SlideShare a Scribd company logo
DATA ENCRYPTION
STANDARD (DES)
MUHAMMAD HARIS AHMED
M.HARIS@STU.SMIU.EDU.PK
12CS45
SYMMETRIC SYSTEMS
• Several types of symmetric algorithms are used
today. They have different methods of
providing encryption and decryption
functionality
• The one thing they all have in common is that
they are symmetric algorithms, meaning the
sender and receiver are using two instances of
the same key
SYMMETRIC ALGORITHMS
• Data Encryption Standard (DES)
• 3DES (Triple DES)
• Blowfish
• Twofish
• IDEA (International Data Encryption Algorithm)
• RC4, RC5, RC6
• AES (Advanced Encryption Standard)
• SAFER (Secure and Fast Encryption Routine
DES FIRST BREAK!
• In 1998, the Electronic Frontier Foundation
built a computer system for $250,000 that
broke DES in three days by using a brute force
attack against the keyspace
DES FIRST BREAK!
• It contained 1,536 microprocessors running at
40MHz, which performed 60 million test
decryptions per second per chip
WHAT IS DES?
DES Use Symmetric system means both sender
and receiver side we used same key for
encryption and decryption.
WHAT IS DES?
DES used 64 bits of block for encryption and
decryption.
 Sixteen rounds of transposition and
substitution are performed in order to achieve
DES.
DES ADVANCEMENT CYCLE
HOW DOES DES WORK ?
• DES is a symmetric block encryption algorithm.
When 64-bit blocks of plaintext go in, 64-bit
blocks of cipher text come out.
• It is also a symmetric algorithm, meaning the
same key is used for encryption and
decryption.
• It uses a 64-bit key: 56 bits make up the true
key, and 8 bits are used for parity.
HOW DOES DES WORK ? ….
• When the DES algorithm is applied to data, it
divides the message into blocks and operates
on them one at a time.
• The blocks are put through 16 rounds of
transposition and substitution functions.
• The result is 64-bit blocks of ciphertext.
DES MODES
• Block ciphers have several modes of operation.
Each mode specifies how a block cipher will
operate.
DES MODES
• Electronic Code Book (ECB)
• Cipher Block Chaining (CBC)
• Cipher Feedback (CFB)
• Output Feedback (OFB)
• Counter Mode (CTR)
• It Inherit core functionality from their parent
block which is Symmetric System.
• Like 64 bits of block use for encryption and
decryption.
• Use Same key for encryption and decryption of
all blocks of data.
ELECTRONIC CODE BOOK MODE
ELECTRONIC CODE BOOK MODE
• User for the Small amount of text not for large
amount of data.
• Reason
• Same block of plain text and key generate same
cypher text each time
• Easy to find Pattern with large amount of data
ELECTRONIC CODE BOOK MODE
ELECTRONIC CODE BOOK MODE
ECB mode operates like a code book. A 64-
bit data block is entered into the algorithm
with a key, and a block of ciphertext is
produced
For a given block of plaintext and a given
key, the same block of ciphertext is always
produced
ECB is the easiest and fastest mode to use,
but as we will see, it has its dangers
ELECTRONIC CODE BOOK
MODE…
•So, two bad things can happen here:
• An attacker could uncover the key and
thus have the key to decrypt all the
blocks of data, or
• An attacker could gather the ciphertext
and plaintext of each block and build
the code book that was used, without
needing the key.
CIPHER BLOCK CHAINING MODE
• Cipher Block Chaining (CBC) does not reveal a
pattern, because each block of text, the key,
and the value based on the previous blocks.
• This results in more random ciphertext
• This provides dependence between the blocks,
in a sense chaining them together
CIPHER BLOCK CHAINING MODE
CIPHER BLOCK CHAINING MODE
• This chaining effect means that a particular
ciphertext block is dependent upon all blocks
before it, not just the previous block.
• When we encrypt our very first block using
CBC, we do not have a previous block of
ciphertext
• If we do not add a piece of randomness when
encrypting this first block to save from
hackers.
• So, The solution is to use Initialization Vector
that generate randomness in first block.
CIPHER BLOCK CHAINING MODE
CIPHER FEEDBACK MODE (CFB)
• The CBC mode is great to use when you need
to send large chunks of data at a time but
when the need of send small amount of data at
a time we use CFB.
• Cipher Feedback is the combination of block
cipher and stream cipher.
CIPHER FEEDBACK MODE (CFB)
• Keep One copy of Cipher text.
DIFFERENCE BETWEEN CFB &
CBC
• Major Difference between both of them is CBC
works with 64 bits of data only but CFB also
work with 8 bits or so on.
DIFFERENCE BETWEEN CFB &
CBC
OUTPUT FEEDBACK MODE
• It Cover the weakness of Cipher feedback
mode.
• Almost Same process of encryption and
decryption.
OUTPUT FEEDBACK MODE
• It’s similar to the Cipher Block Chaining Mode
but there is one minor changing in it.
DIFFERENCE IN OFB & CFB
COUNTER MODE (CTR)
• There is no chaining involved in Counter Mode
(CTR) like other three types.
I. Cipher block Chaining.
II. Cipher Feedback.
III. Output Feeback.
COUNTER MODE (CTR)
• Each block is individually decrypted without
depending on other blocks.
• the encryption of the individual blocks can
happen in parallel, which increases the
performance.
COUNTER MODE (CTR)
• No use of initialization Vector instead it use
counter.
THANK YOU

