Data Encryption Standard (DES)
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
seminar class
Active In SP

Posts: 5,361
Joined: Feb 2011
22-02-2011, 11:47 AM

.ppt   crypto6.ppt (Size: 54 KB / Downloads: 125)
Data Encryption Standard (DES)
• Financial companies found the need for a cryptographic algorithm that would have the blessing of the US government (=NSA)
• First call for candidates in May 73, followed by a new call in August 74
• Not very many submissions (Why?)
– IBM submitted Lucifer
• NSA worked with IBM in redesigning the algorithm
• DES became a federal standard in November 76
– NBS (NIST) hardware standard in January 77
– ANSI X3.92-1981 (hardware + software)
– ANSI X3.106-1983 (modes of operation)
– Australia AS2805.5-1985
• Used in most EFT and EFTPOS from banking industry
– It was reconfirmed as a standard for 5 years twice
– Currently 3DES is recommended
• The standard is public, the design criteria is classified
• One of the biggest controversies is the key size (56 bits)
– W Diffie, M Hellman "Exhaustive Cryptanalysis of the NBS Data Encryption Standard" IEEE Computer 10(6), June 1977, pp74-84
– M Hellman "DES will be totally insecure within ten years" IEEE Spectrum 16(7), Jul 1979, pp 31-41
• Another controversy: is there a back door?
• DES has proven a well designed code
• 56 bits has been proven inadequate
– EFF built a cracker for around $200,000
– Increase the key to 112 bits?
• The best way known to cryptanalyze DES is (after brute force) the differential analysis
– NSA new this from the design??
• Uses Feistel principle
• Many similarities with Lucifer
• Improves on the S-Boxes
Simple DES
• 8 bits block with a 10 bits key
• The encryption process is :
– Initial Permutation
– Function fk1
– Switch of the key halves
– Function fk2
– Final Permutation (inverse of initial permutation)
• Key generation
– Initial permutation P10
– Divide in left and right parts
– Left shift and Merge
– An 8 bits permutation, resulting in a 8 bits K1
– Divide in left and right parts
– Double left shift and Merge
– An 8 bits permutation, resulting in a 8 bits K2
• Structure of S-P boxes
– S-Boxes
seminar flower
Super Moderator

Posts: 10,120
Joined: Apr 2012
25-08-2012, 11:42 AM

Data Encryption Standard - DES

.pptx   DES presentation.pptx (Size: 103.81 KB / Downloads: 29)

What is Encryption? And why needed?

A message in its original form (plaintext) is converted (encrypted) into an unintelligible form (cipher text) by a set of procedures known as an encryption algorithm (cipher) and a variable, called a key.
The cipher text is transformed (decrypted) back into plaintext using the encryption algorithm and a key.
Encryption has long been used by militaries and governments to facilitate secret communication. It is now commonly used in protecting information within many kinds of civilian systems. Just for example password protection.


DES is a system of encryption that takes a fixed-length string (64 bits) of plaintext bits and transforms it through a series of complicated operations into another cipher text of the same length (64 bits).
Its purpose is to provide a standard method for protecting sensitive commercial and unclassified data.
IBM created the first draft of the algorithm, calling it LUCIFER. DES officially became a federal standard in November of 1976.


for example I have the plain text “What is your name”
The hexadecimal conversion for this is "596F7572206C6970 732061726520736D 6F“ a total of 136 bits.
Now this is converted to a code that contains 64x bits number, this is done by adding that number of zeros.
Now each block of 64 bits block is separated such that we get x number of blocks and then each block is individually encrypted.
Here we 64*3=192. i.e. add 192-136=56 zeros.

DES Modes of Operation

The DES algorithm turns a 64-bit message block M into a 64-bit cipher block C. If each 64-bit block is encrypted individually, then the mode of encryption is called Electronic Code Book (ECB) mode. There are two other modes of DES encryption, namely Chain Block Coding (CBC) and Cipher Feedback (CFB), which make each cipher block dependent on all the previous messages blocks through an initial XOR operation.


Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  mobile data internetworking standards jaseelati 0 333 29-01-2015, 01:15 PM
Last Post: jaseelati
  cloud data protection for the masses project documentation jaseelati 0 335 21-01-2015, 04:19 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 424 06-01-2015, 04:47 PM
Last Post: jaseelati
  3d optical data storage technology seminar report jaseelati 0 338 30-12-2014, 03:23 PM
Last Post: jaseelati
  Towards Reliable Data Delivery for Highly Dynamic Mobile Ad Hoc Networks seminar ideas 11 3,978 02-04-2014, 12:50 PM
Last Post: Guest
  XML encryption full report computer science technology 7 6,674 24-03-2014, 02:31 PM
Last Post: seminar project topic
  Design of an Error Detection and Data Recovery Architecture for Motion Estimation seminar projects maker 0 768 30-09-2013, 04:40 PM
Last Post: seminar projects maker
  PERFORMANCE OF ADDRESS CODING WHEN APPLIED TO DATA STORAGE AND RETRIEVAL ppt seminar projects maker 0 440 28-09-2013, 03:18 PM
Last Post: seminar projects maker
  Controlled Data Hiding Technique for Color Image Authentication in Frequency pdf seminar projects maker 0 482 26-09-2013, 03:02 PM
Last Post: seminar projects maker
  DATA STRUCTURES USED IN NETWORK PROGRAMMING seminar projects maker 0 572 25-09-2013, 04:27 PM
Last Post: seminar projects maker