SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Data Encryption Standard -
          DES
DES was developed as a standard for communications and data
 protection by an IBM research team, in response to a public
  request for proposals by the NBS - the National Bureau of
          Standards (which is now known as NIST).



                                    By:
                                    T.N.Srimanyu (12MCMB06)
                                    Ritika Singla (12MCMB15)
                                    M.Tech(IT)
DES - Basics

    DES uses the two basic techniques of cryptography -
    confusion and diffusion.

    At the simplest level, diffusion is achieved through
    numerous permutations and confusion is achieved
    through the XOR operation.
DES - The 16 Rounds

    The basic process in
    enciphering a 64-bit data block
    and a 56-bit key using the
    DES consists of:
    • An initial permutation (IP)
    • 16 rounds of a complex key
      dependent calculation f
    • A final permutation, being the
      inverse of IP
Triple DES - More Secure
IMPROVED DES ALGORITHM
  BASED ON IRRATIONAL
       NUMBERS

IEEE Int. Conference Neural Networks & Signal
 Processing
Zhenjiang, China, June 8~10, 2008
Irrational Numbers
 Irrational numbers, which are similar to data
sequences generated form chaotic system, are infinite and
 non-cyclic.
Therefore using irrational numbers to encrypt will provide
 higher security without strict chaos synchronization.
Advantages
 The improved scheme prevents the key from being
 directly involved in the production of sub-keys.
It can increase the randomness of the production of the
 sub-keys and use different sub-keys each group.
The key space is extended.
Conclusion
This paper designs an encryption algorithm with better
 security, bigger secret-key space and higher encrypting
 efficiency.
This scheme can expand the key space without any more
 running time and enhance the security of the encryption
 algorithm.
The algorithm has wider foreground applications based
 on these advantages.
Bibliography
www.ieeexplore.com
Thank You

 Any Queries?

Weitere ähnliche Inhalte

Was ist angesagt?

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
Uday Meena
 

Was ist angesagt? (20)

What is AES? Advanced Encryption Standards
What is AES? Advanced Encryption StandardsWhat is AES? Advanced Encryption Standards
What is AES? Advanced Encryption Standards
 
2. public key cryptography and RSA
2. public key cryptography and RSA2. public key cryptography and RSA
2. public key cryptography and RSA
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Encryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES AlgorithmEncryption And Decryption Using AES Algorithm
Encryption And Decryption Using AES Algorithm
 
Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
Trible data encryption standard (3DES)
Trible data encryption standard (3DES)Trible data encryption standard (3DES)
Trible data encryption standard (3DES)
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
Principles of public key cryptography and its Uses
Principles of  public key cryptography and its UsesPrinciples of  public key cryptography and its Uses
Principles of public key cryptography and its Uses
 
Unit 2
Unit 2Unit 2
Unit 2
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Idea(international data encryption algorithm)
Idea(international data encryption algorithm)Idea(international data encryption algorithm)
Idea(international data encryption algorithm)
 
Asymmetric Cryptography
Asymmetric CryptographyAsymmetric Cryptography
Asymmetric Cryptography
 
Cryptography and network security Nit701
Cryptography and network security Nit701Cryptography and network security Nit701
Cryptography and network security Nit701
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
Symmetric and asymmetric key
Symmetric and asymmetric keySymmetric and asymmetric key
Symmetric and asymmetric key
 

Andere mochten auch

Tema 5 criptografia y redes
Tema 5 criptografia y redesTema 5 criptografia y redes
Tema 5 criptografia y redes
Mariano Galvez
 
Criptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreCriptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libre
plinio.puello
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
Mecheko Sha
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
Sunil Kumar R
 

Andere mochten auch (20)

Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Tema 5 criptografia y redes
Tema 5 criptografia y redesTema 5 criptografia y redes
Tema 5 criptografia y redes
 
Criptografia
Criptografia Criptografia
Criptografia
 
Criptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreCriptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libre
 
Conceptos de Criptografía para Blockchains
Conceptos de Criptografía para BlockchainsConceptos de Criptografía para Blockchains
Conceptos de Criptografía para Blockchains
 
Criptografia
CriptografiaCriptografia
Criptografia
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Aes
AesAes
Aes
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Cryptography
CryptographyCryptography
Cryptography
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Aes
AesAes
Aes
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Ähnlich wie DES

DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
Ayanda Demilade
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
Ijcem Journal
 

Ähnlich wie DES (20)

Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
C010521418
C010521418C010521418
C010521418
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...A comparative study of symmetric key algorithm des, aes and blowfish for vide...
A comparative study of symmetric key algorithm des, aes and blowfish for vide...
 

DES

  • 1. Data Encryption Standard - DES DES was developed as a standard for communications and data protection by an IBM research team, in response to a public request for proposals by the NBS - the National Bureau of Standards (which is now known as NIST). By: T.N.Srimanyu (12MCMB06) Ritika Singla (12MCMB15) M.Tech(IT)
  • 2.
  • 3. DES - Basics  DES uses the two basic techniques of cryptography - confusion and diffusion.  At the simplest level, diffusion is achieved through numerous permutations and confusion is achieved through the XOR operation.
  • 4.
  • 5. DES - The 16 Rounds  The basic process in enciphering a 64-bit data block and a 56-bit key using the DES consists of: • An initial permutation (IP) • 16 rounds of a complex key dependent calculation f • A final permutation, being the inverse of IP
  • 6.
  • 7.
  • 8. Triple DES - More Secure
  • 9. IMPROVED DES ALGORITHM BASED ON IRRATIONAL NUMBERS IEEE Int. Conference Neural Networks & Signal Processing Zhenjiang, China, June 8~10, 2008
  • 10. Irrational Numbers  Irrational numbers, which are similar to data sequences generated form chaotic system, are infinite and non-cyclic. Therefore using irrational numbers to encrypt will provide higher security without strict chaos synchronization.
  • 11. Advantages  The improved scheme prevents the key from being directly involved in the production of sub-keys. It can increase the randomness of the production of the sub-keys and use different sub-keys each group. The key space is extended.
  • 12.
  • 13.
  • 14. Conclusion This paper designs an encryption algorithm with better security, bigger secret-key space and higher encrypting efficiency. This scheme can expand the key space without any more running time and enhance the security of the encryption algorithm. The algorithm has wider foreground applications based on these advantages.
  • 16. Thank You Any Queries?