhilip Schwarz
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benonimasabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is insideshinachiaurasa2
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park masabamasaba
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2
 

Último (20)

Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
Abortion Pills In Pretoria ](+27832195400*)[ 🏥 Women's Abortion Clinic In Pre...
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
%+27788225528 love spells in Boston Psychic Readings, Attraction spells,Bring...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdfPayment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
Payment Gateway Testing Simplified_ A Step-by-Step Guide for Beginners.pdf
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
Large-scale Logging Made Easy: Meetup at Deutsche Bank 2024
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 

lecture 6 DES part1.pdf

  • 1. Computer Security Prepared by: Assistant Prof. Eman Sanad Faculty of computers and Artificial Intelligence Cairo University 1
  • 2. Lecture 6 • Feistel cipher • DES • DES encryption overview • DES Round structure Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 2
  • 3. Feistel cipher cont… Example: The fifteenth round of encryption, corresponding to the second round of decryption. “prove that” • Suppose that the blocks at each stage are 32 bits (two 16-bit halves) • the key size is 24 bits. • at the end of encryption round fourteen, the value of the intermediate block (in hexadecimal) is DE7F03A6. LE 14 = DE7F and RE 14 = 03A6. • Also assume that the value of K 15 is 12DE52. • After round 15, we have LE 15 = 03A6 RE 15 = F(03A6, 12DE52) ⊕ DE7F. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 3
  • 4. Feisel cipher cont… Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 4
  • 5. Feisel cipher cont… • assume that : LD 1 = RE 15 , RD 1 = LE 15 • prove that: LD 2 = RE 14 , RD 2 = LE 14 • start with: LD 1 = F(03A6, 12DE52) ⊕ DE7F RD 1 = 03A6 LD 2 = 03A6 = RE 14 , RD 2 = F(03A6, 12DE52) ⊕ [F(03A6, 12DE52) ⊕ DE7F] = DE7F = LE14 Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 5
  • 6. Feisel cipher cont… Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 6
  • 7. Data Encryption Standard (DES) • Most widely used block cipher in world • Adopted in 1977 by NBS (now NIST) • Encrypts 64-bit data using 56-bit key • Has widespread use • has been considerable controversy over its security Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 7
  • 8. DES Encryption Overview Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 8
  • 9. Initial Permutation IP • first step of the data computation • IP reorders the input data bits • quite regular in structure (easy in h/w) Example: IP(675a6967 5e5a6b5a) = (ffb2194d 004df6fb) Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 9
  • 10. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 10
  • 11. Initial Permutation (IP) Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 11
  • 12. DES Round Structure • uses two 32-bit L & R halves • As for any Feistel cipher can describe as: L i = R i–1 R i = L i–1 ⊕ F(R i–1 , K i ) • F takes 32-bit R half and 48-bit subkey: • expands R to 48-bits using perm E • adds to subkey using XOR • passes through 8 (S-boxes) to get 32-bit result • finally permutes using 32-bit perm P Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 12
  • 13. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 13
  • 14. Single round of DES algorithm Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 14
  • 15. 8 S-Boxes Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 15
  • 16. Substitution Boxes S • have eight S-boxes which map 6 to 4 bits o each S-box is actually 4 little 4 bit boxes o outer bits 1 & 6 (row bits) select one row of 4 o inner bits 2-5 (col bits) are substituted o result is 8 lots of 4 bits, or 32 bits • row selection depends on both data & key • feature known as autoclaving (autokeying) Example: S(18 09 12 3d 11 17 38 39) = 5fd25e03 Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 16
  • 17. Substitution Boxes S Example: Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 17
  • 18. Substitution Boxes S • The S-boxes are the core of DES in terms of cryptographic strength. They are the only nonlinear element in the algorithm and provide confusion. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 18
  • 19. Substitution Boxes S Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 19
  • 20. Dr. Eman Sanad, faculty of computers and Artificial Intelligence , Cairo University 20 Thank you