Cryptography CA2
Cryptography CA2
Cryptography CA2
Developed in the early 1970s at IBM and based on an earlier design by Horst
Feistel, the algorithm was submitted to the National Bureau of Standards (NBS)
following the agency's invitation to propose a candidate for the protection of
sensitive, unclassified electronic government data. In 1976, after consultation
with the National Security Agency (NSA), the NBS selected a slightly modified
version (strengthened against differential cryptanalysis, but weakened against
brute-force attacks), which was published as an official Federal Information
Processing Standard (FIPS) for the United States in 1977.
In 1976, Whitfield Diffie and Martin Hellman published a research paper on what
would be defined as the Diffie-Hellman key exchange.
Some of the changes made to LUCIFER have been the subject of much controversy
even to the present day. The most notable of these was the key size. LUCIFER used
a key size of 128 bits however this was reduced to 56 bits for DES. Even though
DES actually accepts a 64-bit key as input, the remaining eight bits are used for
parity checking and have no effect on DES’s security. Outsiders were convinced
that the 56-bit key was an easy target for a brute force attack due to its extremely
small size. The need for the parity checking scheme was also questioned without
satisfying answers
Another controversial issue was that the S-boxes used were designed under
classified conditions and no reasons for their particular design were ever given.
This led people to assume that the NSA had introduced a “trapdoor” through
which they could decrypt any data encrypted by DES even without knowledge of
the key. One startling discovery was that the S-boxes appeared to be secure
against an attack known as Differential Cryptanalysis which was only publicly
discovered by Biham and Shamir in 1990. This suggests that the NSA were aware
of this attack in 1977; 13 years earlier! In fact the DES designers claimed that the
reason they never made the design specifications for the S-boxes available was
that they knew about a number of attacks that weren’t public.knowledge at the
time and they didn’t want them leaking - this is quite a plausible claim as
differential cryptanalysis has shown. However, despite all this controversy, in
1994 NIST reformed DES for government use for a further five years for use in
areas other than “classified”.
Procedure and Discussion
We have mentioned that DES uses a 56-bit key. Actually, the initial key consists of
64 bits. However, before the DES process even starts, every 8th bit of the key is
discarded to produce a 56-bit key. That is bit positions 8, 16, 24, 32, 40, 48, 56, and
64 are discarded.
Advertisement
Thus, the discarding of every 8th bit of the key produces a 56-bit key from the
original 64-bit key.
DES is based on the two fundamental attributes of cryptography: substitution (also
called confusion) and transposition (also called diffusion). DES consists of 16 steps,
each of which is called a round. Each round performs the steps of substitution and
transposition. Let us now discuss the broad-level steps in DES.
In the first step, the 64-bit plain text block is handed over to an initial
Permutation (IP) function.
The initial permutation is performed on plain text.
Next, the initial permutation (IP) produces two halves of the permuted
block; saying Left Plain Text (LPT) and Right Plain Text (RPT).
Now each LPT and RPT go through 16 rounds of the encryption process.
In the end, LPT and RPT are rejoined and a Final Permutation (FP) is
performed on the combined block
The result of this process produces 64-bit ciphertext.
During the last few years, cryptanalysis have found some weaknesses in
DES when key selected are weak keys. These keys shall be avoided.
DES has proved to be a very well-designed block cipher. There have
been no significant cryptanalytic attacks on DES other than exhaustive key
search.
Conclusion
As we toward a society where automated information resources are
increased and cryptography will continue to increase in importance as a
security mechanism. Electronic networks for banking, shopping, inventory
control, benefit and service delivery, information storage and retrieval,
distributed processing, and government applications will need improved
methods for access control and data security. The information security can
be easily achieved by using Cryptography technique. DES is now
considered to be insecure for some applications like banking system. there
are also some analytical results which demonstrate theoretical
weaknesses in the cipher. So, it becomes very important to augment this
algorithm by adding new levels of security to make it applicable. By adding
additional key, modified S-Box design, modifies function implementation
and replacing the old XOR by a new operation as proposed by this thesis
to give more robustness to DES algorithm and make it stronger against
any kind of intruding. DES Encryption with two keys instead of one key
already will increase the efficiency of cryptography.
References
1. http://www.umsl.edu/~siegelj/information_theory/projects/des.n
etau.net/des%20history.htmlhttps://www.ideamotive.co/blog/ma
rketplaces-business-model-overview
2. https://www.geeksforgeeks.org/data-encryption-standard-des-
set-1/https://jungleworks.com/online-marketplace-ebay/
3. https://www.tutorialspoint.com/cryptography/data_encryption_s
tandard.htm
4. https://intellipaat.com/blog/what-is-des-
algorithm/#:~:text=data%20at%20all.-
,Conclusion,opposite%20of%20the%20encryption%20procedure.
5. https://ieeexplore.ieee.org/abstract/document/1089771