SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Strength of DES
The Concerns about the level of security
provided by DES. These concerns, by and large,
fall into two areas:
1. key size
2.nature of the algorithm.
1. The Use of 56-Bit Keys
• With a key length of 56 bits, there are 256 possible
keys, which is approximately 7.2 * 1016 keys. Thus, on
the face of it, a brute-force attack
appears impractical. Assuming that, on average, half th
e key space has to be searched, a single machine
performing one DES encryption per microsecond would
take more than a thousand years to break the cipher.
2. The Nature of the DES Algorithm
Another concern is the possibility that cryptanalysis is possible
by exploiting the characteristics of the DES algorithm. The focus
of concern has been on the eight substitution tables, or S-boxes,
that are used in each iteration. Because the design
criteria for these boxes, and indeed for the entire algorithm, were
not made public,
there is a suspicion that the boxes were constructed in such a way
that cryptanalysis
is possible for an opponent who knows the weaknesses in the S-
boxes.
Timing Attacks
In essence, a timing attack is one in which infor
mation about the key or the plaintext
is obtained by observing how long it takes a give
implementation to perform decryptions on variou
s ciphertexts. A timing attack exploits the fact tha
t an encryp- tion or decryption algorithm often
takes slightly different
amounts of time on different inputs.
Block Cipher Design Principles
Block ciphers are built in the Feistel cipher structure. Block
cipher has a specific number of rounds and keys for generating
ciphertext. For defining the complexity level of an algorithm
few design principles are to be considered.
These are following:-
1. Number of Rounds
2. Design of function F
3. Key schedule algorithm
1.Number of Rounds
The number of Rounds is regularly considered in
design criteria, it just reflects the number of
rounds to be suitable for an algorithm to make it
more complex, in DES we have 16 rounds
ensuring it to be more secure while in AES we
have 10 rounds which makes it more secure.
2. Design of function F
• The core part of the Feistel Block cipher structure is the
Round Function. The complexity of cryptanalysis can be
derived from the Round function i.e. the increasing level of
complexity for the round function would be greatly
contributing to an increase in complexity.
• To increase the complexity of the round function, the
avalanche effect is also included in the round function, as
the change of a single bit in plain text would produce a
mischievous output due to the presence of avalanche effect.
3.Key schedule algorithm
• In Feistel Block cipher structure, each round
would generate a sub-key for increasing the
complexity of cryptanalysis. The Avalanche
effect makes it more complex in deriving sub-
key. Decryption must be done very carefully to
get the actual output as the avalanche effect is
present in it.

More Related Content

PPTX
Classical encryption techniques
PPTX
Encapsulating security payload in Cryptography and Network Security
PPTX
Cryptographic algorithms
PPTX
Block Cipher and Operation Modes
PPTX
Block ciphers & public key cryptography
PPT
Data encryption standard
PPTX
Machine learning with ADA Boost
PPT
AES.ppt
Classical encryption techniques
Encapsulating security payload in Cryptography and Network Security
Cryptographic algorithms
Block Cipher and Operation Modes
Block ciphers & public key cryptography
Data encryption standard
Machine learning with ADA Boost
AES.ppt

What's hot (20)

PPTX
Backtracking
PPT
Backtracking
PPTX
Structure of the page table
PPTX
Apriori algorithm
PPTX
Block cipher modes of operation
PDF
Block Ciphers and the Data Encryption Standard
PPTX
Data preprocessing in Machine learning
PPTX
Webinar : P, NP, NP-Hard , NP - Complete problems
PPT
Symmetric and Asymmetric Encryption.ppt
PPTX
Clusters techniques
PPTX
GO BACK N PROTOCOL
PPT
Block Cipher and its Design Principles
PPTX
Ensemble learning
PPT
BackTracking Algorithm: Technique and Examples
PPTX
Hash Function
PDF
Hybrid Systems using Fuzzy, NN and GA (Soft Computing)
PPTX
PPT
Classical Encryption Techniques
PPTX
Data cube computation
PPT
Message authentication
 
Backtracking
Backtracking
Structure of the page table
Apriori algorithm
Block cipher modes of operation
Block Ciphers and the Data Encryption Standard
Data preprocessing in Machine learning
Webinar : P, NP, NP-Hard , NP - Complete problems
Symmetric and Asymmetric Encryption.ppt
Clusters techniques
GO BACK N PROTOCOL
Block Cipher and its Design Principles
Ensemble learning
BackTracking Algorithm: Technique and Examples
Hash Function
Hybrid Systems using Fuzzy, NN and GA (Soft Computing)
Classical Encryption Techniques
Data cube computation
Message authentication
 
Ad

Similar to Strength of des & block cipher principle (20)

