Jump to content

Recommended Posts

Posted

First I'll give some context about how the book's written as many books are presenting it in different ways.

 

6IKCB9QS3FZ4KwwzIkVaQYsE_DUJ6d9xnfZa1OQkhzUCnwc8LpCfNgWtCBuLhnGpbVnHM3rqpHzltmMO8-P4htG7Uo4jYJvxikI_AP1WGHvxxDlwvRxVANl3aIXaceHPExeh44ele9kES8U_W0g3Cfg

V8T9n_cv2LjIgFEXGPTledk8M48ZhNa3V50cMMRJBXNtxPuJHdIwsEv0ZeTFgOGRqTmTgTRsP-55OrounO9dPCi_7qSccbk2bJJfSVrwSmbdVyVd93i1L3wMyqjMTUClp22Q631pj416_9NkCmuzy8ko1RhQQAXCPPjz8x6KQct1G6yeakWX1lK6JqRHaxzZyAg34NRi9qZOUgv3sfpJp7s3BB3kczW-dnOGgtm3ShH-YE7-jYJ0mR0IG-ZWbafSFJ6u6FT7kj-wtQ39HZ26XYFDFn_CTfYvczCEj3KFxFBq1w

D6HFuUQArM9jNcSLKRMQYfSpTvP4czqOyqJxJlOAL3b8ZUXL4mtD8XtnrJvJF3fMR2SEeuQC7zcA8WGfv2qy2XwgVOdziflOWaSFiOq0bmydZg002bs-pxUf7AVdlCg3ct7uF2_zT0n-35o8cpLUV7o

Lgw-d6Si9eOSKEE1uzgZAGD2iCJsQ6UGagNkll01c7yZS6usBrSmvCsFxNf1qsegiaad4BY9jrGytvTW6h5CVZlJ-LmA3OJ55-HcXv3zKmmz0wAXs8AI2l61hViZ7SwDnUnEQQYKzsgM5qsDHnX-77o

PFULY_2RbZyWnpy8_YMb0qH4HRJXy57JfYmvdezr41LfXcy02zOOyFwMGajH438LCZ4zToUy9xWu_AZkXfz7m2o7hYiy0DlulizSZWxw_y0zxlehdSs3riGeL-8ZgOmVnUyet0ojJWBcnORREbB7HmA

 

Reference: CRYPTOGRAPHY AND INFORMATION SECURITY, THIRD EDITION

By PACHGHARE, V. K.

 

Confusions:

 

1) Why is Expansion Permutation called so? The name sounds very contrary to what what you'd expect a Expansion Permutation to do.  You'd expect it to work like  say 4:16 decoder.


 

2) Why is Expansion Permutation done here? The  number of bits remained the same. What's the difference? Or are we calling after discarding parity bits as "Expansion Permutation"? 

 

3) Plus I'm reading some answers here and there. And I'm hearing that the information that I presented here is wrong.

 

4) One comment I saw in some other post is that, "(IP) and and (EP) are applied to the plaintext, not the key"

 

https://en.wikipedia.org/wiki/Data_Encryption_Standard

 

According to it,

 

alaG9gnm2o7ybLL77k4ceJoGws2b66jp8XaQiP_TqZlkv7_Z_6_eiQDFvyE-vhiQl_nOgL1CsX7qLbXUah5dMmJqLE-AEIVve57vdMpeeM7pZTzbXOUiI3SL85BLTmpwvMNYWyTfehTHBsM4D8V4R60

 

Quote

(this figure doesn't really illustrates anything that it claims below) Figure illustrates the key schedule for encryption—the algorithm which generates the subkeys. Initially, 56 bits of the key are selected from the initial 64 by Permuted Choice 1 (PC-1)—the remaining eight bits are either discarded or used as parity check bits. The 56 bits are then divided into two 28-bit halves; each half is thereafter treated separately. In successive rounds, both halves are rotated left by one or two bits (specified for each round), and then 48 subkey bits are selected by Permuted Choice 2 (PC-2)—24 bits from the left half, and 24 from the right. The rotations (denoted by "<<<" in the diagram) mean that a different set of bits is used in each subkey; each bit is used in approximately 14 out of the 16 subkeys.

 

Wikipedia vs my first source:

 

a) No initial permutation is done on key.

 

b) No expansion permutation is done

 

c) Only left shift happens, no right shift as shown in my first figure.


 

There're some other sources which seem to be taken from wikipedia and sound similar to it. They're given follows.

 

Others:

 

1) https://www.lri.fr/~fmartignon/documenti/systemesecurite/4-DES.pdf

 

Go to page 19.

 

So, which one should I believe? I think WikiPedia should be believed as many are copying from it, but I'm not sure. Which version is correct according to the actual DES?

2) lzavsgvtYEI1IOjFBjv3c9okGHOYr6H0G-8nyej_jciRmAicgfClT9S-n2Deed7aQFAr1hS0oiOS9WS3C3K_Wrnocfnw5eAerLjlxA620wQrN6nEvqFcxdXPipIa2esClGhglUN2rDHt1Khb1N_eY0Y

Source: https://academic.csuohio.edu/yuc/security/Chapter_06_Data_Encription_Standard.pdf

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.