DES Algorithm Network System Security 1 Objectives of Todays Lesson Quiz Private Key Cryptography Data Encryption Algorithm(DES) 3DES Security & Attacks Advantages & Disatvanges Activity
2 Private-Key Cryptography 3 4 History of DES
IBM develops Lucifer for banking systems (1970s ) NIST and NSA evaluate and modify Lucifer (1974)
Modified Lucifer adopted as federal standard (1976) Name changed to Data Encryption Standard (DES) Defined in FIPS (46-3) and ANSI standard X9.32
NIST defines Triple DES (3DES) (1999) Single DES use deprecated - only legacy systems.
NIST approves Advanced Encryption Std. (AES) (2001) AES which will replaces DES and 3DES. What is DES? DES - Data Encryption Standard Symmetric system - uses the same key to encrypt/decrypt data.
Ciphertext Plaintext DES Key Key Encrypt Decrypt DES Algorithm Structure The algorithm consists of: An initial permutation of the input data Sixteen rounds of the same process the DES round A final inverse initial permutation of the data Basic DES Algorithm Block length = 64 bits (L,R of 32 bits each.) Key Length = 56 bits (8 parity bits) 16 subkeys of 48 bits each are created for the 16 rounds F k 1 R 0 L 0 F k 2 R 1 L 1 F k r R r-1 L r-1 R 2 L 2 L r R r Triple DES Block length is same as DES but use 3 DES steps.
Key length = 168 bits Uses a 56 bit key for each of the 3 DES stages
Keys may be independent or related The keys k 1 , k 2 , and k 3 are independent. k 1 and k 2 are independent but k 1 = k 3
k 1 = k 2 = k 3
Mode of 3DES DES-EEE
DES-EDE C = E k3 (E k2 (E k1 (M))) C = E k3 (D k2 (E k1 (M))) Security and Attack Brute force: requires 2 55 attempts
attempts. Advantages It is easy to implement in both hardware and software compared to other algorithms. It is based on DES which is a very trusted cipher. DES has been studied thoroughly for over 25 years now and is proven to have sound basics though the key length is too small now. It is much faster than public key cryptography methods like the RSA method. This is one of the main advantages of using a system like 3DES. Disadvantages Newer algorithms like RC6 and Blowfish are much faster than 3DES since they were built much later and with performance as an objective. The transmission of the secret key between users is unsafe. This is where public key cryptography excels. The new AES standard has been specified so most systems would likely shift to that soon. Example of a Secure Audio/Video Based Remote Patient Monitoring System Using DES/3DES Activity http://intercom.virginia.edu/crypto/DE S_execution.html
CSC1720 Introduction to Internet All copyrights reserved by C.C. Cheung 2003. 14