PPT
4255596.ppt
PDF
CNS2 unit 2.pdf
PPT
chap03.ppt- Cryptography and Network security
PDF
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
PDF
sheet4.pdf
PDF
paper4.pdf
PDF
lecture3.pdf
PDF
doc4.pdf
PDF
doc4.pdf
PDF
Data encryption techniques and standard
PPTX
Information and data security block cipher and the data encryption standard (...
PPTX
Lecture 05 - 04 Nov 21.pptx
PPT
DES.ppt
PPTX
Module 1-Block Ciphers and the Data Encryption Standard.pptx
PDF
Aes 128 192_256_bits_project_report
PPTX
Block Ciphers and DES.pptx
PPTX
Software EngineeringModule 2 (Complete).pptx
PDF
AES-Advanced Encryption Standard
PPTX
DES.pptx
4255596.ppt
CNS2 unit 2.pdf
chap03.ppt- Cryptography and Network security
Network security R.Rathna Deepa 2nd M.sc.,Computer Science
sheet4.pdf
paper4.pdf
lecture3.pdf
doc4.pdf
doc4.pdf
Data encryption techniques and standard
Information and data security block cipher and the data encryption standard (...
Lecture 05 - 04 Nov 21.pptx
DES.ppt
Module 1-Block Ciphers and the Data Encryption Standard.pptx
Aes 128 192_256_bits_project_report
Block Ciphers and DES.pptx
Software EngineeringModule 2 (Complete).pptx
AES-Advanced Encryption Standard
DES.pptx
Ad

Recently uploaded (20)

PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Sustainable Sites - Green Building Construction
PPTX
Internet of Things (IOT) - A guide to understanding
DOCX
573137875-Attendance-Management-System-original
PDF
Operating System & Kernel Study Guide-1 - converted.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
composite construction of structures.pdf
PPTX
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PDF
Structs to JSON How Go Powers REST APIs.pdf
PPTX
CH1 Production IntroductoryConcepts.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PPTX
Lecture Notes Electrical Wiring System Components
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Arduino robotics embedded978-1-4302-3184-4.pdf
PDF
PPT on Performance Review to get promotions
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPT
Mechanical Engineering MATERIALS Selection
PPTX
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Sustainable Sites - Green Building Construction
Internet of Things (IOT) - A guide to understanding
573137875-Attendance-Management-System-original
Operating System & Kernel Study Guide-1 - converted.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
composite construction of structures.pdf
MCN 401 KTU-2019-PPE KITS-MODULE 2.pptx
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Structs to JSON How Go Powers REST APIs.pdf
CH1 Production IntroductoryConcepts.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Lecture Notes Electrical Wiring System Components
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
Embodied AI: Ushering in the Next Era of Intelligent Systems
Arduino robotics embedded978-1-4302-3184-4.pdf
PPT on Performance Review to get promotions
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
Mechanical Engineering MATERIALS Selection
Recipes for Real Time Voice AI WebRTC, SLMs and Open Source Software.pptx

Strength of des & block cipher principle

  • 1. Strength of DES The Concerns about the level of security provided by DES. These concerns, by and large, fall into two areas: 1. key size 2.nature of the algorithm.
  • 2. 1. The Use of 56-Bit Keys • With a key length of 56 bits, there are 256 possible keys, which is approximately 7.2 * 1016 keys. Thus, on the face of it, a brute-force attack appears impractical. Assuming that, on average, half th e key space has to be searched, a single machine performing one DES encryption per microsecond would take more than a thousand years to break the cipher.
  • 3. 2. The Nature of the DES Algorithm Another concern is the possibility that cryptanalysis is possible by exploiting the characteristics of the DES algorithm. The focus of concern has been on the eight substitution tables, or S-boxes, that are used in each iteration. Because the design criteria for these boxes, and indeed for the entire algorithm, were not made public, there is a suspicion that the boxes were constructed in such a way that cryptanalysis is possible for an opponent who knows the weaknesses in the S- boxes.
  • 4. Timing Attacks In essence, a timing attack is one in which infor mation about the key or the plaintext is obtained by observing how long it takes a give implementation to perform decryptions on variou s ciphertexts. A timing attack exploits the fact tha t an encryp- tion or decryption algorithm often takes slightly different amounts of time on different inputs.
  • 5. Block Cipher Design Principles Block ciphers are built in the Feistel cipher structure. Block cipher has a specific number of rounds and keys for generating ciphertext. For defining the complexity level of an algorithm few design principles are to be considered. These are following:- 1. Number of Rounds 2. Design of function F 3. Key schedule algorithm
  • 6. 1.Number of Rounds The number of Rounds is regularly considered in design criteria, it just reflects the number of rounds to be suitable for an algorithm to make it more complex, in DES we have 16 rounds ensuring it to be more secure while in AES we have 10 rounds which makes it more secure.
  • 7. 2. Design of function F • The core part of the Feistel Block cipher structure is the Round Function. The complexity of cryptanalysis can be derived from the Round function i.e. the increasing level of complexity for the round function would be greatly contributing to an increase in complexity. • To increase the complexity of the round function, the avalanche effect is also included in the round function, as the change of a single bit in plain text would produce a mischievous output due to the presence of avalanche effect.
  • 8. 3.Key schedule algorithm • In Feistel Block cipher structure, each round would generate a sub-key for increasing the complexity of cryptanalysis. The Avalanche effect makes it more complex in deriving sub- key. Decryption must be done very carefully to get the actual output as the avalanche effect is present in it.