SlideShare une entreprise Scribd logo
1  sur  16
Data Encryption Standard -
          DES
DES was developed as a standard for communications and data
 protection by an IBM research team, in response to a public
  request for proposals by the NBS - the National Bureau of
          Standards (which is now known as NIST).



                                    By:
                                    T.N.Srimanyu (12MCMB06)
                                    Ritika Singla (12MCMB15)
                                    M.Tech(IT)
DES - Basics

    DES uses the two basic techniques of cryptography -
    confusion and diffusion.

    At the simplest level, diffusion is achieved through
    numerous permutations and confusion is achieved
    through the XOR operation.
DES - The 16 Rounds

    The basic process in
    enciphering a 64-bit data block
    and a 56-bit key using the
    DES consists of:
    • An initial permutation (IP)
    • 16 rounds of a complex key
      dependent calculation f
    • A final permutation, being the
      inverse of IP
Triple DES - More Secure
IMPROVED DES ALGORITHM
  BASED ON IRRATIONAL
       NUMBERS

IEEE Int. Conference Neural Networks & Signal
 Processing
Zhenjiang, China, June 8~10, 2008
Irrational Numbers
 Irrational numbers, which are similar to data
sequences generated form chaotic system, are infinite and
 non-cyclic.
Therefore using irrational numbers to encrypt will provide
 higher security without strict chaos synchronization.
Advantages
 The improved scheme prevents the key from being
 directly involved in the production of sub-keys.
It can increase the randomness of the production of the
 sub-keys and use different sub-keys each group.
The key space is extended.
Conclusion
This paper designs an encryption algorithm with better
 security, bigger secret-key space and higher encrypting
 efficiency.
This scheme can expand the key space without any more
 running time and enhance the security of the encryption
 algorithm.
The algorithm has wider foreground applications based
 on these advantages.
Bibliography
www.ieeexplore.com
Thank You

 Any Queries?

Contenu connexe

Tendances (20)

Cryptography.ppt
Cryptography.pptCryptography.ppt
Cryptography.ppt
 
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITYCRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Symmetric encryption
Symmetric encryptionSymmetric encryption
Symmetric encryption
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Block Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption StandardBlock Ciphers and the Data Encryption Standard
Block Ciphers and the Data Encryption Standard
 
RSA ALGORITHM
RSA ALGORITHMRSA ALGORITHM
RSA ALGORITHM
 
Public Key Cryptosystem
Public Key CryptosystemPublic Key Cryptosystem
Public Key Cryptosystem
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Hash Function
Hash Function Hash Function
Hash Function
 
5. message authentication and hash function
5. message authentication and hash function5. message authentication and hash function
5. message authentication and hash function
 
Web Security
Web SecurityWeb Security
Web Security
 
Advanced encryption standard (aes)
Advanced encryption standard (aes)Advanced encryption standard (aes)
Advanced encryption standard (aes)
 
CRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITYCRYPTOGRAPHY & NETWORK SECURITY
CRYPTOGRAPHY & NETWORK SECURITY
 
2. Stream Ciphers
2. Stream Ciphers2. Stream Ciphers
2. Stream Ciphers
 
Introduction to Cryptography
Introduction to CryptographyIntroduction to Cryptography
Introduction to Cryptography
 
overview of cryptographic techniques
overview of cryptographic techniquesoverview of cryptographic techniques
overview of cryptographic techniques
 
Cryptography and Information Security
Cryptography and Information SecurityCryptography and Information Security
Cryptography and Information Security
 

En vedette

Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of OperationRoman Oliynykov
 
Tema 5 criptografia y redes
Tema 5 criptografia y redesTema 5 criptografia y redes
Tema 5 criptografia y redesMariano Galvez
 
Criptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreCriptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreplinio.puello
 
Conceptos de Criptografía para Blockchains
Conceptos de Criptografía para BlockchainsConceptos de Criptografía para Blockchains
Conceptos de Criptografía para BlockchainsJorge Zaccaro
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & SteganographyAnimesh Shaw
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1Alfred Ouyang
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)Mecheko Sha
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Amir Masinaei
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 

En vedette (20)

Block Ciphers Modes of Operation
Block Ciphers Modes of OperationBlock Ciphers Modes of Operation
Block Ciphers Modes of Operation
 
Tema 5 criptografia y redes
Tema 5 criptografia y redesTema 5 criptografia y redes
Tema 5 criptografia y redes
 
