SlideShare a Scribd company logo
2
Most read
11
Most read
14
Most read
Data Encryption Standard -
          DES
DES was developed as a standard for communications and data
 protection by an IBM research team, in response to a public
  request for proposals by the NBS - the National Bureau of
          Standards (which is now known as NIST).



                                    By:
                                    T.N.Srimanyu (12MCMB06)
                                    Ritika Singla (12MCMB15)
                                    M.Tech(IT)
DES
DES - Basics

    DES uses the two basic techniques of cryptography -
    confusion and diffusion.

    At the simplest level, diffusion is achieved through
    numerous permutations and confusion is achieved
    through the XOR operation.
DES
DES - The 16 Rounds

    The basic process in
    enciphering a 64-bit data block
    and a 56-bit key using the
    DES consists of:
    • An initial permutation (IP)
    • 16 rounds of a complex key
      dependent calculation f
    • A final permutation, being the
      inverse of IP
DES
DES
Triple DES - More Secure
IMPROVED DES ALGORITHM
  BASED ON IRRATIONAL
       NUMBERS

IEEE Int. Conference Neural Networks & Signal
 Processing
Zhenjiang, China, June 8~10, 2008
Irrational Numbers
 Irrational numbers, which are similar to data
sequences generated form chaotic system, are infinite and
 non-cyclic.
Therefore using irrational numbers to encrypt will provide
 higher security without strict chaos synchronization.
Advantages
 The improved scheme prevents the key from being
 directly involved in the production of sub-keys.
It can increase the randomness of the production of the
 sub-keys and use different sub-keys each group.
The key space is extended.
DES
DES
Conclusion
This paper designs an encryption algorithm with better
 security, bigger secret-key space and higher encrypting
 efficiency.
This scheme can expand the key space without any more
 running time and enhance the security of the encryption
 algorithm.
The algorithm has wider foreground applications based
 on these advantages.
Bibliography
www.ieeexplore.com
Thank You

 Any Queries?

More Related Content

PPT
Cryptography and Network Security William Stallings Lawrie Brown
PDF
CRYPTOGRAPHY AND NETWORK SECURITY
PPTX
Classical encryption techniques
PPT
Network Security and Cryptography
PPTX
Rsa Crptosystem
PDF
Block Ciphers and the Data Encryption Standard
PDF
SYMMETRIC CRYPTOGRAPHY
Cryptography and Network Security William Stallings Lawrie Brown
CRYPTOGRAPHY AND NETWORK SECURITY
Classical encryption techniques
Network Security and Cryptography
Rsa Crptosystem
Block Ciphers and the Data Encryption Standard
SYMMETRIC CRYPTOGRAPHY

What's hot (20)

PPT
DES (Data Encryption Standard) pressentation
PPT
Message Authentication Code & HMAC
PPTX
Double DES & Triple DES
PPTX
Cryptography.ppt
PPTX
Data Encryption Standard (DES)
PDF
Asymmetric Cryptography
PPTX
Diffie hellman key exchange algorithm
PPTX
Topic1 substitution transposition-techniques
PPTX
Advanced cryptography and implementation
PPTX
Principles of public key cryptography and its Uses
PPTX
Public Key Cryptography
PDF
symmetric key encryption algorithms
PPTX
Cryptography and network security
PPTX
MD5 ALGORITHM.pptx
PPTX
Diffie Hellman Key Exchange
PDF
AES-Advanced Encryption Standard
PPTX
Symmetric encryption
PPTX
SHA- Secure hashing algorithm
PPT
Cryptography
PPTX
Hash function
DES (Data Encryption Standard) pressentation
Message Authentication Code & HMAC
Double DES & Triple DES
Cryptography.ppt
Data Encryption Standard (DES)
Asymmetric Cryptography
Diffie hellman key exchange algorithm
Topic1 substitution transposition-techniques
Advanced cryptography and implementation
Principles of public key cryptography and its Uses
Public Key Cryptography
symmetric key encryption algorithms
Cryptography and network security
MD5 ALGORITHM.pptx
Diffie Hellman Key Exchange
AES-Advanced Encryption Standard
Symmetric encryption
SHA- Secure hashing algorithm
Cryptography
Hash function
Ad

Viewers also liked (20)

