SlideShare a Scribd company logo
Data Encryption Standard
Adri Jovin J J, M.Tech., Ph.D.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
Data Encryption Standard
• Issued in 1977 by National Institute of Standards and Technology
• Initially referred to as Data Encryption Algorithm
• Data encrypted in 64-bit blocks using 56-bit key
• Most dominant symmetric encryption algorithm, especially in financial applications till the introduction of AES
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2
DES Encryption
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
Single Round of DES Algorithm
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
Calculation of F(R,K)
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5
Avalanche Effect
A change in one bit of the plaintext or one bit of the key should produce a change in many bits of the
ciphertext.
Strength of DES
Use of 56-bit keys
• 256 possible keys≈ 7.2 × 1016
which makes brute-force attack impractical
Nature of DES Algorithm
• Design criteria for S-box is not made public
Timing Attacks
• DES is resistant to timing attacks
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6
Key Size (bits) Cipher No. of
alternative keys
Time required at 109
Decryptions/s
Time required at
1013 Decryptions/s
56 DES 256 ≈ 7.2 × 1016 255 ns = 1.125 years 1 hour
26 characters
(permutation)
Monoalphabetic 2! = 4 × 1026 2 × 1026 ns = 6.3 × 109 years 6.3 × 106 years
DES Modes of Operation
ECB – Electronic Code Block
CBC – Cipher Block Chaining
OFB – Output Feedback
CFB – Cipher Feedback
• ANSI banking standards specify ECB and CBC for encryption, and CBC and n-bit CFB for authentication
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7
Double DES
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8
Two encryption stages with two keys ⇒ key length=112
Encryption: C = E(K2, E(K1, P))
Decryption: P = D(K1, D(K2, C))
Triple DES with two keys
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
Triple DES with three keys
• Effective key-length is 168
• C = E(K3, D(K2, E(K1, P)))
• A number of internet-based applications like PGP, S/MIME etc. adopt three-key triple DES
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10
Variants of DES
DESX – RSA Data Security
CRYPT – Unix Systems
Block Cipher Design Principles
Number of Rounds
• The greater the number of rounds, the more difficult it is to perform cryptanalysis, even for a relatively weak F.
• The number of rounds is chosen so that known cryptanalytic efforts require greater effort than a simple brute-force
key search attack
Design of Function F
• F must be non-linear
• The more difficult it is to approximate F by a set of linear equations, the more nonlinear F is
• Strict avalanche criterion
• Bit independence criterion
Key Schedule Algorithm
• Select subkeys to maximize the difficulty of deducing individual subkeys and the difficulty of working back to the
main key
• The key schedule should guarantee key/ciphertext Strict Avalanche Criterion and Bit Independence Criterion
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
References
Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons.
Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India.
Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press.
UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12

More Related Content

PPTX
Introduction to Cryptography
Adri Jovin
 
PPTX
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
PPTX
Advanced Encryption System & Block Cipher Modes of Operations
Adri Jovin
 
PPTX
El Gamal Cryptosystem
Adri Jovin
 
PPTX
Elliptic Curve Cryptography
Adri Jovin
 
PPT
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
PDF
Unit 2_AES_AES_Structure_Encryption_Example.pdf
KanchanPatil34
 
PPT
Cryptography
IGZ Software house
 
Introduction to Cryptography
Adri Jovin
 
Classical cryptographic techniques, Feistel cipher structure
Adri Jovin
 
Advanced Encryption System & Block Cipher Modes of Operations
Adri Jovin
 
El Gamal Cryptosystem
Adri Jovin
 
Elliptic Curve Cryptography
Adri Jovin
 
DES (Data Encryption Standard) pressentation
sarhadisoftengg
 
Unit 2_AES_AES_Structure_Encryption_Example.pdf
KanchanPatil34
 
Cryptography
IGZ Software house
 

What's hot (20)

PPTX
Cryptography.ppt
Uday Meena
 
PPT
Cryptography
gueste4c97e
 
PPTX
Different types of Symmetric key Cryptography
subhradeep mitra
 
POTX
Stream Ciphers
SHUBHA CHATURVEDI
 
PPTX
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
PPT
Ch03 Ch06 Des And Others
nathanurag
 
PPTX
Cryptography
AnandKaGe
 
PPT
Cryptography Fundamentals
Duy Do Phan
 
PPTX
Cryptography and network security
patisa
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PDF
2. public key cryptography and RSA
Dr.Florence Dayana
 
