plaintext plaintext ciphertext encryption algorithm decryption algorithm HI Mom S • Horst Feistel (IBM) invented the basic algorithm in 1973. • Feistel ciphers use symmetric block encryption relying upon product transformations. • Encryption & decryption use the same algorithm. block of plaintext Round 1 f subkey1 Round 2 f subkey2 + + •• • •• • •• • Round N f subkeyN + f some function + exclusive OR (bitwise) Key XYWJLRAM block of ciphertext DES Data Encryption Standard - an algorithm selected by the National Institute of Standards Technology for the encryption of non-classified data. The current DES algorithm was adopted by the U.S. Nat. Bureau of Standards in 1977. Block size: ____ bits Key size: ____ bits + 8-bit parity 16-round Feistel encryption (preceded by one permutation and followed by the permutation’s inverse) Subkeys The key (56-bits) is split in two and each half is rotated left by 1 or 2 bits. The resulting two 28-bit values index into a table to produce a 48-bit subkey. The rotated values are also forwarded to compute the next subkey. f function 1) input to f is expanded from 32 to 48 bits via table lookup 2) 48-bit value from (1) is XORed with subkey 3) 48-bit value from (2) is partitioned into eight 6-bit values 4) 6-bit values from (3) are separated into outside 2 bits and center 4 bits (outside bits select row and inside bits select column from S-box table) 5) eight S-box lookup values (each 4 bits long) are concatenated The DES cipher substitutes via eight different S-boxes; two are below. Brute Force Key Size (in bits) Number of Keys Time to Produce All Possible Encodings (1 encrypt./s) (106 encrypt./s) 32 232 ≈ 4.3 X 109 56 256 ≈ 7.2 X 1016 1142 years 128 2128 ≈ 3.4 X 1038 5.4 X 1024 years 5.4 X 1018 years 6.4 X 1012 years 6.4 X 106 years 26-char permutation 26! ≈ 4 X 1026 36 min. 2 msec. 10 hr. • 1977 - brute force attacks might be possible in the future [Diffie & Hellman IEEE Computer, June] • 1997 - a distributed collection of 3500 research computers discover DES key in ___ months • 1998 - Electronic Frontier Foundation builds ___________________________________. • 1999 - Net uses DES Cracker plus 100,000 PCs to crack DES in under ______________. REF: www.tropsoft.com/strongenc/des.htm ______ - 1979 • also called triple DES • use two keys and three DES encryptions cipher = Ekey1( Dkey2( Ekey1( plaintext ) ) ) • 3DES has an effective key size of 112 bits. ______ - 1991 • International Data Encryption Algorithm • developers from Swiss Federal Institute of Technology • 128-bit key, but differs from DES in round function and subkey generation. ___________ - 1993 • developed by Bruce Schneier • compact, efficient, algorithm w/ key of 128 bits ______ - 1994 • developed by Ron Rivest • efficient algorithm with variable length keys ______ - 1999 • Advanced Encryption Standard • selected algorithm: Rijndael • a product cipher using key sizes of 128, 192 and 256 bits (128-bit block size). Advantages • only one key to generate • relatively well-tested and established algorithms • cipher algorithms are efficient Disadvantages • potentially large number of keys number of communicators 2 3 4 5 6 n number of private keys • ______________________________ (How can this be accomplished securely?)
© Copyright 2026 Paperzz