PDF
Block Ciphers Modes of Operation
PPT
Tema 5 criptografia y redes
PDF
Criptografia
PDF
Criptografia: Conceptos básicos e implementación con software libre
PDF
Conceptos de Criptografía para Blockchains
PDF
Criptografia
PPTX
Cryptography & Steganography
PPSX
5 Cryptography Part1
PPT
Digital Signature
PPT
Data encryption standard (des)
PPT
PDF
Advanced Encryption Standard (AES)
PDF
cns 2marks
PPT
AES Cryptosystem
PPT
Digital signature
PPSX
Advanced Encryption Standard (AES)
PDF
Advanced Encryption Standard (AES) Implementaion using Java
PPTX
Trible data encryption standard (3DES)
PPTX
Digital signature
Block Ciphers Modes of Operation
Tema 5 criptografia y redes
Criptografia
Criptografia: Conceptos básicos e implementación con software libre
Conceptos de Criptografía para Blockchains
Criptografia
Cryptography & Steganography
5 Cryptography Part1
Digital Signature
Data encryption standard (des)
Advanced Encryption Standard (AES)
cns 2marks
AES Cryptosystem
Digital signature
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES) Implementaion using Java
Trible data encryption standard (3DES)
Digital signature
Ad

Similar to DES (20)

PDF
International Journal of Computational Engineering Research(IJCER)
PPT
section-8.ppt
PDF
1 DES.pdf
PPT
DATA ENCRYPTION STANDARD (DES) / lucifer
PDF
Proposing an Encryption Algorithm based on DES
PPTX
Data Encryption standard in cryptography
PPTX
Information and network security 20 data encryption standard des
PPT
Encryption
PPT
DES-lecture (1).ppt
PPTX
data encryption standard under the subtopic cryptography and network security
PPT
PPTX
PDF
4-DES.pdf
PPTX
Data Encryption Standard (DES) and Alternatives.pptx
PPT
Block Cipher Stream Cipher DESUnit 3.ppt
PPT
cryptography and network security chap 3
PPT
data encryption standard algorithm in cryptography
PPT
DATA ENCRYPTION STANDARD ALGORITHM , PPT
PPT
ch03 network security in computer sys.ppt
PPT
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee
International Journal of Computational Engineering Research(IJCER)
section-8.ppt
1 DES.pdf
DATA ENCRYPTION STANDARD (DES) / lucifer
Proposing an Encryption Algorithm based on DES
Data Encryption standard in cryptography
Information and network security 20 data encryption standard des
Encryption
DES-lecture (1).ppt
data encryption standard under the subtopic cryptography and network security
4-DES.pdf
Data Encryption Standard (DES) and Alternatives.pptx
Block Cipher Stream Cipher DESUnit 3.ppt
cryptography and network security chap 3
data encryption standard algorithm in cryptography
DATA ENCRYPTION STANDARD ALGORITHM , PPT
ch03 network security in computer sys.ppt
ch03.pptvxcvxcvxcvxcvxcvxcvcxvdsgedgeeee

DES

  • 1. Data Encryption Standard - DES DES was developed as a standard for communications and data protection by an IBM research team, in response to a public request for proposals by the NBS - the National Bureau of Standards (which is now known as NIST). By: T.N.Srimanyu (12MCMB06) Ritika Singla (12MCMB15) M.Tech(IT)
  • 3. DES - Basics  DES uses the two basic techniques of cryptography - confusion and diffusion.  At the simplest level, diffusion is achieved through numerous permutations and confusion is achieved through the XOR operation.
  • 5. DES - The 16 Rounds  The basic process in enciphering a 64-bit data block and a 56-bit key using the DES consists of: • An initial permutation (IP) • 16 rounds of a complex key dependent calculation f • A final permutation, being the inverse of IP
  • 8. Triple DES - More Secure
  • 9. IMPROVED DES ALGORITHM BASED ON IRRATIONAL NUMBERS IEEE Int. Conference Neural Networks & Signal Processing Zhenjiang, China, June 8~10, 2008
  • 10. Irrational Numbers  Irrational numbers, which are similar to data sequences generated form chaotic system, are infinite and non-cyclic. Therefore using irrational numbers to encrypt will provide higher security without strict chaos synchronization.
  • 11. Advantages  The improved scheme prevents the key from being directly involved in the production of sub-keys. It can increase the randomness of the production of the sub-keys and use different sub-keys each group. The key space is extended.
  • 14. Conclusion This paper designs an encryption algorithm with better security, bigger secret-key space and higher encrypting efficiency. This scheme can expand the key space without any more running time and enhance the security of the encryption algorithm. The algorithm has wider foreground applications based on these advantages.
  • 16. Thank You Any Queries?