26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

58 INTERNET SECURITY<br />

Since the terms of the standard stipulate that it be reviewed every five years, on<br />

6 March 1987 the NBS published in the Federal Register a request for comments on the<br />

second five-year review. The comment period closed on 10 December 1992. After much<br />

debate, DES was reaffirmed as a US government standard until 1992 because there was<br />

still no alternative for DES. The NIST again solicited a review to assess the continued<br />

adequacy of DES to protect computer data. In 1993, NIST formally solicited comments<br />

on the recertification of DES. After reviewing many comments and technical inputs, NIST<br />

recommend that the useful lifetime of DES would end in the late 1990s. In 2001, the<br />

Advanced Encryption Standard (AES), known as the Rijndael algorithm, became an FIPSapproved<br />

advanced symmetric cipher algorithm. AES will be a strong advanced algorithm<br />

in lieu of DES.<br />

The DES is now a basic security device employed by worldwide organisations. Therefore,<br />

it is likely that DES will continue to provide network communications, stored data,<br />

passwords and access control systems.<br />

3.1.1 Description of the Algorithm<br />

DES is the most notable example of a conventional cryptosystem. Since it has been well<br />

documented for over 20 years, it will not be discussed in detail here.<br />

DES is a symmetric block cipher, operating on 64-bit blocks using a 56-bit key. DES<br />

encrypts data in blocks of 64 bits. The input to the algorithm is a 64-bit block of plaintext<br />

and the output from the algorithm is a 64-bit block of ciphertext after 16 rounds of<br />

identical operations. The key length is 56 bits by stripping off the 8 parity bits, ignoring<br />

every eighth bit from the given 64-bit key.<br />

As with any block encryption scheme, there are two inputs to the encryption function:<br />

the 64-bit plaintext to be encrypted and the 56-bit key. The basic building block of DES is<br />

a suitable combination of permutation and substitution on the plaintext block (16 times).<br />

Substitution is accomplished via table lookups in S-boxes. Both encryption and decryption<br />

use the same algorithm except for processing the key schedule in the reverse order.<br />

The plaintext block X is first transposed under the initial permutation IP, giving<br />

X0 = IP(X) = (L0,R0). After passing through 16 rounds of permutation, XORs and substitutions,<br />

it is transposed under the inverse permutation IP −1 to generate the ciphertext<br />

block Y. If Xi = (Li,Ri) denotes the result of the ith round encryption, then we have<br />

Li = Ri−1<br />

Ri = Li−1 ⊕ f (Ri−1,Ki)<br />

The ith round encryption of DES algorithm is shown in Figure 3.1. The block diagram<br />

for computing the f(R,K)-function is shown in Figure 3.2. The decryption process can<br />

be derived from the encryption terms as follows:<br />

Ri−1 = Li<br />

Li−1 = Ri ⊕ f (Ri−1,Ki) = Ri ⊕ f (Li,Ki)<br />

If the output of the ith round encryption be Li||Ri, then the corresponding input to the<br />

(16–i)th round decryption is Ri||Li. The input to the first round decryption is equal to

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!