More Related Content

What's hot (20)

PPTX
Cryptography and Information Security
Dr Naim R Kidwai
 
PPTX
Principles of public key cryptography and its Uses
Mohsin Ali
 
PPTX
Product Cipher
SHUBHA CHATURVEDI
 
PPT
Data encryption standard
Vasuki Ramasamy
 
PPTX
RSA Algorithm
Srinadh Muvva
 
PPTX
Cryptography
Sidharth Mohapatra
 
PDF
symmetric key encryption algorithms
Rashmi Burugupalli
 
PPT
Diffie-hellman algorithm
Computer_ at_home
 
PPTX
Confusion and Diffusion.pptx
bcanawakadalcollege
 
PPTX
Substitution techniques
vinitha96
 
PPTX
Cryptography
Shivanand Arur
 
PPT
Email Security : PGP & SMIME
Rohit Soni
 
PPTX
Intro to modern cryptography
zahid-mian
 
PPT
Network security cryptographic hash function
Mijanur Rahman Milon
 
PDF
Classical encryption techniques
Dr.Florence Dayana
 
PDF
RSA ALGORITHM
Dr. Shashank Shetty
 
PPTX
Cryptographic algorithms
Anamika Singh
 
PPTX
Information and network security 13 playfair cipher
Vaibhav Khanna
 
PPTX
Transposition cipher techniques
SHUBHA CHATURVEDI
 
PDF
Asymmetric Cryptography
UTD Computer Security Group
 
Cryptography and Information Security
Dr Naim R Kidwai
 
Principles of public key cryptography and its Uses
Mohsin Ali
 
Product Cipher
SHUBHA CHATURVEDI
 
Data encryption standard
Vasuki Ramasamy
 
RSA Algorithm
Srinadh Muvva
 
Cryptography
Sidharth Mohapatra
 
symmetric key encryption algorithms
Rashmi Burugupalli
 
Diffie-hellman algorithm
Computer_ at_home
 
Confusion and Diffusion.pptx
bcanawakadalcollege
 
Substitution techniques
vinitha96
 
Cryptography
Shivanand Arur
 
Email Security : PGP & SMIME
Rohit Soni
 
Intro to modern cryptography
zahid-mian
 
Network security cryptographic hash function
Mijanur Rahman Milon
 
Classical encryption techniques
Dr.Florence Dayana
 
RSA ALGORITHM
Dr. Shashank Shetty
 
Cryptographic algorithms
Anamika Singh
 
Information and network security 13 playfair cipher
Vaibhav Khanna
 
Transposition cipher techniques
SHUBHA CHATURVEDI
 
Asymmetric Cryptography
UTD Computer Security Group
 

Viewers also liked (20)

PPTX
Aes (advance encryption standard)
Sina Manavi
 
PPT
Tema 5 criptografia y redes
Mariano Galvez
 
PDF
Criptografia
Cesar Cuamatzi
 
PDF
Criptografia: Conceptos básicos e implementación con software libre
plinio.puello
 
