Data Encryption Standard (DES)

Data Encryption Standard (DES)

INTRODUCTION

The Data Encryption Standard (DES) is a symmetric block cipher which takes the input of 64-bit plain text along with 64-bit key and process it, to generate the 64-bit ciphertext. DES was published by the National Institute of Standards and Technology (NIST).The data encryption standard is a common standard for data encryption and a form of secret key cryptography (SKC), which uses only one key for encryption and decryption.

In 1973, NIST published a request for proposals for a national symmetric-key cryptosystem. A proposal from IBM, a modification of a project called Lucifer, was accepted as DES. DES was published in the Federal Register in March 1975 as a draft of the Federal Information Processing Standard (FIPS).


WHAT IS DES?

►DES Use Symmetric system means both sender and receiver side we used same key for encryption and decryption.

►DES used 64 bits of block for encryption and decryption.

►Sixteen rounds of transposition and substitution are performed in order to achieve DES.

No alt text provided for this image

HOW DOES DES WORK ?

• DES is a symmetric block encryption algorithm.When 64-bit blocks of plaintext go in, 64-bit blocks of cipher text come out.

• It is also a symmetric algorithm, meaning the same key is used for encryption and decryption.

• It uses a 64-bit key: 56 bits make up the true key, and 8 bits are used for parity.

• When the DES algorithm is applied to data, it divides the message into blocks and operates on them one at a time.

• The blocks are put through 16 rounds of transposition and substitution functions.The result is 64-bit blocks of ciphertext.

No alt text provided for this image

DES MODES

• Block ciphers have several modes of operation. Each mode specifies how a block cipher will operate.

• Electronic Code Book (ECB)

• Cipher Block Chaining (CBC)

• Cipher Feedback (CFB)

• Output Feedback (OFB)

• Counter Mode (CTR)

ELECTRONIC CODE BOOK MODE

• It Inherit core functionality from their parent block which is Symmetric System.

• Like 64 bits of block use for encryption and decryption.

• Use Same key for encryption and decryption of all blocks of data.

CIPHER BLOCK CHAINING MODE

• Cipher Block Chaining (CBC) does not reveal a pattern, because each block of text, the key, and the value based on the previous blocks.

• This results in more random ciphertext.

• This provides dependence between the blocks, in a sense chaining them together.

CIPHER FEEDBACK MODE (CFB)

• The CBC mode is great to use when you need to send large chunks of data at a time but when the need of send small amount of data at a time we use CFB.

• Cipher Feedback is the combination of block cipher and stream cipher.

OUTPUT FEEDBACK MODE

• It Cover the weakness of Cipher feedback mode.

• Almost Same process of encryption and decryption.

COUNTER MODE (CTR)

• There is no chaining involved in Counter Mode (CTR) like other three types.

I. Cipher block Chaining.

II. Cipher Feedback.

III. Output Feeback.

• Each block is individually decrypted without depending on other blocks.

• the encryption of the individual blocks can happen in parallel, which increases the

performance.

To view or add a comment, sign in

More articles by Yarava Gopi

  • Docker

    What is Docker? Docker is a software platform for building applications based on containers—small and lightweight…

Explore content categories