Professional Documents
Culture Documents
Nomadic Computing (IT-416) : Assignment
Nomadic Computing (IT-416) : Assignment
(IT-416)
ASSIGNMENT
(function as check bits only). General Structure of DES is depicted in the following illustration −
Since DES is based on the Feistel Cipher, All that is required to specify DES is −
Round function
Key schedule
Any additional processing − Initial and final permutation
The initial and final permutations are straight Permutation boxes (P-boxes) that are inverses of each other. They have no
cryptography significance in DES. The initial and final permutations are shown as follows –
Round Function
The heart of this cipher is the DES function, f. The DES function applies a 48-bit key to the rightmost 32 bits to produce a 32-
bit output.
Expansion Permutation Box − Since right input is 32-bit and round key is a 48-bit, we first need to expand right input
to 48 bits.
XOR (Whitener). − After the expansion permutation, DES does XOR operation on the expanded right section and the
round key. The round key is used only in this operation.
Substitution Boxes. − The S-boxes carry out the real mixing (confusion). DES uses 8 S-boxes, each with a 6-bit input and
a 4-bit output. Refer the following illustration –
There are a total of eight S-box tables. The output of all eight s-boxes is then combined in to 32 bit section.
Straight Permutation − The 32 bit output of S-boxes is then subjected to the straight permutation with rule shown in
the following illustration:
Key Generation
The round-key generator creates sixteen 48-bit keys out of a 56-bit cipher key. The process of key generation is depicted in the
following illustration −
The logic for Parity drop, shifting, and Compression P-box is given in the DES description.
Before using 3TDES, user first generate and distribute a 3TDES key K, which consists of three different DES keys K1, K2 and K3.
This means that the actual 3TDES key has length 3×56 = 168 bits. The encryption scheme is illustrated as follows −
Q4. Explain AES (Advanced Encryption Standard) along with its operations.
Ans. The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced
Encryption Standard (AES). It is found at least six time faster than triple DES.
A replacement for DES was needed as its key size was too small. With increasing computing power, it was considered vulnerable
against exhaustive key search attack. Triple DES was designed to overcome this drawback but it was found slow.
The features of AES are as follows −
Operation of AES
AES is an iterative rather than Feistel cipher. It is based on ‘substitution–permutation network’. It comprises of a series of
linked operations, some of which involve replacing inputs by specific outputs (substitutions) and others involve shuffling bits
around (permutations).
Interestingly, AES performs all its computations on bytes rather than bits. Hence, AES treats the 128 bits of a plaintext block as
16 bytes. These 16 bytes are arranged in four columns and four rows for processing as a matrix −
Unlike DES, the number of rounds in AES is variable and depends on the length of the key. AES uses 10 rounds for 128-bit
keys, 12 rounds for 192-bit keys and 14 rounds for 256-bit keys. Each of these rounds uses a different 128-bit round key, which
is calculated from the original AES key.
The schematic of AES structure is given in the following illustration −
Encryption Process
Here, we restrict to description of a typical round of AES encryption. Each round comprise of four sub-processes. The first
round process is depicted below −
Decryption Process
The process of decryption of an AES ciphertext is similar to the encryption process in the reverse order. Each round consists of
the four processes conducted in the reverse order −