Criptografia
Criptografia Criptografia
Criptografia
 
Criptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libreCriptografia: Conceptos básicos e implementación con software libre
Criptografia: Conceptos básicos e implementación con software libre
 
Conceptos de Criptografía para Blockchains
Conceptos de Criptografía para BlockchainsConceptos de Criptografía para Blockchains
Conceptos de Criptografía para Blockchains
 
Criptografia
CriptografiaCriptografia
Criptografia
 
Cryptography & Steganography
Cryptography & SteganographyCryptography & Steganography
Cryptography & Steganography
 
5 Cryptography Part1
5 Cryptography Part15 Cryptography Part1
5 Cryptography Part1
 
Digital Signature
Digital SignatureDigital Signature
Digital Signature
 
Data encryption standard (des)
Data encryption standard  (des)Data encryption standard  (des)
Data encryption standard (des)
 
Aes
AesAes
Aes
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
Cryptography
CryptographyCryptography
Cryptography
 
AES Cryptosystem
AES CryptosystemAES Cryptosystem
AES Cryptosystem
 
Aes
AesAes
Aes
 
Digital signature
Digital signatureDigital signature
Digital signature
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Digital signature
Digital signatureDigital signature
Digital signature
 

Similaire à DES

Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption StandardAmirul Wiramuda
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) ijceronline
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm076TalathUnNabiAnik
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithmpaperpublications3
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Hardik Manocha
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and AuthenticityHardik Manocha
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption TechniqueSajedul Karim
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryptionSachin Tripathi
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREAyanda Demilade
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6FRSecure
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography cscpconf
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfDhamuKing1
 

Similaire à DES (20)

Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER) International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Implementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption AlgorithmImplementation of DES encryption and decryption Algorithm
Implementation of DES encryption and decryption Algorithm
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
C010521418
C010521418C010521418
C010521418
 
Seminar on Encryption and Authenticity
Seminar on Encryption and AuthenticitySeminar on Encryption and Authenticity
Seminar on Encryption and Authenticity
 
A new DNA Encryption Technique
A new DNA Encryption TechniqueA new DNA Encryption Technique
A new DNA Encryption Technique
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
82 86
82 8682 86
82 86
 
82 86
82 8682 86
82 86
 
Password based encryption
Password based encryptionPassword based encryption
Password based encryption
 
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWAREDESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
DESIGN AND IMPLEMENTATION OF DATA ENCRYPTION SOFTWARE
 
Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6Slide Deck CISSP Class Session 6
Slide Deck CISSP Class Session 6
 
Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography Innovative field of cryptography: DNA cryptography
Innovative field of cryptography: DNA cryptography
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
IMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdfIMAGE SECURITY BY 3 DES.pdf
IMAGE SECURITY BY 3 DES.pdf
 

DES

  • 1. Data Encryption Standard - DES DES was developed as a standard for communications and data protection by an IBM research team, in response to a public request for proposals by the NBS - the National Bureau of Standards (which is now known as NIST). By: T.N.Srimanyu (12MCMB06) Ritika Singla (12MCMB15) M.Tech(IT)
  • 2.
  • 3. DES - Basics  DES uses the two basic techniques of cryptography - confusion and diffusion.  At the simplest level, diffusion is achieved through numerous permutations and confusion is achieved through the XOR operation.
  • 4.
  • 5. DES - The 16 Rounds  The basic process in enciphering a 64-bit data block and a 56-bit key using the DES consists of: • An initial permutation (IP) • 16 rounds of a complex key dependent calculation f • A final permutation, being the inverse of IP
  • 6.
  • 7.
  • 8. Triple DES - More Secure
  • 9. IMPROVED DES ALGORITHM BASED ON IRRATIONAL NUMBERS IEEE Int. Conference Neural Networks & Signal Processing Zhenjiang, China, June 8~10, 2008
  • 10. Irrational Numbers  Irrational numbers, which are similar to data sequences generated form chaotic system, are infinite and non-cyclic. Therefore using irrational numbers to encrypt will provide higher security without strict chaos synchronization.
  • 11. Advantages  The improved scheme prevents the key from being directly involved in the production of sub-keys. It can increase the randomness of the production of the sub-keys and use different sub-keys each group. The key space is extended.
  • 12.
  • 13.
  • 14. Conclusion This paper designs an encryption algorithm with better security, bigger secret-key space and higher encrypting efficiency. This scheme can expand the key space without any more running time and enhance the security of the encryption algorithm. The algorithm has wider foreground applications based on these advantages.
  • 16. Thank You Any Queries?