[go: up one dir, main page]

0% found this document useful (0 votes)
34 views5 pages

Introduction To DES Algorithm

The Data Encryption Standard (DES) is a symmetric-key algorithm for encrypting digital information, developed in the 1970s and operating on 64-bit data blocks with a 56-bit key. It involves 16 rounds of substitution and permutation to transform plaintext into ciphertext, which can be decrypted using the same process. Despite its historical significance and efficiency, DES is considered outdated due to its short key length and vulnerability to brute-force attacks, leading to the adoption of stronger alternatives like AES.

Uploaded by

Pratibha Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views5 pages

Introduction To DES Algorithm

The Data Encryption Standard (DES) is a symmetric-key algorithm for encrypting digital information, developed in the 1970s and operating on 64-bit data blocks with a 56-bit key. It involves 16 rounds of substitution and permutation to transform plaintext into ciphertext, which can be decrypted using the same process. Despite its historical significance and efficiency, DES is considered outdated due to its short key length and vulnerability to brute-force attacks, leading to the adoption of stronger alternatives like AES.

Uploaded by

Pratibha Jadhav
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Introduction to

DES Algorithm
The Data Encryption Standard (DES) is a widely-used
symmetric-key algorithm for encrypting digital information. It
was developed in the 1970s by IBM and adopted as a federal
standard in the United States. DES is a block cipher that
operates on 64-bit data blocks using a 56-bit key.
DES Block Cipher Structure
Input Rounds Output

DES operates on 64-bit plaintext The algorithm performs 16 The final output is the 64-bit
blocks, dividing them into two rounds of a complex function ciphertext, which can be
32-bit halves. involving substitution and decrypted using the same
permutation to transform the process in reverse.
plaintext.
DES Key Generation
and Expansion
1 Key Input 2 Key Expansion
The DES algorithm uses The key is divided into
a 64-bit key, of which two 28-bit halves and
56 bits are actually undergoes a series of
used. shifts and permutations
to generate 16 48-bit
subkeys.

3 Subkey Generation
These subkeys are used in each of the 16 rounds of the
DES encryption/decryption process.
DES Modes of Operation
Electronic Cipher Block
Codebook (ECB) Chaining (CBC)
The simplest mode, where The ciphertext of one
each plaintext block is block is used to encrypt
encrypted independently. the next block, creating
dependencies.

Counter (CTR) Cipher Feedback (CFB)


The plaintext is XORed The ciphertext of one
with the output of the DES block is used as the input
function applied to a to encrypt the next block.
counter value.
Strengths and Weaknesses of DES
Strengths Weaknesses Alternatives
• Widely adopted and • Key length is considered Due to its shortcomings, DES has
thoroughly analyzed too short by modern been largely replaced by
• Provides a high level of • standards
Susceptible to brute-force stronger encryption algorithms
security for its time attacks due to the limited like AES (Advanced Encryption
key size for cryptanalytic Standard).
• Efficient and fast • Potential
encryption and decryption attacks due to the
algorithm's structure

You might also like