Data Encryption Standard Confusion

In summary, the book discusses how to encrypt data using the Data Encryption Standard. It explains the different steps involved and provides examples.
  • #1
Homework Statement
Confusions on what is actual DES
Relevant Equations
None
First I'll give some context about how the book's written as many books are presenting it in different ways.

P1WGHvxxDlwvRxVANl3aIXaceHPExeh44ele9kES8U_W0g3Cfg.png

VrwSmbdVyVd93i1L3wMyqjMTUClp22Q631pj416_9NkCmuzy8k.png
bafSFJ6u6FT7kj-wtQ39HZ26XYFDFn_CTfYvczCEj3KFxFBq1w.png

Oq0bmydZg002bs-pxUf7AVdlCg3ct7uF2_zT0n-35o8cpLUV7o.png

v3zKmmz0wAXs8AI2l61hViZ7SwDnUnEQQYKzsgM5qsDHnX-77o.png

Wxw_y0zxlehdSs3riGeL-8ZgOmVnUyet0ojJWBcnORREbB7HmA.png


Reference: CRYPTOGRAPHY AND INFORMATION SECURITY, THIRD EDITION
By PACHGHARE, V. K.

Confusions:

1) Why is Expansion Permutation called so? The name sounds very contrary to what what you'd expect a Expansion Permutation to do. You'd expect it to work like say 4:16 decoder.2) Why is Expansion Permutation done here? The number of bits remained the same. What's the difference? Or are we calling after discarding parity bits as "Expansion Permutation"?

3) Plus I'm reading some answers here and there. And I'm hearing that the information that I presented here is wrong.

4) One comment I saw in some other post is that, "(IP) and and (EP) are applied to the plaintext, not the key"

https://en.wikipedia.org/wiki/Data_Encryption_Standard

According to it,

MpeeM7pZTzbXOUiI3SL85BLTmpwvMNYWyTfehTHBsM4D8V4R60.png


(this figure doesn't really illustrates anything that it claims below) Figure illustrates the key schedule for encryption—the algorithm which generates the subkeys. Initially, 56 bits of the key are selected from the initial 64 by Permuted Choice 1 (PC-1)—the remaining eight bits are either discarded or used as parity check bits. The 56 bits are then divided into two 28-bit halves; each half is thereafter treated separately. In successive rounds, both halves are rotated left by one or two bits (specified for each round), and then 48 subkey bits are selected by Permuted Choice 2 (PC-2)—24 bits from the left half, and 24 from the right. The rotations (denoted by "<<<" in the diagram) mean that a different set of bits is used in each subkey; each bit is used in approximately 14 out of the 16 subkeys.

Wikipedia vs my first source:

a) No initial permutation is done on key.

b) No expansion permutation is done

c) Only left shift happens, no right shift as shown in my first figure.There're some other sources which seem to be taken from wikipedia and sound similar to it. They're given follows.

Others:

1) https://www.lri.fr/~fmartignon/documenti/systemesecurite/4-DES.pdf

Go to page 19.

So, which one should I believe? I think WikiPedia should be believed as many are copying from it, but I'm not sure. Which version is correct according to the actual DES?
2)
A620wQrN6nEvqFcxdXPipIa2esClGhglUN2rDHt1Khb1N_eY0Y.png

Source: https://academic.csuohio.edu/yuc/security/Chapter_06_Data_Encription_Standard.pdf
 
Physics news on Phys.org
  • #2
shivajikobardan said:
1) Why is Expansion Permutation called so? The name sounds very contrary to what what you'd expect a Expansion Permutation to do. You'd expect it to work like say 4:16 decoder.

2) Why is Expansion Permutation done here? The number of bits remained the same. What's the difference? Or are we calling after discarding parity bits as "Expansion Permutation"?

3) Plus I'm reading some answers here and there. And I'm hearing that the information that I presented here is wrong.
It is called expansion because one stream of parallel key bits becomes two streams of parallel key bits, that travel separately. It is not related to the total number of bits.
 
  • #3
Baluncore said:
It is called expansion because one stream of parallel key bits becomes two streams of parallel key bits, that travel separately. It is not related to the total number of bits.
Yes, I learned the definition of it, But it hasn't been used like that here, probably wrongly written book.
 

Suggested for: Data Encryption Standard Confusion

Replies
3
Views
892
Replies
8
Views
748
Replies
3
Views
879
Replies
59
Views
3K
Replies
3
Views
1K
Replies
3
Views
886
Replies
11
Views
896
Replies
1
Views
905
Replies
4
Views
175
Replies
3
Views
700
Back
Top