PDF
Conceptos de Criptografía para Blockchains
Jorge Zaccaro
 
PDF
Criptografia
Alex Miguel
 
PPTX
Cryptography & Steganography
Animesh Shaw
 
PPT
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
PPTX
OSI Security Architecture
university of education,Lahore
 
PPT
Classical Encryption Techniques
university of education,Lahore
 
PPTX
02 introduction to network security
Joe McCarthy
 
PPT
Types of attacks and threads
srivijaymanickam
 
PPT
Network Security 1st Lecture
babak danyal
 
PPT
block ciphers
Asad Ali
 
PPT
Classical Encryption Techniques in Network Security
babak danyal
 
PPTX
Computer security threats & prevention
PriSim
 
PPSX
5 Cryptography Part1
Alfred Ouyang
 
PPTX
Different types of attacks in internet
Rohan Bharadwaj
 
PPT
Network Attacks
SecurityTube.Net
 
Aes (advance encryption standard)
Sina Manavi
 
Tema 5 criptografia y redes
Mariano Galvez
 
Criptografia
Cesar Cuamatzi
 
Criptografia: Conceptos básicos e implementación con software libre
plinio.puello
 
Conceptos de Criptografía para Blockchains
Jorge Zaccaro
 
Criptografia
Alex Miguel
 
Cryptography & Steganography
Animesh Shaw
 
Chapter 3: Block Ciphers and the Data Encryption Standard
Shafaan Khaliq Bhatti
 
OSI Security Architecture
university of education,Lahore
 
Classical Encryption Techniques
university of education,Lahore
 
02 introduction to network security
Joe McCarthy
 
Types of attacks and threads
srivijaymanickam
 
Network Security 1st Lecture
babak danyal
 
block ciphers
Asad Ali
 
Classical Encryption Techniques in Network Security
babak danyal
 
Computer security threats & prevention
PriSim
 
5 Cryptography Part1
Alfred Ouyang
 
Different types of attacks in internet
Rohan Bharadwaj
 
Network Attacks
SecurityTube.Net
 
Ad

Similar to Data Encryption Standard (DES) (20)

PPTX
Cryptography and Network Security-MOD_3.pptx
MrsPrajnaUR
 
PPT
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
PDF
2018 FRSecure CISSP Mentor Program- Session 5
FRSecure
 
PPTX
Cipher Block Operations Presentation Slide.
adaiki2023
 
PPTX
Information and data security block cipher operation
Mazin Alwaaly
 
PPTX
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
PPTX
Modes of Operation
Showkot Usman
 
PDF
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
PPTX
12_2019_12_03!04_59_50_PM symmetric.pptx
abduganiyevbekzod011
 
PPTX
Slidecast - Workshop
Samant Khajuria
 
PDF
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
PPTX
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
Simplilearn
 
PDF
CNIT 141: 4. Block Ciphers
Sam Bowne
 
PPTX
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
PDF
Unit 1_Transposition Techniques_Ciphers.pdf
KanchanPatil34
 
PPTX
Cryptography - 4.pptx 1st compli. B
AnumAshraf18
 
PPTX
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
PPT
NIS block cipher modes network and information security
shindetukaram7068
 
PDF
Block cipher modes of operations
AkashRanjandas1
 
Cryptography and Network Security-MOD_3.pptx
MrsPrajnaUR
 
Block Ciphers Modes of Operation
Shafaan Khaliq Bhatti
 
2018 FRSecure CISSP Mentor Program- Session 5
FRSecure
 
Cipher Block Operations Presentation Slide.
adaiki2023
 
Information and data security block cipher operation
Mazin Alwaaly
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
ssuserd5e356
 
Modes of Operation
Showkot Usman
 
CNIT 125 Ch 4. Security Engineering (Part 2)
Sam Bowne
 
12_2019_12_03!04_59_50_PM symmetric.pptx
abduganiyevbekzod011
 
Slidecast - Workshop
Samant Khajuria
 
THE UNIFIED OPERATION STRUCTURE FOR SYMMETRIC-KEY ALGORITHM
cscpconf
 
Block Cipher Modes Of Operation | Computer Networking and Security | Simplilearn
Simplilearn
 
