Explain in des data encryption standard, Computer Network Security

Assignment Help:

Explain in DES Data Encryption Standard :DES stands for Data Encryption Standard and is explained as follows:

DES is at present the most widely used key cryptographic systems. DES can be implemented much efficiently in hardware rather than in software.

In this method/technique, DES first splits the original message into blocks of 64 bits. Each block of 6 bit plaintext is separately encrypted into the block of 64 bit cipher. DES makes use of a 56 bit secret key. There are nearly 19 stages in this algorithm out of which 16 stages are for the iteration of the message. This is shown in figure drawn below. The encryption process is reverse of the decryption. Every step in DES takes 64 bit input from preceding step and produces a 64 bit output for the next step.

The first step performs the initial transformation/permutation of 64 bit plaintext. The last step performs the transformation just in the reverse of the initial transformation.

The stage earlier than the last stage performs the 32 bits swap of the message encrypted in the 16 iterations. The working it is shown in the figure drawn below.

Each iteration splits the 64 bit text into 32 bit inputs and produces the two 32 bit outputs. The left output is straight a copy of the right input. The right output is the bitwise of the EXCLUSIVE OR of the left input and the function of right input and key for this phase Ki.

2282_DES_Basics.png

 Figure General Outline of DES

Figure Working of One Iteration

Before an algorithm  begins,  a  56  bit  transposition  is  applied  to  the  key.  The key is divided into two 28 bit units before iteration. These 28 bit units are rotated left by the number of bits depending upon the iteration number. Ki  is derived from this rotated key by applying another 56 bit transposition to it. A different 48 bit subset of 56 bit is extracted and permuted on each round of it.

DES Chaining is described below:

The DES works in the Electronic code book mode, this mode might give a chance to break the DES, if the structure of message is recognized by the intruder. This can be closed by chaining all the block ciphers. One way of chaining is known as “Cipher block chaining”.

In this method/technique, each plaintext block is EXCLUSIVE OR ed with the previous cipher text block before applying encryption. The first block is EXCLUSIVE OR ed with the randomly chosen Initialization Vector (IV) which is transmitted along the cipher text. The chaining of blocks is shown in figure drawn below EXCLUSIVE OR is denoted by #.

Encryption is explained below: 

The ciphertext of first block can be computed by using the, C0=E(P0 XOR IV) The ciphertext of the blocks remaining can be computed by using this formula,

C = E (Pi XOR Ci-1) 

Decryption is discussed below: 

The plaintext of text block in the decryption can be computed by the following formula 

P0=IV XOR D(C0) 

The plaintext of other blocks can be computed by using the following formula 

P1= P0 XOR D(C1) 

Cipher block chaining has the benefit that the same plaintext block will not result in the same ciphertext block.


Related Discussions:- Explain in des data encryption standard

CNSS, Assume that a security model is needed for the protection of informat...

Assume that a security model is needed for the protection of information in your class. Using the CNSS model, examine each of the cells and write a brief statement on how you would

Draw the waveform for an asynchronous transmission, QUESTION: (a) For ...

QUESTION: (a) For the bit stream 010011, sketch the waveforms for each of the code indicated. Assume that the signal level for a space in NRZ-L is positive; the signal level f

Computer security, Assume that the RSA problem is hard, prove that the RSA ...

Assume that the RSA problem is hard, prove that the RSA encryption is secure against IND- CPA. Provide a game between an adversary A and a simulator (or challenger) B.

Tcp- reliable transport service, TCP-RELIABLE TRANSPORT SERVICE INTRO...

TCP-RELIABLE TRANSPORT SERVICE INTRODUCTION:  TCP is the major transport protocol architecture in the TCP/IP suite. It uses unreliable datagram function offered by IP whe

What is information-information security, What is information Informatio...

What is information Information comprises the meanings and interpretations which people place upon the facts, or data. The value of information springs from the ways it can be i

Distinguish between authorization and authentication, Question : (a) D...

Question : (a) Distinguish between authorization and authentication. (b) SSO (Single Sign On) implies a user logs in once and can access resources for a defined period of

Techniques for combating spam mails, Techniques for combating Spam mails ...

Techniques for combating Spam mails Many anti spam products are commercially available in market. But it should also be noted that no  one technique is a complete solution to

Digital signature, A digital signature is a stamp on the data, which is uni...

A digital signature is a stamp on the data, which is unique and very hard to forge.  A digital signature has 2 steps and creates 2 things from the security perspective. STEP 1

Fragmentation and path mtu, FRAGMENTATION AND PATH MTU IPv6 source is ...

FRAGMENTATION AND PATH MTU IPv6 source is responsible for fragmentation. Routers simply drop datagrams bigger than network MTU. So source have to fragment datagram to arrive d

Parsing ipv6 headers, PARSING IPv6 HEADERS Base header is fixed in siz...

PARSING IPv6 HEADERS Base header is fixed in size i.e. 40 octets. NEXT HEADER field in the base header describe kind of header and it seems at end of fixed-size base header. S

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd