SlideShare a Scribd company logo
DES Supplementary Material
DES Supplementary Material
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
57 49 41 33 25 17 9
1 58 50 42 34 26 18
10 2 59 51 43 35 27
19 11 3 60 52 44 36
63 55 47 39 31 23 15
7 62 54 46 38 30 22
14 6 61 53 45 37 29
21 13 5 28 20 12 4
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
Key
#
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Left
Shift
1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
14 17 11 24 1 5
3 28 15 6 21 10
23 19 12 4 26 8
16 7 27 20 13 2
41 52 31 37 47 55
30 40 51 45 33 48
44 49 39 56 34 53
46 42 50 36 29 32
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 23 1
24 bit
24 bit
16 bit
16 bit
DES Supplementary Material
32 1 2 3 4 5
4 5 6 7 8 9
8 9 10 11 12 13
12 13 14 15 16 17
16 17 18 19 20 21
20 21 22 23 24 25
24 25 26 27 28 29
28 29 30 31 32 1
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
24 bit
24 bit
16 bit
16 bit
S-Box 1 S-Box 2 S-Box 3 S-Box 4
S-Box 5 S-Box 6 S-Box 7 S-Box 8
DES Supplementary Material
0 1 2 . . . 15
0
1
2
3
S-Box
6 bits
4 bits
DES Supplementary Material
 S-Box 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7
1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8
2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0
3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
DES Supplementary Material
 S-Box 2
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10
1 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5
2 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15
3 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
DES Supplementary Material
 S-Box 3
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8
1 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1
2 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7
3 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
DES Supplementary Material
 S-Box 4
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15
1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9
2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4
3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
DES Supplementary Material
 S-Box 5
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9
1 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6
2 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14
3 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
DES Supplementary Material
 S-Box 6
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11
1 10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8
2 9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6
3 4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
DES Supplementary Material
 S-Box 7
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1
1 13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6
2 1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2
3 6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
DES Supplementary Material
 S-Box 8
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7
1 1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2
2 7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8
3 2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
DES Supplementary Material
𝑳𝒊−𝟏 𝑹𝒊−𝟏
Expansion Permutation
XOR 𝑲𝒊
S-Box
Permutation
XOR
𝑳𝒊 𝑹𝒊
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
DES Supplementary Material
16 7 20 21 29 12 28 17
1 15 23 26 5 18 31 10
2 8 24 14 32 27 3 9
19 13 30 6 22 11 4 25
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
38 6 46 14 54 22 62 30
37 5 45 13 53 21 61 29
36 4 44 12 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
DES Supplementary Material
www.YourCompany.com
© 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

More Related Content

PDF
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
PDF
Computer Security Lecture 3: Classical Encryption Techniques 2
PDF
PMP Lecture 4: Project Integration Management
PDF
Computer Security Lecture 2: Classical Encryption Techniques 1
PPTX
Grow Your Career with WordPress
PDF
Tx 3 hill shuman_oliver
PPTX
Applications of-linear-algebra-hill-cipher
PPT
Chap 05 ip addresses classfless
Computer Security Lecture 4: Block Ciphers and the Data Encryption Standard
Computer Security Lecture 3: Classical Encryption Techniques 2
PMP Lecture 4: Project Integration Management
Computer Security Lecture 2: Classical Encryption Techniques 1
Grow Your Career with WordPress
Tx 3 hill shuman_oliver
Applications of-linear-algebra-hill-cipher
Chap 05 ip addresses classfless

Viewers also liked (20)

PPTX
Semantech: IT Architecture in the Enterprise
PDF
Hashing
PPT
Chap 01 intro
PPT
Chap 26 vpn
PPT
Chap 02 osi model
PPT
31. Multimedia System
PPT
Chap 28 security
PPT
Encryption And Decryption
 
PPT
Basic Encryption Decryption Chapter 2
PPT
Multimedia
PPT
Classical Encryption Techniques in Network Security
PPSX
C++ Programming Language
PPT
01 c++ Intro.ppt
PPT
Introduction to Cyber Security
PDF
Computer Security Lecture 1: Overview
PPTX
Affine Cypher Encryption - Decryption
PPT
Multimedia authoring tools
PPT
Introduction to multimedia
PPTX
INFORMATION SECURITY
Semantech: IT Architecture in the Enterprise
Hashing
Chap 01 intro
Chap 26 vpn
Chap 02 osi model
31. Multimedia System
Chap 28 security
Encryption And Decryption
 