PDF
AES Solved Example on Encryption all rounds.pdf
KanchanPatil34
 
PDF
Dna cryptography
Mayukh Maitra
 
PPTX
One Time Pad Encryption Technique
John Adams
 
PPTX
Cryptography - 101
n|u - The Open Security Community
 
PPT
Data encryption standard
Vasuki Ramasamy
 
PPT
PGP S/MIME
Sou Jana
 
PPTX
RSA Algorithm
Srinadh Muvva
 
DOCX
Unit 1 DVWA (Damn Vulnerable Web Application).docx
ChatanBawankar
 
Cryptography.ppt
Uday Meena
 
Cryptography
gueste4c97e
 
Different types of Symmetric key Cryptography
subhradeep mitra
 
Stream Ciphers
SHUBHA CHATURVEDI
 
Cryptography by Durlab Kumbhakar
Durlove Kumbhakar
 
Ch03 Ch06 Des And Others
nathanurag
 
Cryptography
AnandKaGe
 
Cryptography Fundamentals
Duy Do Phan
 
Cryptography and network security
patisa
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
2. public key cryptography and RSA
Dr.Florence Dayana
 
AES Solved Example on Encryption all rounds.pdf
KanchanPatil34
 
Dna cryptography
Mayukh Maitra
 
One Time Pad Encryption Technique
John Adams
 
Data encryption standard
Vasuki Ramasamy
 
PGP S/MIME
Sou Jana
 
RSA Algorithm
Srinadh Muvva
 
Unit 1 DVWA (Damn Vulnerable Web Application).docx
ChatanBawankar
 
Ad

Similar to Data Encryption Standard (20)

PPTX
CH02-CompSec4e.pptx
ams1ams11
 
PPTX
Slidecast - Workshop
Samant Khajuria
 
PPTX
Introduction to Network Security presentation
krishkiran2408
 
PPTX
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
ridozulfahmi1
 
PPTX
big data and Iot , its security part ,hoe yoy help this
warriorshanta
 
PPT
Cryptography and Network Security
Ramki M
 
PPTX
Cryptography notes for undergraduate kud
md4228787
 
PPTX
Security - ch3.pptx
HabtamuHaileMichael2
 
PDF
3 Basics of Cryptography Basics of Cryptography
MohammedMorhafJaely
 
PPT
BCS_PKI_part1.ppt
UskuMusku1
 
PPT
6. cryptography
7wounders
 
PPT
lec-04-Private-key encryption, message authentication.ppt
ssuser6c0026
 
PPT
Encryption
IGZ Software house
 
PPT
Block Cipher Stream Cipher DESUnit 3.ppt
SuryaBasnet3
 
PPTX
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
PPTX
encryption and decryption ,and its types
josereena1
 
PPTX
Data Encryption Standard (DES) and Alternatives.pptx
MohammedAljubairi
 
PPT
Elementry Cryptography
Tata Consultancy Services
 
PDF
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 
PPTX
Encryption techniques
MohitManna
 
CH02-CompSec4e.pptx
ams1ams11
 
Slidecast - Workshop
Samant Khajuria
 
Introduction to Network Security presentation
krishkiran2408
 
Ch02 NetSec5e Network Security Essential Chapter 2.pptx
ridozulfahmi1
 
big data and Iot , its security part ,hoe yoy help this
warriorshanta
 
Cryptography and Network Security
Ramki M
 
Cryptography notes for undergraduate kud
md4228787
 
Security - ch3.pptx
HabtamuHaileMichael2
 
3 Basics of Cryptography Basics of Cryptography
MohammedMorhafJaely
 
BCS_PKI_part1.ppt
UskuMusku1
 
6. cryptography
7wounders
 
lec-04-Private-key encryption, message authentication.ppt
ssuser6c0026
 
Encryption
IGZ Software house
 
Block Cipher Stream Cipher DESUnit 3.ppt
SuryaBasnet3
 
NS UNIT 1 Advanced Encryption Standard& RSA
AntonySuresh13
 
encryption and decryption ,and its types
josereena1
 
Data Encryption Standard (DES) and Alternatives.pptx
MohammedAljubairi
 
Elementry Cryptography
Tata Consultancy Services
 
CH2 Stallings,_William_Computer_Security_Principles_and_Practice_Pearson [54-...
ams1ams11
 
Encryption techniques
MohitManna
 
Ad

More from Adri Jovin (20)

PPTX
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
DOCX
Curriculum Vitae of Adri Jovin John Joseph
Adri Jovin
 
PPTX
Introduction to Relational Database Management Systems
Adri Jovin
 
PPTX
Introduction to ER Diagrams
Adri Jovin
 
PPTX
Introduction to Database Management Systems
Adri Jovin
 
PPTX
Neural Networks
Adri Jovin
 
PPTX
Introduction to Genetic Algorithm
Adri Jovin
 
PPTX
Introduction to Fuzzy logic
Adri Jovin
 
PPTX
Introduction to Artificial Neural Networks
Adri Jovin
 
PPTX
Introductory Session on Soft Computing
Adri Jovin
 
PPTX
Creative Commons
Adri Jovin
 
PPTX
Image based security
Adri Jovin
 
PPTX
Blockchain Technologies
Adri Jovin
 
PPTX
Introduction to Cybersecurity
Adri Jovin
 
PPTX
Heartbleed Bug: A case study
Adri Jovin
 
PPTX
Zoom: Privacy and Security - A case study
Adri Jovin
 
PPTX
Mathematical Foundations of Cryptography
Adri Jovin
 
PPTX
Security Models
Adri Jovin
 
PPTX
Introduction to blockchains
Adri Jovin
 
PPTX
Security tools
Adri Jovin
 
Heart Bleed Bug - A case study (Course: Cryptography and Network Security)
Adri Jovin
 
