SlideShare a Scribd company logo
1 of 36
Download to read offline
DES Supplementary Material
DES Supplementary Material
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
57 49 41 33 25 17 9
1 58 50 42 34 26 18
10 2 59 51 43 35 27
19 11 3 60 52 44 36
63 55 47 39 31 23 15
7 62 54 46 38 30 22
14 6 61 53 45 37 29
21 13 5 28 20 12 4
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
Key
#
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
Left
Shift
1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1
DES Supplementary Material
Permuted choice 1
Left Circular Shift
Left Circular Shift
Left Circular Shift
64-bit Key
Permuted choice 2
Permuted choice 2
Permuted choice 2
56 bit
56 bit
56 bit
56 bit
56 bit
56 bit
48 bit
48 bit
48 bit
K1
K2
K16
DES Supplementary Material
14 17 11 24 1 5
3 28 15 6 21 10
23 19 12 4 26 8
16 7 27 20 13 2
41 52 31 37 47 55
30 40 51 45 33 48
44 49 39 56 34 53
46 42 50 36 29 32
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
58 50 42 34 26 18 10 2
60 52 44 36 28 20 12 4
62 54 46 38 30 22 14 6
64 56 48 40 32 24 16 8
57 49 41 33 25 17 9 1
59 51 43 35 27 19 11 3
61 53 45 37 29 21 13 5
63 55 47 39 31 23 15 7
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ
Expansion Permutation
XOR ๐‘ฒ๐’Š
S-Box
Permutation
XOR
๐‘ณ๐’Š ๐‘น๐’Š
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ
Expansion Permutation
XOR ๐‘ฒ๐’Š
S-Box
Permutation
XOR
๐‘ณ๐’Š ๐‘น๐’Š
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 23 1
24 bit
24 bit
16 bit
16 bit
DES Supplementary Material
32 1 2 3 4 5
4 5 6 7 8 9
8 9 10 11 12 13
12 13 14 15 16 17
16 17 18 19 20 21
20 21 22 23 24 25
24 25 26 27 28 29
28 29 30 31 32 1
DES Supplementary Material
๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ
Expansion Permutation
XOR ๐‘ฒ๐’Š
S-Box
Permutation
XOR
๐‘ณ๐’Š ๐‘น๐’Š
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
24 bit
24 bit
16 bit
16 bit
S-Box 1 S-Box 2 S-Box 3 S-Box 4
S-Box 5 S-Box 6 S-Box 7 S-Box 8
DES Supplementary Material
0 1 2 . . . 15
0
1
2
3
S-Box
6 bits
4 bits
DES Supplementary Material
๏ฑ S-Box 1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7
1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8
2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0
3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
DES Supplementary Material
๏ฑ S-Box 2
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10
1 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5
2 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15
3 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
DES Supplementary Material
๏ฑ S-Box 3
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8
1 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1
2 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7
3 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
DES Supplementary Material
๏ฑ S-Box 4
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15
1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9
2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4
3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
DES Supplementary Material
๏ฑ S-Box 5
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9
1 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6
2 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14
3 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
DES Supplementary Material
๏ฑ S-Box 6
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11
1 10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8
2 9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6
3 4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
DES Supplementary Material
๏ฑ S-Box 7
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1
1 13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6
2 1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2
3 6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
DES Supplementary Material
๏ฑ S-Box 8
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
0 13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7
1 1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2
2 7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8
3 2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
DES Supplementary Material
๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ
Expansion Permutation
XOR ๐‘ฒ๐’Š
S-Box
Permutation
XOR
๐‘ณ๐’Š ๐‘น๐’Š
32 bit
48 bit 48 bit
48 bit
32 bit
32 bit
32 bit32 bit
32 bit
32 bit
DES Supplementary Material
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10
17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32
2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
DES Supplementary Material
16 7 20 21 29 12 28 17
1 15 23 26 5 18 31 10
2 8 24 14 32 27 3 9
19 13 30 6 22 11 4 25
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
40 8 48 16 56 24 64 32
39 7 47 15 55 23 63 31
38 6 46 14 54 22 62 30
37 5 45 13 53 21 61 29
36 4 44 12 52 20 60 28
35 3 43 11 51 19 59 27
34 2 42 10 50 18 58 26
33 1 41 9 49 17 57 25
DES Supplementary Material
Initial permutation
Round 1
Round 2
Round 16
32 bit Swap
Final permutation
64-bit Plain text
64-bit Cipher text
48 bit
48 bit
48 bit
K1
K2
K16
64 bit
64 bit
64 bit
64 bit
64 bit
DES Supplementary Material
facebook.com/mloey
mohamedloey@gmail.com
twitter.com/mloey
linkedin.com/in/mloey
mloey@fci.bu.edu.eg
mloey.github.io
DES Supplementary Material
www.YourCompany.com
ยฉ 2020 Companyname PowerPoint Business Theme. All Rights Reserved.
THANKS FOR
YOUR TIME