CNIT 141: 4. Block Ciphers
Sam Bowne
 
CISSP Certification Security Engineering-Part2
Hamed Moghaddam
 
Unit 1_Transposition Techniques_Ciphers.pdf
KanchanPatil34
 
Cryptography - 4.pptx 1st compli. B
AnumAshraf18
 
Block Cipher and Operation Modes
SHUBHA CHATURVEDI
 
NIS block cipher modes network and information security
shindetukaram7068
 
Block cipher modes of operations
AkashRanjandas1
 
Ad

Recently uploaded (20)

PDF
Protecting the Digital World Cyber Securit
dnthakkar16
 
PPTX
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
PDF
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
PDF
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
PDF
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
PDF
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
PPTX
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
PPTX
Farrell__10e_ch04_PowerPoint.pptx Programming Logic and Design slides
bashnahara11
 
PDF
Infrastructure planning and resilience - Keith Hastings.pptx.pdf
Safe Software
 
PDF
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
PDF
SAP GUI Installation Guide for Windows | Step-by-Step Setup for SAP Access
SAP Vista, an A L T Z E N Company
 
PDF
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
PDF
AI Image Enhancer: Revolutionizing Visual Quality”
docmasoom
 
PDF
System Center 2025 vs. 2022; What’s new, what’s next_PDF.pdf
Q-Advise
 
PPTX
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
PPTX
Presentation about Database and Database Administrator
abhishekchauhan86963
 
PDF
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
PPTX
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
PDF
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
PPTX
Presentation about variables and constant.pptx
kr2589474
 
Protecting the Digital World Cyber Securit
dnthakkar16
 
Contractor Management Platform and Software Solution for Compliance
SHEQ Network Limited
 
New Download FL Studio Crack Full Version [Latest 2025]
imang66g
 
Balancing Resource Capacity and Workloads with OnePlan – Avoid Overloading Te...
OnePlan Solutions
 
AWS_Agentic_AI_in_Indian_BFSI_A_Strategic_Blueprint_for_Customer.pdf
siddharthnetsavvies
 
New Download MiniTool Partition Wizard Crack Latest Version 2025
imang66g
 
slidesgo-unlocking-the-code-the-dynamic-dance-of-variables-and-constants-2024...
kr2589474
 
Farrell__10e_ch04_PowerPoint.pptx Programming Logic and Design slides
bashnahara11
 
Infrastructure planning and resilience - Keith Hastings.pptx.pdf
Safe Software
 
MiniTool Power Data Recovery Crack New Pre Activated Version Latest 2025
imang66g
 
SAP GUI Installation Guide for Windows | Step-by-Step Setup for SAP Access
SAP Vista, an A L T Z E N Company
 
Summary Of Odoo 18.1 to 18.4 : The Way For Odoo 19
CandidRoot Solutions Private Limited
 
AI Image Enhancer: Revolutionizing Visual Quality”
docmasoom
 
System Center 2025 vs. 2022; What’s new, what’s next_PDF.pdf
Q-Advise
 
Web Testing.pptx528278vshbuqffqhhqiwnwuq
studylike474
 
Presentation about Database and Database Administrator
abhishekchauhan86963
 
10 posting ideas for community engagement with AI prompts
Pankaj Taneja
 
ASSIGNMENT_1[1][1][1][1][1] (1) variables.pptx
kr2589474
 
Enhancing Healthcare RPM Platforms with Contextual AI Integration
Cadabra Studio
 
Presentation about variables and constant.pptx
kr2589474
 

Data Encryption Standard (DES)