Curriculum Vitae of Adri Jovin John Joseph
Adri Jovin
 
Introduction to Relational Database Management Systems
Adri Jovin
 
Introduction to ER Diagrams
Adri Jovin
 
Introduction to Database Management Systems
Adri Jovin
 
Neural Networks
Adri Jovin
 
Introduction to Genetic Algorithm
Adri Jovin
 
Introduction to Fuzzy logic
Adri Jovin
 
Introduction to Artificial Neural Networks
Adri Jovin
 
Introductory Session on Soft Computing
Adri Jovin
 
Creative Commons
Adri Jovin
 
Image based security
Adri Jovin
 
Blockchain Technologies
Adri Jovin
 
Introduction to Cybersecurity
Adri Jovin
 
Heartbleed Bug: A case study
Adri Jovin
 
Zoom: Privacy and Security - A case study
Adri Jovin
 
Mathematical Foundations of Cryptography
Adri Jovin
 
Security Models
Adri Jovin
 
Introduction to blockchains
Adri Jovin
 
Security tools
Adri Jovin
 

Recently uploaded (20)

PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 

Data Encryption Standard

  • 1. Data Encryption Standard Adri Jovin J J, M.Tech., Ph.D. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY
  • 2. Data Encryption Standard • Issued in 1977 by National Institute of Standards and Technology • Initially referred to as Data Encryption Algorithm • Data encrypted in 64-bit blocks using 56-bit key • Most dominant symmetric encryption algorithm, especially in financial applications till the introduction of AES UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 2
  • 3. DES Encryption UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 3
  • 4. Single Round of DES Algorithm UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 4
  • 5. Calculation of F(R,K) UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 5 Avalanche Effect A change in one bit of the plaintext or one bit of the key should produce a change in many bits of the ciphertext.
  • 6. Strength of DES Use of 56-bit keys • 256 possible keys≈ 7.2 × 1016 which makes brute-force attack impractical Nature of DES Algorithm • Design criteria for S-box is not made public Timing Attacks • DES is resistant to timing attacks UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 6 Key Size (bits) Cipher No. of alternative keys Time required at 109 Decryptions/s Time required at 1013 Decryptions/s 56 DES 256 ≈ 7.2 × 1016 255 ns = 1.125 years 1 hour 26 characters (permutation) Monoalphabetic 2! = 4 × 1026 2 × 1026 ns = 6.3 × 109 years 6.3 × 106 years
  • 7. DES Modes of Operation ECB – Electronic Code Block CBC – Cipher Block Chaining OFB – Output Feedback CFB – Cipher Feedback • ANSI banking standards specify ECB and CBC for encryption, and CBC and n-bit CFB for authentication UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 7
  • 8. Double DES UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 8 Two encryption stages with two keys ⇒ key length=112 Encryption: C = E(K2, E(K1, P)) Decryption: P = D(K1, D(K2, C))
  • 9. Triple DES with two keys UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 9
  • 10. Triple DES with three keys • Effective key-length is 168 • C = E(K3, D(K2, E(K1, P))) • A number of internet-based applications like PGP, S/MIME etc. adopt three-key triple DES UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 10 Variants of DES DESX – RSA Data Security CRYPT – Unix Systems
  • 11. Block Cipher Design Principles Number of Rounds • The greater the number of rounds, the more difficult it is to perform cryptanalysis, even for a relatively weak F. • The number of rounds is chosen so that known cryptanalytic efforts require greater effort than a simple brute-force key search attack Design of Function F • F must be non-linear • The more difficult it is to approximate F by a set of linear equations, the more nonlinear F is • Strict avalanche criterion • Bit independence criterion Key Schedule Algorithm • Select subkeys to maximize the difficulty of deducing individual subkeys and the difficulty of working back to the main key • The key schedule should guarantee key/ciphertext Strict Avalanche Criterion and Bit Independence Criterion UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 11
  • 12. References Schneier, B. (2007). Applied cryptography: protocols, algorithms, and source code in C. John Wiley & Sons. Stallings, W. (2014). Cryptography and network security, 6/E. Pearson Education India. Katz, J., & Lindell, Y. (2014). Introduction to modern cryptography. CRC press. UITC203 CRYPTOGRAPHY AND NETWORK SECURITY 12