block ciphers and the des

69
Network Security Block Ciphers and the DES 1

description

Cns 13f-lec05,06- block ciphers and the des

Transcript of block ciphers and the des

Page 1: block ciphers and the des

1

Network SecurityBlock Ciphers and the DES

Page 2: block ciphers and the des

2

Page 3: block ciphers and the des

3

Page 4: block ciphers and the des

4

Page 5: block ciphers and the des

5

Page 6: block ciphers and the des

6

Page 7: block ciphers and the des

7

Page 8: block ciphers and the des

8

Page 9: block ciphers and the des

9

Page 10: block ciphers and the des

10

Simplified DES

Page 11: block ciphers and the des

11

Simplified DES

Page 12: block ciphers and the des

12

Simplified DES

Page 13: block ciphers and the des

13

Page 14: block ciphers and the des

14

Page 15: block ciphers and the des

15

Page 16: block ciphers and the des

16

Page 17: block ciphers and the des

17

Page 18: block ciphers and the des

18

Page 19: block ciphers and the des

19

Page 20: block ciphers and the des

20

Page 21: block ciphers and the des

21

Page 22: block ciphers and the des

22

Page 23: block ciphers and the des

23

Page 24: block ciphers and the des

24

Page 25: block ciphers and the des

25

Page 26: block ciphers and the des

26

Page 27: block ciphers and the des

27

Page 28: block ciphers and the des

28

Page 29: block ciphers and the des

Feistel Cipher Structure

29

Page 30: block ciphers and the des

30

Page 31: block ciphers and the des

31

Page 32: block ciphers and the des

32

Page 33: block ciphers and the des

33

Page 34: block ciphers and the des

34

Page 35: block ciphers and the des

35

Page 36: block ciphers and the des

36

Page 37: block ciphers and the des

37

Page 38: block ciphers and the des

38

Page 39: block ciphers and the des

39

Page 40: block ciphers and the des

40

Page 41: block ciphers and the des

41

Page 42: block ciphers and the des

42

Page 43: block ciphers and the des

43

Page 44: block ciphers and the des

DES Encryption56 bit Key

44

Page 45: block ciphers and the des

45

Page 46: block ciphers and the des

46

Page 47: block ciphers and the des

DES: Single Round

47

Page 48: block ciphers and the des

48

Page 49: block ciphers and the des

49

Page 50: block ciphers and the des

50

Page 51: block ciphers and the des

51

Page 52: block ciphers and the des

DES Key Schedule

• Forms subkeys used in each round• Consists of:

– Initial permutation of the key (PC1) which selects 56-bits in two 28-bit halves

– 16 stages consisting of: • Selecting 24-bits from each half • Permuting them by PC2 for use in function f, • Rotating each half separately either 1 or 2 places

depending on the key rotation schedule K

52

Page 53: block ciphers and the des

53

Page 54: block ciphers and the des

54

Page 55: block ciphers and the des

55

Page 56: block ciphers and the des

56

Page 57: block ciphers and the des

57

Page 58: block ciphers and the des

58

Page 59: block ciphers and the des

59

Page 60: block ciphers and the des

60

Page 61: block ciphers and the des

61

Page 62: block ciphers and the des

62

Page 63: block ciphers and the des

63

Page 64: block ciphers and the des

64

Page 65: block ciphers and the des

65

Page 66: block ciphers and the des

66

Page 67: block ciphers and the des

67

Page 68: block ciphers and the des

68

Page 69: block ciphers and the des

69