Data Encryption Standard Confusion

Click For Summary
SUMMARY

The discussion centers on the Data Encryption Standard (DES) and specifically addresses confusion surrounding the terms "Expansion Permutation" and its application within the algorithm. Participants highlight discrepancies between various sources, including the book "Cryptography and Information Security" by V. K. Pachghare and Wikipedia. Key points include the clarification that Expansion Permutation refers to the transformation of key bits into separate streams, rather than an increase in total bit count. The conversation emphasizes the importance of accurate definitions and the need for reliable references when studying cryptographic algorithms.

PREREQUISITES
  • Understanding of cryptographic algorithms, specifically DES
  • Familiarity with key scheduling techniques in encryption
  • Knowledge of permutation and bit manipulation concepts
  • Ability to analyze and compare cryptographic literature
NEXT STEPS
  • Study the mechanics of DES key scheduling, including Permuted Choice 1 (PC-1) and Permuted Choice 2 (PC-2)
  • Research the role of Expansion Permutation in DES and its implications on security
  • Examine the differences between various sources discussing DES, including academic papers and reputable online resources
  • Learn about the historical context and evolution of DES in cryptographic practices
USEFUL FOR

Cryptography students, security professionals, and anyone involved in the study or implementation of encryption algorithms will benefit from this discussion, particularly those seeking clarity on DES and its operational intricacies.

shivajikobardan
Messages
637
Reaction score
54
Homework Statement
Confusions on what is actual DES
Relevant Equations
None
First I'll give some context about how the book's written as many books are presenting it in different ways.

P1WGHvxxDlwvRxVANl3aIXaceHPExeh44ele9kES8U_W0g3Cfg.png

VrwSmbdVyVd93i1L3wMyqjMTUClp22Q631pj416_9NkCmuzy8k.png
bafSFJ6u6FT7kj-wtQ39HZ26XYFDFn_CTfYvczCEj3KFxFBq1w.png

Oq0bmydZg002bs-pxUf7AVdlCg3ct7uF2_zT0n-35o8cpLUV7o.png

v3zKmmz0wAXs8AI2l61hViZ7SwDnUnEQQYKzsgM5qsDHnX-77o.png

Wxw_y0zxlehdSs3riGeL-8ZgOmVnUyet0ojJWBcnORREbB7HmA.png


Reference: CRYPTOGRAPHY AND INFORMATION SECURITY, THIRD EDITION
By PACHGHARE, V. K.

Confusions:

1) Why is Expansion Permutation called so? The name sounds very contrary to what what you'd expect a Expansion Permutation to do. You'd expect it to work like say 4:16 decoder.2) Why is Expansion Permutation done here? The number of bits remained the same. What's the difference? Or are we calling after discarding parity bits as "Expansion Permutation"?

3) Plus I'm reading some answers here and there. And I'm hearing that the information that I presented here is wrong.

4) One comment I saw in some other post is that, "(IP) and and (EP) are applied to the plaintext, not the key"

https://en.wikipedia.org/wiki/Data_Encryption_Standard

According to it,

MpeeM7pZTzbXOUiI3SL85BLTmpwvMNYWyTfehTHBsM4D8V4R60.png


(this figure doesn't really illustrates anything that it claims below) Figure illustrates the key schedule for encryption—the algorithm which generates the subkeys. Initially, 56 bits of the key are selected from the initial 64 by Permuted Choice 1 (PC-1)—the remaining eight bits are either discarded or used as parity check bits. The 56 bits are then divided into two 28-bit halves; each half is thereafter treated separately. In successive rounds, both halves are rotated left by one or two bits (specified for each round), and then 48 subkey bits are selected by Permuted Choice 2 (PC-2)—24 bits from the left half, and 24 from the right. The rotations (denoted by "<<<" in the diagram) mean that a different set of bits is used in each subkey; each bit is used in approximately 14 out of the 16 subkeys.

Wikipedia vs my first source:

a) No initial permutation is done on key.

b) No expansion permutation is done

c) Only left shift happens, no right shift as shown in my first figure.There're some other sources which seem to be taken from wikipedia and sound similar to it. They're given follows.

Others:

1) https://www.lri.fr/~fmartignon/documenti/systemesecurite/4-DES.pdf

Go to page 19.

So, which one should I believe? I think WikiPedia should be believed as many are copying from it, but I'm not sure. Which version is correct according to the actual DES?
2)
A620wQrN6nEvqFcxdXPipIa2esClGhglUN2rDHt1Khb1N_eY0Y.png

Source: https://academic.csuohio.edu/yuc/security/Chapter_06_Data_Encription_Standard.pdf
 
Physics news on Phys.org
shivajikobardan said:
1) Why is Expansion Permutation called so? The name sounds very contrary to what what you'd expect a Expansion Permutation to do. You'd expect it to work like say 4:16 decoder.

2) Why is Expansion Permutation done here? The number of bits remained the same. What's the difference? Or are we calling after discarding parity bits as "Expansion Permutation"?

3) Plus I'm reading some answers here and there. And I'm hearing that the information that I presented here is wrong.
It is called expansion because one stream of parallel key bits becomes two streams of parallel key bits, that travel separately. It is not related to the total number of bits.
 
Baluncore said:
It is called expansion because one stream of parallel key bits becomes two streams of parallel key bits, that travel separately. It is not related to the total number of bits.
Yes, I learned the definition of it, But it hasn't been used like that here, probably wrongly written book.
 

Similar threads

  • · Replies 5 ·
Replies
5
Views
3K
  • · Replies 94 ·
4
Replies
94
Views
12K
  • · Replies 2 ·
Replies
2
Views
10K