Code360 powered by Coding Ninjas X Naukri.com. Code360 powered by Coding Ninjas X Naukri.com
Table of contents
1.
Introduction
2.
Working of Data Encryption Standard
3.
Initial and Final Permutation
4.
Round Function
5.
Key Generation
6.
Analysis of Data Encryption Standard
7.
Frequently Asked Questions
7.1.
How many iterations are there in DES Algorithm?
7.2.
What is the key length of the Data Encryption Standard Algorithm?
7.3.
What is the size of the initial permutation matrix?
7.4.
What is the size of the round key in the DES algorithm?
7.5.
What is the size of round input in the DES algorithm?
8.
Conclusion
Last Updated: Mar 27, 2024

Data Encryption Standard

Author Prachi Singh
1 upvote
Leveraging ChatGPT - GenAI as a Microsoft Data Expert
Speaker
Prerita Agarwal
Data Specialist @
23 Jul, 2024 @ 01:30 PM

Introduction

Data Encryption Standard, abbreviated as DES, is a block cipher and a symmetric cipher, i.e., the same key is used for encryption and decryption.

Data Encryption Standard

The entire Data Encryption Standard procedure marks the input as a 64-bit plain text block and output as a 64-bit ciphertext. The key length of DES is 56 Bits. 

The four steps for the Data Encryption standard are as follows:

  1. Initial Permutation
  2. 16 Feistel Rounds
  3. Swapping
  4. Final Permutation(also known as inverse initial permutation) 

Working of Data Encryption Standard

working

The same cycle works when there is a need to produce a 56-bit key.

cycle

Removal of every eighth bit

The specifications required for data encryption standard are as follows:

  1. Additional Processes: Initial and Final Permutation
  2. Round Function
  3. Scheduled Key
Get the tech career you deserve, faster!
Connect with our expert counsellors to understand how to hack your way to success
User rating 4.7/5
1:1 doubt support
95% placement record
Akash Pal
Senior Software Engineer
326% Hike After Job Bootcamp
Himanshu Gusain
Programmer Analyst
32 LPA After Job Bootcamp
After Job
Bootcamp

Initial and Final Permutation

Initial and Final Permutation works like the inverse of each other with the depiction of Permutation Boxes(also known as P- Boxes). They do not have any cryptographic significance in Data Encryption Standard.

Round Function

The entire performance of Data Encryption Standard as Cipher Feistel is based on the Round Function. The function signifies producing a 32-bit output with the application of a 48-bit key to the rightmost 32 bits.

Round Function

1. Expansion Permutation Box: As the right input only consists of 32-bit and the round key consists of 48 bits, there is a need to expand the right input from 32 bits to 48 bits. The graphical representation of permutation logic in the Data Encryption Standard specification is below:

permutation

2. XOR: Data Encryption Standard performs XOR operation between the expanded right input and the round key. This is the only step that involves the usage of the round key.

3. S-Boxes: The S-Boxes deal with the real mess. Data Encryption Standard uses 8 S-Boxes, consisting of 6-Bit input and a 4-Bit output.

4. Straight Permutation: The 32-bit output obtained from the 8 S-boxes traverses through the straight permutation based on the following depiction:

Straight Permutation

Key Generation

The key generator produces 48-bit keys from 56-bit cipher key. The Data Encryption Standard includes Compression P-Box, Parity drop, and shifting logic.

Analysis of Data Encryption Standard

Analysis

The Data Encryption Standard customizes the satisfaction of both the properties of the block cipher. The properties are described as

  1. Complete Structure: Ciphertext consists of transforming many bits of plain text.
  2. Avalanche Effect: Single change in plain text results in a drastic change in Cipher Text.
     

During the last few years, cryptanalysis has discovered some flaws in DES when the keys used are weak ones. These keys are should be avoided.

DES has proven to be an exceptionally well-designed block cypher. Except for an exhaustive key search, there have been no notable cryptanalytic attacks on DES.

Frequently Asked Questions

How many iterations are there in DES Algorithm?

There are 16 iterations in Data Encryption Standard Algorithm.

What is the key length of the Data Encryption Standard Algorithm?

The key length of the Data Encryption Algorithm is 64 Bits.

What is the size of the initial permutation matrix?

The size of the initial permutation matrix is 8*8.

What is the size of the round key in the DES algorithm?

The size of the round key in the DES algorithm is 48 bits.

What is the size of round input in the DES algorithm?

The size of round input in the DES algorithm is 32 bits.

Conclusion

Congratulations on finishing the blog!! After reading this blog, you will grasp the concept of the Data Encryption Standard.

Refer to our Guided Path on Coding Ninjas Studio to upskill yourself in Data Structures and AlgorithmsCompetitive ProgrammingJavaScriptSystem Design, and many more! If you want to test your competency in coding, you may check out the mock test series and participate in the contests hosted on Coding Ninjas Studio! Nevertheless, you may consider our paid courses to give your career an edge over others!
Happy learning!

Live masterclass