Basic Encryption Decryption Chapter 2
Multimedia
Classical Encryption Techniques in Network Security
C++ Programming Language
01 c++ Intro.ppt
Introduction to Cyber Security
Computer Security Lecture 1: Overview
Affine Cypher Encryption - Decryption
Multimedia authoring tools
Introduction to multimedia
INFORMATION SECURITY
Ad

Similar to Computer Security Lecture 4.1: DES Supplementary Material (15)

PDF
DES (Data Encryption Standard) Algorithm
PPTX
Data encryption standard
PPT
ch03_block_ciphers_nemo (2) (1).ppt
PPTX
information security lecture 7 & 8 .pptx
PDF
Data Encryption Standard
PPSX
Data Encryption Standard (DES)
PDF
CS253: Distribution-based Sort (2019)
PDF
Overview of sparse and low-rank matrix / tensor techniques
PDF
Ctrie Data Structure
PPTX
DES Presentation.pptx for Information Security, A common Subject
PDF
13 14 mathcounts-students version
PPS
Millionaire tools. Chapter 1
PPS
Millionaire CHAPTER 1. Review your knowledge
PPTX
data ebncryption standard with example.pptx
PDF
Identification of unknown parameters and prediction of missing values. Compar...
DES (Data Encryption Standard) Algorithm
Data encryption standard
ch03_block_ciphers_nemo (2) (1).ppt
information security lecture 7 & 8 .pptx
Data Encryption Standard
Data Encryption Standard (DES)
CS253: Distribution-based Sort (2019)
Overview of sparse and low-rank matrix / tensor techniques
Ctrie Data Structure
DES Presentation.pptx for Information Security, A common Subject
13 14 mathcounts-students version
Millionaire tools. Chapter 1
Millionaire CHAPTER 1. Review your knowledge
data ebncryption standard with example.pptx
Identification of unknown parameters and prediction of missing values. Compar...
Ad

More from Mohamed Loey (20)

PDF
Lecture 6: Deep Learning Applications
PDF
Lecture 5: Convolutional Neural Network Models
PDF
Lecture 4: Deep Learning Frameworks
PDF
Lecture 4: How it Works: Convolutional Neural Networks
PPTX
Lecture 3: Convolutional Neural Networks
PDF
Lecture 2: Artificial Neural Network
PDF
Lecture 1: Deep Learning for Computer Vision
PDF
Design of an Intelligent System for Improving Classification of Cancer Diseases
PDF
Computer Security - CCNA Security - Lecture 2
PDF
Computer Security - CCNA Security - Lecture 1
PDF
Algorithms Lecture 8: Pattern Algorithms
PDF
Algorithms Lecture 7: Graph Algorithms
PDF
Algorithms Lecture 6: Searching Algorithms
PDF
Algorithms Lecture 5: Sorting Algorithms II
PDF
Algorithms Lecture 4: Sorting Algorithms I
PDF
Algorithms Lecture 3: Analysis of Algorithms II
PDF
Algorithms Lecture 2: Analysis of Algorithms I
PDF
Algorithms Lecture 1: Introduction to Algorithms
PDF
Convolutional Neural Network Models - Deep Learning
PDF
Deep Learning - Overview of my work II
Lecture 6: Deep Learning Applications
Lecture 5: Convolutional Neural Network Models
Lecture 4: Deep Learning Frameworks
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
Lecture 2: Artificial Neural Network
Lecture 1: Deep Learning for Computer Vision
Design of an Intelligent System for Improving Classification of Cancer Diseases
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 1
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 1: Introduction to Algorithms
Convolutional Neural Network Models - Deep Learning
Deep Learning - Overview of my work II

Recently uploaded (20)

PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PPTX
Institutional Correction lecture only . . .
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PPTX
Cell Types and Its function , kingdom of life
PDF
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
PDF
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PPTX
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Microbial disease of the cardiovascular and lymphatic systems
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
Renaissance Architecture: A Journey from Faith to Humanism
Institutional Correction lecture only . . .
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
Cell Types and Its function , kingdom of life
Origin of periodic table-Mendeleev’s Periodic-Modern Periodic table
ANTIBIOTICS.pptx.pdf………………… xxxxxxxxxxxxx
Supply Chain Operations Speaking Notes -ICLT Program
The Healthy Child – Unit II | Child Health Nursing I | B.Sc Nursing 5th Semester
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
Microbial disease of the cardiovascular and lymphatic systems
Week 4 Term 3 Study Techniques revisited.pptx
Anesthesia in Laparoscopic Surgery in India
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
Module 4: Burden of Disease Tutorial Slides S2 2025
human mycosis Human fungal infections are called human mycosis..pptx
2.FourierTransform-ShortQuestionswithAnswers.pdf

Computer Security Lecture 4.1: DES Supplementary Material

  • 1. DES Supplementary Material DES Supplementary Material
  • 2. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 3. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 4. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 5. DES Supplementary Material 57 49 41 33 25 17 9 1 58 50 42 34 26 18 10 2 59 51 43 35 27 19 11 3 60 52 44 36 63 55 47 39 31 23 15 7 62 54 46 38 30 22 14 6 61 53 45 37 29 21 13 5 28 20 12 4
  • 6. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 7. DES Supplementary Material Key # 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Left Shift 1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1
  • 8. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 9. DES Supplementary Material 14 17 11 24 1 5 3 28 15 6 21 10 23 19 12 4 26 8 16 7 27 20 13 2 41 52 31 37 47 55 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32
  • 10. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 11. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 12. DES Supplementary Material 58 50 42 34 26 18 10 2 60 52 44 36 28 20 12 4 62 54 46 38 30 22 14 6 64 56 48 40 32 24 16 8 57 49 41 33 25 17 9 1 59 51 43 35 27 19 11 3 61 53 45 37 29 21 13 5 63 55 47 39 31 23 15 7
  • 13. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 14. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 15. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 16. DES Supplementary Material 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 23 1 24 bit 24 bit 16 bit 16 bit
  • 17. DES Supplementary Material 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 32 1
  • 18. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 19. DES Supplementary Material 24 bit 24 bit 16 bit 16 bit S-Box 1 S-Box 2 S-Box 3 S-Box 4 S-Box 5 S-Box 6 S-Box 7 S-Box 8
  • 20. DES Supplementary Material 0 1 2 . . . 15 0 1 2 3 S-Box 6 bits 4 bits
  • 21. DES Supplementary Material  S-Box 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7 1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0 3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
  • 22. DES Supplementary Material  S-Box 2 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10 1 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5 2 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15 3 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
  • 23. DES Supplementary Material  S-Box 3 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8 1 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1 2 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7 3 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
  • 24. DES Supplementary Material  S-Box 4 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15 1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9 2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4 3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
  • 25. DES Supplementary Material  S-Box 5 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9 1 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6 2 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14 3 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
  • 26. DES Supplementary Material  S-Box 6 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11 1 10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8 2 9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6 3 4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
  • 27. DES Supplementary Material  S-Box 7 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1 1 13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6 2 1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2 3 6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
  • 28. DES Supplementary Material  S-Box 8 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7 1 1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2 2 7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8 3 2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
  • 29. DES Supplementary Material 𝑳𝒊−𝟏 𝑹𝒊−𝟏 Expansion Permutation XOR 𝑲𝒊 S-Box Permutation XOR 𝑳𝒊 𝑹𝒊 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 30. DES Supplementary Material 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
  • 31. DES Supplementary Material 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
  • 32. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 33. DES Supplementary Material 40 8 48 16 56 24 64 32 39 7 47 15 55 23 63 31 38 6 46 14 54 22 62 30 37 5 45 13 53 21 61 29 36 4 44 12 52 20 60 28 35 3 43 11 51 19 59 27 34 2 42 10 50 18 58 26 33 1 41 9 49 17 57 25
  • 34. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 36. DES Supplementary Material www.YourCompany.com © 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME