DES and AES

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Z DES & AES

Data encryption standard and advance encryption standard are also called block
cypher.
Encryption algorithms are divided into two categories based on the input type, as
a block cipher and stream cipher. Block cipher is an encryption algorithm that
takes a fixed size of input say b bits and produces a ciphertext of b bits again. If
the input is larger than b bits it can be divided further.

DES:

in cryptography”. The Data Encryption Standard, or DES, is an algorithm


for data encryption. It uses symmetric keys of 56-bit size.
The DES algorithm is an archetypal block cipher. It converts a plaintext
bit of fixed length into a ciphertext bit string, keeping its length
unchanged. The block size for DES is 64-bit.

From the very beginning, DES also received criticism due to 56-bit
encryption being too short and a little insecure for modern applications.
However, it played an integral role in the advancement of cryptography.

Various countries worldwide quickly adopted DES after IBM developed it


in the early 1970s.

In 1972, the National Bureau of Standards (US) felt the need for an
encryption standard to protect classified information. Around 1973, the
Atalla Corporation invented a hardware security module, the first of its
kind. It also boosted the need for an international encryption standard.

In 1974, IBM, a competitor to Atalla Corporation, proposed a cipher


named DES. The IBM developed DES on an earlier algorithm called Horst
Feistel’s Lucifer cipher. Horst Feistel, an IBM cryptographer, developed
the Lucifer cipher in 1971.

In 1976, DES became an encryption standard approved by the US


government, followed by its authorisation in 1977 to be used on all
unclassified data. DES received a reaffirmation as a standard in 1983,
1988, 1993 and 1999.

2002 AES or Advanced Encryption Standard ousted DES as the accepted


standard. In 2005, the NIST withdrew the DES algorithm and only
approved Triple DES until 2030 for sensitive government information.

Steps for Encryption

The encryption process consists of the steps discussed below:

Step 1: Starts when the Initial Permutation function acquires the 64-bit
plain text.

Step 2: The plain text block goes through the Initial Permutation or IP.

Step 3: A successful IP produces two permuted half blocks. These two are
called LPT and RPT.

Step 4: This step takes 16 rounds of the encryption process. Both the LPT
and RPT go through this procedure. The encryption procedure consists of
five stages. These are-

 S-box Permutation
 Key Transformation
 P-box Permutation
 Expansion Permutation
 XOR and Swapping
Step 5: The two half blocks (RPT and LPT) are combined again. The
newly merged block goes through a Final Permutation (FP) procedure.

Step 6: As a result, a 64-bit ciphertext is produced.


What Are the Practical Applications of the DES Algorithm?

The uses of the DES algorithm include:

 When a comparatively less secure encryption can do the job, DES is a perfect
choice.
 DES can generate random numbers.
 Also, DES produces a Triple DES algorithm and uses three DES keys in the
procedure.

https://www.tutorialspoint.com/cryptography/data_encryption_standard.htm

AES:

Aes and des both are symmetric encryption techniques.The


Advanced Encryption Standard (AES) is a symmetric block
cipher chosen by the U.S. government to protect classified
information. AES is implemented in software and hardware
throughout the world to encrypt sensitive data. It is essential
for government computer security, cybersecurity and
electronic data protection.
Advanced Encryption Standard (AES) is a specification for the encryption
of electronic data established by the U.S National Institute of Standards
and Technology (NIST) in 2001. AES is widely used today as it is a much
stronger than DES and triple DES despite being harder to implement.
Points to remember
 AES is a block cipher.
 The key size can be 128/192/256 bits.
 Encrypts data in blocks of 128 bits each.
That means it takes 128 bits as input and outputs 128 bits of encrypted
cipher text as output. AES relies on substitution-permutation network
principle which means it is performed using a series of linked operations
which involves replacing and shuffling of the input data.
Working of the cipher :
AES performs operations on bytes of data rather than in bits. Since the
block size is 128 bits, the cipher processes 128 bits (or 16 bytes) of the
input data at a time.
The number of rounds depends on the key length as follows :
 128 bit key – 10 rounds
 192 bit key – 12 rounds
 256 bit key – 14 rounds

Applications:
AES is widely used in many applications which require secure data
storage and transmission. Some common use cases include:
 Wireless security: AES is used in securing wireless networks, such
as Wi-Fi networks, to ensure data confidentiality and prevent
unauthorized access.
 Database Encryption: AES can be applied to encrypt sensitive data
stored in databases. This helps protect personal information, financial
records, and other confidential data from unauthorized access in case
of a data breach.
 Secure communications: AES is widely used in protocols like such
as internet communications, email, instant messaging, and voice/video
calls.It ensures that the data remains confidential.
 Data storage: AES is used to encrypt sensitive data stored on hard
drives, USB drives, and other storage media, protecting it from
unauthorized access in case of loss or theft.
 Virtual Private Networks (VPNs): AES is commonly used in VPN
protocols to secure the communication between a user’s device and a
remote server. It ensures that data sent and received through the VPN
remains private and cannot be deciphered by eavesdroppers.
 Secure Storage of Passwords: AES encryption is commonly
employed to store passwords securely. Instead of storing plaintext
passwords, the encrypted version is stored. This adds an extra layer
of security and protects user credentials in case of unauthorized
access to the storage.
 File and Disk Encryption: AES is used to encrypt files and folders on
computers, external storage devices, and cloud storage. It protects
sensitive data stored on devices or during data transfer to prevent
unauthorized access.

You might also like