The Application Layer: Algorithms)
The Application Layer: Algorithms)
The Application Layer: Algorithms)
LAYER
(THE SECRET-KEY
ALGORITHMS)
CRYPTOGRAPHICS
S1 S5
S9
P1 S2 P2 S6 P3
S10 P4
S3 S7
S11
DATA ENCRYPTION
STANDARD
• In January 1977, the U.S government
adopted a product cipher developed by
IBM as its official standard for unclassified
information.
Iteration 1
Iteration 2
Li-1 Exor f(Ri-1, ki)
Iteration 16
32 bit swap
Inverse
transposition
. 32 bits
32bits
. Li
• Plaintext is encrypted in blocks of 64 bits,
yielding 64 bits of ciphertext.
• The algorithm, which is parameterized by a
56-bit key, has 19 distinct stages.
• The first stage is a key independent
transposition on the 64-bit plaintext.
• The last stage is the exact reverse of this
transposititon.
• The stage prior to the last one exchanges the
leftmost 32-bits with the rightmost 32-bits.
• The remaining 16 stages are functionally
identical but are parameterized by different
functions of the key.
• For decryption the reverse process is
• The function consists of four steps, carried out
in sequence. First, a 48-bit number, E, is
constructed by expanding the 32-bit Ri-1
according to a fixed transposition and
duplication rule.
# # # # E E E E
1V KEY
Decryption box
E E E E # # # #
Encryption
box
KEY …… 1V
………..
• We start by computing C0=E(P0 Xor 1V).