More Related Content

Viewers also liked

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseStephen Lahanas
ย 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi modelNoctorous Jamal
ย 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia SystemNew Era University
ย 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 securityNoctorous Jamal
ย 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And DecryptionNA
ย 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2AfiqEfendy Zaen
ย 
Multimedia
MultimediaMultimedia
MultimediaSean Chia
ย 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Securitybabak danyal
ย 
C++ Programming Language
C++ Programming Language C++ Programming Language
C++ Programming Language Mohamed Loey
ย 
01 c++ Intro.ppt
01 c++ Intro.ppt01 c++ Intro.ppt
01 c++ Intro.pptTareq Hasan
ย 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
ย 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewMohamed Loey
ย 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionZakriya Ali Sabir
ย 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring toolsOnline
ย 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITYAhmed Moussa
ย 

Viewers also liked (20)

Semantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the EnterpriseSemantech: IT Architecture in the Enterprise
Semantech: IT Architecture in the Enterprise
ย 
Hashing
HashingHashing
Hashing
ย 
Chap 01 intro
Chap 01 introChap 01 intro
Chap 01 intro
ย 
Chap 26 vpn
Chap 26 vpnChap 26 vpn
Chap 26 vpn
ย 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
ย 
31. Multimedia System
31. Multimedia System31. Multimedia System
31. Multimedia System
ย 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
ย 
Encryption And Decryption
Encryption And DecryptionEncryption And Decryption
Encryption And Decryption
ย 
Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2Basic Encryption Decryption Chapter 2
Basic Encryption Decryption Chapter 2
ย 
Multimedia
MultimediaMultimedia
Multimedia
ย 
Classical Encryption Techniques in Network Security
Classical Encryption Techniques in Network SecurityClassical Encryption Techniques in Network Security
Classical Encryption Techniques in Network Security
ย 
C++ Programming Language
C++ Programming Language C++ Programming Language
C++ Programming Language
ย 
01 c++ Intro.ppt
01 c++ Intro.ppt01 c++ Intro.ppt
01 c++ Intro.ppt
ย 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
ย 
Computer Security Lecture 1: Overview
Computer Security Lecture 1: OverviewComputer Security Lecture 1: Overview
Computer Security Lecture 1: Overview
ย 
Affine Cypher Encryption - Decryption
Affine Cypher Encryption - DecryptionAffine Cypher Encryption - Decryption
Affine Cypher Encryption - Decryption
ย 
Multimedia authoring tools
Multimedia authoring toolsMultimedia authoring tools
Multimedia authoring tools
ย 
Introduction to multimedia
Introduction to multimediaIntroduction to multimedia
Introduction to multimedia
ย 
Multimedia
MultimediaMultimedia
Multimedia
ย 
INFORMATION SECURITY
INFORMATION SECURITYINFORMATION SECURITY
INFORMATION SECURITY
ย 

Similar to Computer Security Lecture 4.1: DES Supplementary Material

Data encryption standard
Data encryption standardData encryption standard
Data encryption standardMohammad Golyani
ย 
ch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).pptch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).pptMrsPrabhaBV
ย 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)Amir Masinaei
ย 
CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)Jinho Choi
ย 
Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques Alexander Litvinenko
ย 
13 14 mathcounts-students version
13 14 mathcounts-students version13 14 mathcounts-students version
13 14 mathcounts-students versionT Mordo Hollo
ย 
Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...Alexander Litvinenko
ย 

Similar to Computer Security Lecture 4.1: DES Supplementary Material (11)

Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
ย 
ch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).pptch03_block_ciphers_nemo (2) (1).ppt
ch03_block_ciphers_nemo (2) (1).ppt
ย 
Data Encryption Standard
Data Encryption StandardData Encryption Standard
Data Encryption Standard
ย 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
ย 
CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)CS253: Distribution-based Sort (2019)
CS253: Distribution-based Sort (2019)
ย 
Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques Overview of sparse and low-rank matrix / tensor techniques
Overview of sparse and low-rank matrix / tensor techniques
ย 
Ctrie Data Structure
Ctrie Data StructureCtrie Data Structure
Ctrie Data Structure
ย 
13 14 mathcounts-students version
13 14 mathcounts-students version13 14 mathcounts-students version
13 14 mathcounts-students version
ย 
Millionaire tools. Chapter 1
Millionaire tools. Chapter 1Millionaire tools. Chapter 1
Millionaire tools. Chapter 1
ย 
Millionaire CHAPTER 1. Review your knowledge
Millionaire CHAPTER 1. Review your knowledgeMillionaire CHAPTER 1. Review your knowledge
Millionaire CHAPTER 1. Review your knowledge
ย 
Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...Identification of unknown parameters and prediction of missing values. Compar...
Identification of unknown parameters and prediction of missing values. Compar...
ย 

More from Mohamed Loey

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsMohamed Loey
ย 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsMohamed Loey
ย 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksMohamed Loey
ย 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksMohamed Loey
ย 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksMohamed Loey
ย 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkMohamed Loey
ย 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionMohamed Loey
ย 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesMohamed Loey
ย 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Mohamed Loey
ย 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
ย 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsMohamed Loey
ย 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsMohamed Loey
ย 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsMohamed Loey
ย 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIMohamed Loey
ย 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IMohamed Loey
ย 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIMohamed Loey
ย 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IMohamed Loey
ย 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsMohamed Loey
ย 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningMohamed Loey
ย 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work IIMohamed Loey
ย 

More from Mohamed Loey (20)

Lecture 6: Deep Learning Applications
Lecture 6: Deep Learning ApplicationsLecture 6: Deep Learning Applications
Lecture 6: Deep Learning Applications
ย 
Lecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network ModelsLecture 5: Convolutional Neural Network Models
Lecture 5: Convolutional Neural Network Models
ย 
Lecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning FrameworksLecture 4: Deep Learning Frameworks
Lecture 4: Deep Learning Frameworks
ย 
Lecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural NetworksLecture 4: How it Works: Convolutional Neural Networks
Lecture 4: How it Works: Convolutional Neural Networks
ย 
Lecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural NetworksLecture 3: Convolutional Neural Networks
Lecture 3: Convolutional Neural Networks
ย 
Lecture 2: Artificial Neural Network
Lecture 2: Artificial Neural NetworkLecture 2: Artificial Neural Network
Lecture 2: Artificial Neural Network
ย 
Lecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer VisionLecture 1: Deep Learning for Computer Vision
Lecture 1: Deep Learning for Computer Vision
ย 
Design of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer DiseasesDesign of an Intelligent System for Improving Classification of Cancer Diseases
Design of an Intelligent System for Improving Classification of Cancer Diseases
ย 
Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2Computer Security - CCNA Security - Lecture 2
Computer Security - CCNA Security - Lecture 2
ย 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
ย 
Algorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern AlgorithmsAlgorithms Lecture 8: Pattern Algorithms
Algorithms Lecture 8: Pattern Algorithms
ย 
Algorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph AlgorithmsAlgorithms Lecture 7: Graph Algorithms
Algorithms Lecture 7: Graph Algorithms
ย 
Algorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching AlgorithmsAlgorithms Lecture 6: Searching Algorithms
Algorithms Lecture 6: Searching Algorithms
ย 
Algorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms IIAlgorithms Lecture 5: Sorting Algorithms II
Algorithms Lecture 5: Sorting Algorithms II
ย 
Algorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms IAlgorithms Lecture 4: Sorting Algorithms I
Algorithms Lecture 4: Sorting Algorithms I
ย 
Algorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms IIAlgorithms Lecture 3: Analysis of Algorithms II
Algorithms Lecture 3: Analysis of Algorithms II
ย 
Algorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms IAlgorithms Lecture 2: Analysis of Algorithms I
Algorithms Lecture 2: Analysis of Algorithms I
ย 
Algorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to AlgorithmsAlgorithms Lecture 1: Introduction to Algorithms
Algorithms Lecture 1: Introduction to Algorithms
ย 
Convolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep LearningConvolutional Neural Network Models - Deep Learning
Convolutional Neural Network Models - Deep Learning
ย 
Deep Learning - Overview of my work II
Deep Learning - Overview of my work IIDeep Learning - Overview of my work II
Deep Learning - Overview of my work II
ย 

