Vous êtes sur la page 1sur 29

Presented by

K.CHARAN KUMAR
10H61D5718

Objective
To develop the General DES, Modified DES and compare the
bit error rate for both these models by inducing random errors.

Existing method
To Develop the existing DES .
This DES has an average Bit Error Rate of half the size of the
data.(50%)

64 bit plaintext block

DES

IP
L0

R0
32

32
f

L1=R0

K1 (derived from
56 bit key)

R1=L0 + f(R0,K1)

repeat 16
times

K16 (derived from


56 bit key)

L16=R15

R16=L15 + f(R15,K16)
IP-1

64 bit ciphertext block

IP (Initial Permutation):

16

24

32

40

48

56

16

24

32

40

48

56

After initial permutation(IP) the 64-bit data is rearranged as


following shown below:
IP
58
60
62
64
57
59
61
63

50
52
54
56
49
51
53
55

42
44
46
48
41
43
45
47

34
36
38
40
33
35
37
39

26
28
30
32
25
27
29
31

18
20
22
24
17
19
21
23

10
12
14
16
9
11
13
15

2
4
6
8
1
3
5
7

L0

R0
32

32
Expansion Permutation
48
48
48
S-Box Substitution

32
P-Box Permutation

32
32
L1

32
R1

48 bit sub key Generator


K48 = g(i,K56)
(The key for each round is
deterministically found from the input 56
bit key).

Calculation of f(R,K)

R
32 bits
Expansion Permutation (E)
48 bits
1

12

13

16

17

20

21

24

25

28

29

32

48

E BIT - SELECTION TABLE

32
4
8
12
16
20
24
28

1
5
9
13
17
21
25
29

2
6
10
14
18
22
26
30

3
7
11
15
19
23
27
31

4
8
12
16
20
24
28
32

5
9
13
17
21
25
29
1

E
48

48 K

48

48

X-OR with 48 bit key

48

48

S-Box Substitution
32

48

S-box
1

S-box
2

S-box
3

S-box
4

S-box
5

S-box
6

S-box
7

S-box
8

13

17

21

25

29

12

16

20

24

28

32

S-box
1

Page select

How an S-Box works

14 4
8
3 10
7
0 15
1
10 6
8
4 1

13 1 2
6 12 5

15 11
9 0

7 4 14
12 11 9

2
5

13
3

8 13 6
7 3 10

2
5

14
11 12 9
15
0
15 12 8
75 11
13

2 4
3 14 10

9
0

1
6

32
P-Box Permutation (P)
32

12

13

16

17

20

21

24

25

28

29

32

12

13

16

17

20

21

24

25

28

29

32

P
16
29
1
5
2
32
19
22

7
12
15
18
8
27
13
11

20
28
23
31
24
3
30
4

21
17
26
10
14
9
6
25

IP-1 (Final Permutation):

16

24

32

40

48

56

16

24

32

40

48

56

IP-1
40
39
38
37
36
35
36
33

8
7
6
5
4
3
2
1

48
47
46
45
44
43
42
41

16
15
14
13
12
11
10
9

56 24
55 23
54 22
53 21
52 20
51 19
50 18
49 17

64
63
62
61
60
59
58
57

32
31
30
29
28
27
26
25

Initial Key Permutation

16

24

32

40

48

56

16

24

32

40

48

56

64

PC-1
57
1
10
19
63
7
14
21

49
58
2
11
55
62
6
13

41
50
59
3
47
54
61
5

33
42
51
60
39
46
53
28

25
34
43
52
31
38
45
20

17
26
35
44
23
30
37
12

9
18
27
36
15
22
29
4

Key Split & Shift & Compress


8

16

24

32

40

48

56

K56

Shift left by Ni

Shift left by Ni

Ni =
{1,1,2,2,2,2,2,2,1,2,2,2,2,2,2,1}

Shift accumulates every round


8

16

24

16

32

24

40

32

48

40

56

48

K48

PC-2
14
3
23
16
41
30
44
46

17 11 24 1
5
28 15 6
21 10
19 12 4
26 8
7 27 20 13 2
52 31 37 47 55
40 51 45 33 48
49 39 56 34 53
42 50 36 29 32

DES Advantages:
Very Fast:
Ideally suited for implementation
in hardware (bit shifts, look-ups etc).
plaintext block

Dedicated hardware (in 1996) could


run DES at 200 Mbyte/s.

56 bit Key

Well suited for voice, video etc.


ciphertext block

Proposed method
To develop the modified DES from existing DES by following
steps:
Replace the substitution boxes(S-box) from S1-S4 by S1 and S5S8 by S2.

By performing the round17 operation.

S-box
1

S-box
1

S-box
1

12

S-box
1

13

16

S-box
2

17

20

S-box
2

21

24

S-box
2

25

28

S-box
2

29

32

Round17 operation

Extension:
This analysis is carried out after implementing triple DES scheme.

Advantages
Better Security.

Disadvantages
Hardware, cost increases.

Applications
Wireless communication
Data storage and mail systems
Electronic Funds and Transfers

Plain Text
IP
L

K1
+

F
R= L F(R, K1)

L=R

K2- K15
L= R

R= L F(R, K15)
K16

R16= L15 F(R15, K16)

L16= R15

IP-1

CIPHER TEXT

FLOW DIAGRAM FOR Modified DES

THANK YOU

Vous aimerez peut-être aussi