DES Algorithm

Data Encryption Standard Algorithm


The DES algorithm is based on Feistel ciper.


The Encryption Process Follows three stages:


Step 1


Given a 64-Bit Plaintext P, DES first applies a fixed initial permutation (IP) to P to obtain P0 = IP(P). Express Po = Lo Ro (L for left , R for right) where L0 is the first 32 bits of P0 and Ro is the last 32 bits of Po.


Step 2


Next it will follow a 16 rounds of Feistel Encryption


Li = Ri-1

Ri = Li-1 XOR f(Ri-1,Ki)


Ki referes to the 48bit key obtain from the key K and f is the Feistel Function.


It is ok that it sounds messy to you at this stage, we will look into it in the next post.


Step 3


Switch Left and RIght to obtain R16L16 then apply the inverse permutation to obtain the ciphertext c=IP-1(R16L16).


The initial and final permutation is called P-Boxes.

It is ok that you will ask me, what are you talking about!!??? Don't worry. I asked that question when I first come over it. I will explain it later. =)
2 Responses

  1. Natalia Says:

    I wanted to learn about this useful algorithm that serves as a base in a number of security techniques and tools to protect information. You have briefly explained the complete idea behind it.
    e-sign act


Post a Comment


  • Welcome

    Welcome to Encrypt IT.

    This is a site build to share my knowledge to the world. I might not be a professional but I am trying my best to spread the information I know.

    Please take note that as this is blogger. Newer Post will be shown First. Therefore, you have to scroll right to the bottom first post to be able to know what is going on.

    Have a nice day. Do click on the Ads to keep this site going. Thanks.

    Followers

  • Nuffnang Ads