Recently uploaded

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
ย 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxleah joy valeriano
ย 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...JojoEDelaCruz
ย 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfErwinPantujan2
ย 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
ย 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
ย 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptshraddhaparab530
ย 
USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
ย 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
ย 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4JOYLYNSAMANIEGO
ย 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
ย 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beรฑa
ย 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beรฑa
ย 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
ย 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsManeerUddin
ย 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
ย 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
ย 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
ย 

Recently uploaded (20)

How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
ย 
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptxMusic 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
Music 9 - 4th quarter - Vocal Music of the Romantic Period.pptx
ย 
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...
ENG 5 Q4 WEEk 1 DAY 1 Restate sentences heard in oneโ€™s own words. Use appropr...
ย 
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdfVirtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
Virtual-Orientation-on-the-Administration-of-NATG12-NATG6-and-ELLNA.pdf
ย 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
ย 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ย 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
ย 
Integumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.pptIntegumentary System SMP B. Pharm Sem I.ppt
Integumentary System SMP B. Pharm Sem I.ppt
ย 
USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPSยฎ Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
ย 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
ย 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
ย 
Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4Daily Lesson Plan in Mathematics Quarter 4
Daily Lesson Plan in Mathematics Quarter 4
ย 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
ย 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
ย 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
ย 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
ย 
Food processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture honsFood processing presentation for bsc agriculture hons
Food processing presentation for bsc agriculture hons
ย 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ย 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
ย 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
ย 