  • 2. SYMMETRIC SYSTEMS • Several types of symmetric algorithms are used today. They have different methods of providing encryption and decryption functionality • The one thing they all have in common is that they are symmetric algorithms, meaning the sender and receiver are using two instances of the same key
  • 3. SYMMETRIC ALGORITHMS • Data Encryption Standard (DES) • 3DES (Triple DES) • Blowfish • Twofish • IDEA (International Data Encryption Algorithm) • RC4, RC5, RC6 • AES (Advanced Encryption Standard) • SAFER (Secure and Fast Encryption Routine
  • 4. DES FIRST BREAK! • In 1998, the Electronic Frontier Foundation built a computer system for $250,000 that broke DES in three days by using a brute force attack against the keyspace
  • 5. DES FIRST BREAK! • It contained 1,536 microprocessors running at 40MHz, which performed 60 million test decryptions per second per chip
  • 6. WHAT IS DES? DES Use Symmetric system means both sender and receiver side we used same key for encryption and decryption.
  • 7. WHAT IS DES? DES used 64 bits of block for encryption and decryption.  Sixteen rounds of transposition and substitution are performed in order to achieve DES.
  • 9. HOW DOES DES WORK ? • DES is a symmetric block encryption algorithm. When 64-bit blocks of plaintext go in, 64-bit blocks of cipher text come out. • It is also a symmetric algorithm, meaning the same key is used for encryption and decryption. • It uses a 64-bit key: 56 bits make up the true key, and 8 bits are used for parity.
  • 10. HOW DOES DES WORK ? …. • When the DES algorithm is applied to data, it divides the message into blocks and operates on them one at a time. • The blocks are put through 16 rounds of transposition and substitution functions. • The result is 64-bit blocks of ciphertext.
  • 11. DES MODES • Block ciphers have several modes of operation. Each mode specifies how a block cipher will operate.
  • 12. DES MODES • Electronic Code Book (ECB) • Cipher Block Chaining (CBC) • Cipher Feedback (CFB) • Output Feedback (OFB) • Counter Mode (CTR)
  • 13. • It Inherit core functionality from their parent block which is Symmetric System. • Like 64 bits of block use for encryption and decryption. • Use Same key for encryption and decryption of all blocks of data. ELECTRONIC CODE BOOK MODE
  • 15. • User for the Small amount of text not for large amount of data. • Reason • Same block of plain text and key generate same cypher text each time • Easy to find Pattern with large amount of data ELECTRONIC CODE BOOK MODE
  • 16. ELECTRONIC CODE BOOK MODE ECB mode operates like a code book. A 64- bit data block is entered into the algorithm with a key, and a block of ciphertext is produced For a given block of plaintext and a given key, the same block of ciphertext is always produced ECB is the easiest and fastest mode to use, but as we will see, it has its dangers
  • 17. ELECTRONIC CODE BOOK MODE… •So, two bad things can happen here: • An attacker could uncover the key and thus have the key to decrypt all the blocks of data, or • An attacker could gather the ciphertext and plaintext of each block and build the code book that was used, without needing the key.
  • 18. CIPHER BLOCK CHAINING MODE • Cipher Block Chaining (CBC) does not reveal a pattern, because each block of text, the key, and the value based on the previous blocks. • This results in more random ciphertext • This provides dependence between the blocks, in a sense chaining them together
  • 20. CIPHER BLOCK CHAINING MODE • This chaining effect means that a particular ciphertext block is dependent upon all blocks before it, not just the previous block. • When we encrypt our very first block using CBC, we do not have a previous block of ciphertext • If we do not add a piece of randomness when encrypting this first block to save from hackers.
  • 21. • So, The solution is to use Initialization Vector that generate randomness in first block. CIPHER BLOCK CHAINING MODE
  • 22. CIPHER FEEDBACK MODE (CFB) • The CBC mode is great to use when you need to send large chunks of data at a time but when the need of send small amount of data at a time we use CFB. • Cipher Feedback is the combination of block cipher and stream cipher.
  • 23. CIPHER FEEDBACK MODE (CFB) • Keep One copy of Cipher text.
  • 24. DIFFERENCE BETWEEN CFB & CBC • Major Difference between both of them is CBC works with 64 bits of data only but CFB also work with 8 bits or so on.
  • 26. OUTPUT FEEDBACK MODE • It Cover the weakness of Cipher feedback mode. • Almost Same process of encryption and decryption.
  • 27. OUTPUT FEEDBACK MODE • It’s similar to the Cipher Block Chaining Mode but there is one minor changing in it.
  • 29. COUNTER MODE (CTR) • There is no chaining involved in Counter Mode (CTR) like other three types. I. Cipher block Chaining. II. Cipher Feedback. III. Output Feeback.
  • 30. COUNTER MODE (CTR) • Each block is individually decrypted without depending on other blocks. • the encryption of the individual blocks can happen in parallel, which increases the performance.
  • 31. COUNTER MODE (CTR) • No use of initialization Vector instead it use counter.