Preview

Simple Des

Good Essays
Open Document
Open Document
2230 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Simple Des
A P PENDIX C
PPENDIX
Simplified DES
C.1 Overview ...................................................................................................................2
C.2 S-DES Key Generation .............................................................................................3
C.3 S-DES Encryption .....................................................................................................3
Initial and Final Permutations ..................................................................................3
The Function fK .......................................................................................................4
The Switch Function ................................................................................................5
C.4 Analysis of Simplified DES ......................................................................................5
C.5 Relationship to DES ..................................................................................................6

William Stallings
Copyright 2006

Supplement to
Cryptography and Network Security, Fourth Edition
Prentice Hall 2006
ISBN: 0-13-187316-4 http://williamstallings.com/Crypto/Crypto4e.html 8/5/05
Simplified DES, developed by Professor Edward Schaefer of Santa Clara University [SCHA96], is an educational rather than a secure encryption algorithm. It has similar properties and structure to DES with much smaller parameters. The reader might find it useful to work through an example by hand while following the discussion in this Appendix.

C.1 Overview
Figure C.1 illustrates the overall structure of the simplified DES, which we will refer to as SDES. The S-DES encryption algorithm takes an 8-bit block of plaintext (example: 10111101) and a 10-bit key as input and produces an 8-bit block of ciphertext as output. The S-DES decryption algorithm takes an 8-bit block of ciphertext and the same 10-bit key used to produce that ciphertext as input and

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Triple DES uses three individual keys with 56 bits each. The total key length adds up to 168 bits, but experts would argue that 112-bits in key strength is more like it.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    2. Decrypt the following. You may use one of the readily available tools on the internet to perform this encryption. Please provide the link (URL) of the tool you used.…

    • 559 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Stored encrypted data on cloud. O12 =Generate aggregate key O13= Generate aggregate trapdoor. S2= fI2, F2, O2g Where, I2= fI21, I22, I23, I24g I21=Enter username and password.…

    • 121 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    ISSC362 Lab 2 Assessment

    • 492 Words
    • 2 Pages

    Compare the hash values calculated for example.txt that you documented during this lab. Explain in your own words why the hash values will change when the data is modified.…

    • 492 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Kendall, J., Dr. (2008, June). Cryptographic Techniques for Network Security. University of Portsmouth. Retrieved from https://learn.umuc.edu/d2l/le/content/57178/viewContent/2562147/View.…

    • 1135 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Osi Layers

    • 353 Words
    • 2 Pages

    | Formats and encrypts data to be sent across a network, providing freedom from compatibility problems.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cryptography

    • 385 Words
    • 2 Pages

    Data Encryption Standard (DES), ROT13, and Enigma are all examples of algorithm for the encryption of electronic data…

    • 385 Words
    • 2 Pages
    Good Essays
  • Good Essays

    dsfds

    • 970 Words
    • 4 Pages

    Who is Abigail Williams? is she a liar, a witch or is she really just an honest soul trying to prove her innocence? Some people could relate to Abigail, but those people are probably the liars and cheats of this world. Abigail Williams is one of the characters that made the least number of changes in The Crucible. Abigail's lies never changed throughout The Crucible and she continued to be deceptive. She refused to tell what happened in the woods and she lied about seeing people with the devil. In the beginning Abigail is denying all the things Paris saw when he ventured into the woods and discovered the girls dancing in a circle naked around Tituba. Near the middle of The Crucible Abigail continues to lie about the situation and the people she blamed. Then in the end Abigail remained the same and vanished without a trace.…

    • 970 Words
    • 4 Pages
    Good Essays
  • Better Essays

    The Setup algorithm takes as input the depth of the key structure supported and generates a master key and a public key for the scheme. KeyGen takes the master-key generated by the setup, a user’s identity and an attribute set as input, and produces a secret key for the user. Encrypt algorithm takes as input the public key of the scheme, along with a message and an access tree, and generates a ciphertext as output. Finally, Decrypt takes a ciphertext and a secret-key (produced by KeyGen), and if the access-tree used to construct the ciphertext is satisfied by the attribute set for which the secret-key was generated, then it recovers the message from the ciphertext. Each of these algorithms are explained in detail…

    • 1837 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Operational Research

    • 7540 Words
    • 31 Pages

    6. We also have a look at the effect of changing the values of parameters on the…

    • 7540 Words
    • 31 Pages
    Good Essays