Sie sind auf Seite 1von 14

DES

The Data Encryption Standard


DES Algorithm
Network System Security 1
Objectives of Todays Lesson
Quiz
Private Key Cryptography
Data Encryption Algorithm(DES)
3DES
Security & Attacks
Advantages & Disatvanges
Activity



2
Private-Key Cryptography
3
4
History of DES

IBM develops Lucifer for banking systems (1970s )
NIST and NSA evaluate and modify Lucifer (1974)

Modified Lucifer adopted as federal standard (1976)
Name changed to Data Encryption Standard (DES)
Defined in FIPS (46-3) and ANSI standard X9.32

NIST defines Triple DES (3DES) (1999)
Single DES use deprecated - only legacy systems.

NIST approves Advanced Encryption Std. (AES) (2001)
AES which will replaces DES and 3DES.
What is DES?
DES - Data Encryption Standard
Symmetric system - uses the same key to
encrypt/decrypt data.

Ciphertext Plaintext DES
Key
Key
Encrypt
Decrypt
DES Algorithm Structure
The algorithm consists of:
An initial permutation of
the input data
Sixteen rounds of the same
process the DES round
A final inverse initial
permutation of the data
Basic DES Algorithm
Block length = 64 bits (L,R of 32 bits each.)
Key Length = 56 bits (8 parity bits)
16 subkeys of 48 bits each are created for the 16
rounds
F
k
1
R
0
L
0
F
k
2
R
1
L
1
F
k
r
R
r-1
L
r-1
R
2
L
2
L
r
R
r
Triple DES
Block length is same as DES but use 3 DES steps.

Key length = 168 bits
Uses a 56 bit key for each of the 3 DES stages

Keys may be independent or related
The keys k
1
, k
2
, and k
3
are independent.
k
1
and k
2
are independent but k
1
= k
3

k
1
= k
2
= k
3


Mode of 3DES
DES-EEE


DES-EDE
C = E
k3
(E
k2
(E
k1
(M)))
C = E
k3
(D
k2
(E
k1
(M)))
Security and Attack
Brute force: requires 2
55
attempts

Differential Cryptanalysis: requires
2
47
attempts

Linear Cryptanalysis: requires 2
43

attempts.
Advantages
It is easy to implement in both hardware and software
compared to other algorithms.
It is based on DES which is a very trusted cipher. DES
has been studied thoroughly for over 25 years now
and is proven to have sound basics though the key
length is too small now.
It is much faster than public key cryptography
methods like the RSA method. This is one of the main
advantages of using a system like 3DES.
Disadvantages
Newer algorithms like RC6 and Blowfish are much
faster than 3DES since they were built much later and
with performance as an objective.
The transmission of the secret key between users is
unsafe. This is where public key cryptography excels.
The new AES standard has been specified so most
systems would likely shift to that soon.
Example of a Secure Audio/Video Based Remote Patient
Monitoring System Using DES/3DES
Activity
http://intercom.virginia.edu/crypto/DE
S_execution.html

CSC1720 Introduction to Internet All copyrights reserved by C.C. Cheung 2003. 14

Das könnte Ihnen auch gefallen