Professional Documents
Culture Documents
DES and AES
DES and AES
DES and AES
Data encryption standard and advance encryption standard are also called block
cypher.
Encryption algorithms are divided into two categories based on the input type, as
a block cipher and stream cipher. Block cipher is an encryption algorithm that
takes a fixed size of input say b bits and produces a ciphertext of b bits again. If
the input is larger than b bits it can be divided further.
DES:
From the very beginning, DES also received criticism due to 56-bit
encryption being too short and a little insecure for modern applications.
However, it played an integral role in the advancement of cryptography.
In 1972, the National Bureau of Standards (US) felt the need for an
encryption standard to protect classified information. Around 1973, the
Atalla Corporation invented a hardware security module, the first of its
kind. It also boosted the need for an international encryption standard.
Step 1: Starts when the Initial Permutation function acquires the 64-bit
plain text.
Step 2: The plain text block goes through the Initial Permutation or IP.
Step 3: A successful IP produces two permuted half blocks. These two are
called LPT and RPT.
Step 4: This step takes 16 rounds of the encryption process. Both the LPT
and RPT go through this procedure. The encryption procedure consists of
five stages. These are-
S-box Permutation
Key Transformation
P-box Permutation
Expansion Permutation
XOR and Swapping
Step 5: The two half blocks (RPT and LPT) are combined again. The
newly merged block goes through a Final Permutation (FP) procedure.
When a comparatively less secure encryption can do the job, DES is a perfect
choice.
DES can generate random numbers.
Also, DES produces a Triple DES algorithm and uses three DES keys in the
procedure.
https://www.tutorialspoint.com/cryptography/data_encryption_standard.htm
AES:
Applications:
AES is widely used in many applications which require secure data
storage and transmission. Some common use cases include:
Wireless security: AES is used in securing wireless networks, such
as Wi-Fi networks, to ensure data confidentiality and prevent
unauthorized access.
Database Encryption: AES can be applied to encrypt sensitive data
stored in databases. This helps protect personal information, financial
records, and other confidential data from unauthorized access in case
of a data breach.
Secure communications: AES is widely used in protocols like such
as internet communications, email, instant messaging, and voice/video
calls.It ensures that the data remains confidential.
Data storage: AES is used to encrypt sensitive data stored on hard
drives, USB drives, and other storage media, protecting it from
unauthorized access in case of loss or theft.
Virtual Private Networks (VPNs): AES is commonly used in VPN
protocols to secure the communication between a user’s device and a
remote server. It ensures that data sent and received through the VPN
remains private and cannot be deciphered by eavesdroppers.
Secure Storage of Passwords: AES encryption is commonly
employed to store passwords securely. Instead of storing plaintext
passwords, the encrypted version is stored. This adds an extra layer
of security and protects user credentials in case of unauthorized
access to the storage.
File and Disk Encryption: AES is used to encrypt files and folders on
computers, external storage devices, and cloud storage. It protects
sensitive data stored on devices or during data transfer to prevent
unauthorized access.