Introduction To DES Overview of The DES Algorithm Internal Structure of DES Decryption Security of DES
Introduction To DES Overview of The DES Algorithm Internal Structure of DES Decryption Security of DES
Introduction To DES Overview of The DES Algorithm Internal Structure of DES Decryption Security of DES
• Introduction to DES
• Overview of the DES Algorithm
• Internal Structure of DES
• Decryption
• Security of DES
Classification of DES in the Field of Cryptology
Cryptology
Cryptography Cryptanalysis
• Claude Shannon: There are two primitive operations with which strong encryption
algorithms can be built:
1. Confusion: An encryption operation where the relationship between key
and ciphertext is obscured.
Today, a common element for achieving confusion is substitution, which is
found in both AES and DES.
Example:
• L and R swapped again at the end of the cipher, i.e., after round 16
followed by a final permutation
Initial and Final Permutation
• Bitwise Permutations.
• Inverse operations.
• Described by tables IP and IP-1.
• 4 Steps:
1. Expansion E
2. XOR with round key
3. S-box substitution
4. Permutation
The Expansion Function E
1.Expansion E
• main purpose:
increases diffusion
!
Add Round Key
• Exhaustive key search: For a given pair of plaintext-ciphertext (x, y) test all
256 keys until the condition DESk-1(x)=y is fulfilled.
⇒ Relatively easy given today’s computer technology!
History of Attacks on DES
Year Proposed/ implemented DES Attack
1977 Diffie & Hellman, (under-)estimate the costs of a key search machine
1990 Biham & Shamir propose differential cryptanalysis (247 chosen ciphertexts)
1993 Mike Wiener proposes design of a very efficient key search machine:
Average search requires 36h. Costs: $1.000.000
1993 Matsui proposes linear cryptanalysis (243 chosen ciphertexts)
Jun. 1997 DES Challenge I broken, 4.5 months of distributed search
Feb. 1998 DES Challenge II--1 broken, 39 days (distributed search)
Jul. 1998 DES Challenge II--2 broken, key search machine Deep Crack built by the
Electronic Frontier Foundation (EFF): 1800 ASICs with 24 search engines each,
Costs: $250 000, 15 days average search time (required 56h for the Challenge)
Jan. 1999 DES Challenge III broken in 22h 15min
(distributed search assisted by Deep Crack)
2006-2008 Reconfigurable key search machine COPACOBANA developed at the
Universities in Bochum and Kiel (Germany), uses 120 FPGAs to break DES in
6.4 days (avg.) at a cost of $10 000.
Triple DES – 3DES
• Triple encryption using DES is often used in practice to extend the effective key
length of DES to 112.
• DES was the dominant symmetric encryption algorithm from the mid-1970s to the
mid-1990s. Since 56-bit keys are no longer secure, the Advanced Encryption
Standard (AES) was created.
• Standard DES with 56-bit key length can be broken relatively easily nowadays
through an exhaustive key search.
• DES is quite robust against known analytical attacks: In practice it is very difficult
to break the cipher with differential or linear cryptanalysis.
• By encrypting with DES three times in a row, triple DES (3DES) is created, against
which no practical attack is currently known.
• The “default” symmetric cipher is nowadays often AES. In addition, the other four
AES finalist ciphers all seem very secure and efficient.