The DES algorithm

42 downloads 4539 Views 2MB Size Report
S-DES* process flow. Credit to Cryptography and Network Security,. Principles and Practice, William Stallings,. Prentice Hall, 1999 for figure and precision of.
The DES algorithm (Data Encryption Standard) a conventional (i.e., 1-key) substitution cipher represented by a simplified example

David Morgan

S-DES* process flow *simplified version of the DES algorithm for tutorial purposes, by Edward Schaefer, Santa Clara University

Credit to Cryptography and Network Security, Principles and Practice, William Stallings, Prentice Hall, 1999 for figure and precision of explanation.

1

S-DES encryption component process flow

Credit to Cryptography and Network Security, Principles and Practice, William Stallings, Prentice Hall, 1999 for figures and precision of explanation.

ENCRYPT

Following slide images are screenshots from an exercise at http://homepage.smc.edu/morgan_david/vpn/assignments/assgt-sdes.htm

2

Initial permutation IP 0 1 1 0 1 1 0 1 1 1 1 0 0 1 1 0

expansion/permutaion E/P

3

XOR with subkey K1

...etc

s-box substitutions

4

Permutation P4

XOR

5

left-nibble replacement

Swap SW

6

expansion/permutaion E/P

XOR with subkey K2

7

s-box substitutions

Permutation P4

8

XOR

left-nibble replacement

9

Inverse initial permutation IP-1

DECRYPT

10

Initial permutation IP

expansion/permutaion E/P

11

XOR with subkey K2

...etc

s-box substitutions

12

Permutation P4

XOR

13

left-nibble replacement

Swap SW

14

expansion/permutaion E/P

XOR with subkey K1

15

s-box substitutions

Permutation P4

16

XOR

left-nibble replacement

17

Inverse initial permutation IP-1

Matches original input, decrypt succeeded

18

Suggest Documents