Professional Documents
Culture Documents
The Basic Structure of DES Describe The Details of Building Elements of DES Describe The Round Keys Generation Process To Analyze DES Mode of Encryption in Modern Symmetric Key Ciphers
The Basic Structure of DES Describe The Details of Building Elements of DES Describe The Round Keys Generation Process To Analyze DES Mode of Encryption in Modern Symmetric Key Ciphers
S-box rule
DES Function…
The permutation for S-box 1
Straight Permutation
DES Analysis
Critics have used a strong magnifier to analyze DES. Tests have
been done to measure the strength of some desired properties
in a block cipher.
DES: Properties
• Two desired properties of a block cipher are the avalanche effect
and the completeness.
• Avalanche effect: It means a small change in plaintext/key should
create a significant change in the ciphertext. DES has been proved
to be strong with regard to this property.
• Completeness: It means that each bit in ciphertext needs to be
dependent on many bits on the plaintext. The P-boxes and S-
boxes show a very strong completeness effect.
DES: Properties…
• Avalanche effect:
39
DES Keys…
DES Keys…
Double encryption and decryption with a weak key
DES Keys…
DES Keys…
DES Keys…
A pair of semi-weak keys in encryption and decryption
DES Keys…
Possible weak key
DES Keys…
What is the probability of randomly selecting a weak, a semi-
weak, or a possible weak key?
DES has a key domain of 256. The total number of the above keys are
64 (4 + 12 + 48). The probability of choosing one of these keys is 8.8
× 10−16, almost impossible.
DES Keys…
Double DES
• It uses two keys K1 and K2.
• First, it performs DES on the plaintext P using the key K1.
D =(EK1(P))
• It again performs DES on D using the key K2.
C=EK2(D)=EK2(EK1(P)), P=DK1(EK2(C))
Double DES…
• No of possible keys is 22n=2112.
• Merkle & Hellman introduce the meet-in-the-middle attack,
which involves encryption from one end and decryption from the
other end and matching the result in the middle.
• This attack requires knowing some plaintext/ciphertext pairs.
Meet-in-the-middle attack on Double DES
Triple-DES with Three-Keys
Triple-DES with Two-Keys