Computer Security Lecture 4.1: DES Supplementary Material

  • 1. DES Supplementary Material DES Supplementary Material
  • 2. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 3. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 4. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 5. DES Supplementary Material 57 49 41 33 25 17 9 1 58 50 42 34 26 18 10 2 59 51 43 35 27 19 11 3 60 52 44 36 63 55 47 39 31 23 15 7 62 54 46 38 30 22 14 6 61 53 45 37 29 21 13 5 28 20 12 4
  • 6. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 7. DES Supplementary Material Key # 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 Left Shift 1 1 2 2 2 2 2 2 1 2 2 2 2 2 2 1
  • 8. DES Supplementary Material Permuted choice 1 Left Circular Shift Left Circular Shift Left Circular Shift 64-bit Key Permuted choice 2 Permuted choice 2 Permuted choice 2 56 bit 56 bit 56 bit 56 bit 56 bit 56 bit 48 bit 48 bit 48 bit K1 K2 K16
  • 9. DES Supplementary Material 14 17 11 24 1 5 3 28 15 6 21 10 23 19 12 4 26 8 16 7 27 20 13 2 41 52 31 37 47 55 30 40 51 45 33 48 44 49 39 56 34 53 46 42 50 36 29 32
  • 10. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 11. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 12. DES Supplementary Material 58 50 42 34 26 18 10 2 60 52 44 36 28 20 12 4 62 54 46 38 30 22 14 6 64 56 48 40 32 24 16 8 57 49 41 33 25 17 9 1 59 51 43 35 27 19 11 3 61 53 45 37 29 21 13 5 63 55 47 39 31 23 15 7
  • 13. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 14. DES Supplementary Material ๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ Expansion Permutation XOR ๐‘ฒ๐’Š S-Box Permutation XOR ๐‘ณ๐’Š ๐‘น๐’Š 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 15. DES Supplementary Material ๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ Expansion Permutation XOR ๐‘ฒ๐’Š S-Box Permutation XOR ๐‘ณ๐’Š ๐‘น๐’Š 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 16. DES Supplementary Material 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 23 1 24 bit 24 bit 16 bit 16 bit
  • 17. DES Supplementary Material 32 1 2 3 4 5 4 5 6 7 8 9 8 9 10 11 12 13 12 13 14 15 16 17 16 17 18 19 20 21 20 21 22 23 24 25 24 25 26 27 28 29 28 29 30 31 32 1
  • 18. DES Supplementary Material ๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ Expansion Permutation XOR ๐‘ฒ๐’Š S-Box Permutation XOR ๐‘ณ๐’Š ๐‘น๐’Š 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 19. DES Supplementary Material 24 bit 24 bit 16 bit 16 bit S-Box 1 S-Box 2 S-Box 3 S-Box 4 S-Box 5 S-Box 6 S-Box 7 S-Box 8
  • 20. DES Supplementary Material 0 1 2 . . . 15 0 1 2 3 S-Box 6 bits 4 bits
  • 21. DES Supplementary Material ๏ฑ S-Box 1 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 14 4 13 1 2 15 11 8 3 10 6 12 5 9 0 7 1 0 15 7 4 14 2 13 1 10 6 12 11 9 5 3 8 2 4 1 14 8 13 6 2 11 15 12 9 7 3 10 5 0 3 15 12 8 2 4 9 1 7 5 11 3 14 10 0 6 13
  • 22. DES Supplementary Material ๏ฑ S-Box 2 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 15 1 8 14 6 11 3 4 9 7 2 13 12 0 5 10 1 3 13 4 7 15 2 8 14 12 0 1 10 6 9 11 5 2 0 14 7 11 10 4 13 1 5 8 12 6 9 3 2 15 3 13 8 10 1 3 15 4 2 11 6 7 12 0 5 14 9
  • 23. DES Supplementary Material ๏ฑ S-Box 3 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 10 0 9 14 6 3 15 5 1 13 12 7 11 4 2 8 1 13 7 0 9 3 4 6 10 2 8 5 14 12 11 15 1 2 13 6 4 9 8 15 3 0 11 1 2 12 5 10 14 7 3 1 10 13 0 6 9 8 7 4 15 14 3 11 5 2 12
  • 24. DES Supplementary Material ๏ฑ S-Box 4 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 7 13 14 3 0 6 9 10 1 2 8 5 11 12 4 15 1 13 8 11 5 6 15 0 3 4 7 2 12 1 10 14 9 2 10 6 9 0 12 11 7 13 15 1 3 14 5 2 8 4 3 3 15 0 6 10 1 13 8 9 4 5 11 12 7 2 14
  • 25. DES Supplementary Material ๏ฑ S-Box 5 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 2 12 4 1 7 10 11 6 8 5 3 15 13 0 14 9 1 14 11 2 12 4 7 13 1 5 0 15 10 3 9 8 6 2 4 2 1 11 10 13 7 8 15 9 12 5 6 3 0 14 3 11 8 12 7 1 14 2 13 6 15 0 9 10 4 5 3
  • 26. DES Supplementary Material ๏ฑ S-Box 6 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 12 1 10 15 9 2 6 8 0 13 3 4 14 7 5 11 1 10 15 4 2 7 12 9 5 6 1 13 14 0 11 3 8 2 9 14 15 5 2 8 12 3 7 0 4 10 1 13 11 6 3 4 3 2 12 9 5 15 10 11 14 1 7 6 0 8 13
  • 27. DES Supplementary Material ๏ฑ S-Box 7 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 4 11 2 14 15 0 8 13 3 12 9 7 5 10 6 1 1 13 0 11 7 4 9 1 10 14 3 5 12 2 15 8 6 2 1 4 11 13 12 3 7 14 10 15 6 8 0 5 9 2 3 6 11 13 8 1 4 10 7 9 5 0 15 14 2 3 12
  • 28. DES Supplementary Material ๏ฑ S-Box 8 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 13 2 8 4 6 15 11 1 10 9 3 14 5 0 12 7 1 1 15 13 8 10 3 7 4 12 5 6 11 0 14 9 2 2 7 11 4 1 9 12 14 2 0 6 10 13 15 3 5 8 3 2 1 14 7 4 10 8 13 15 12 9 0 3 5 6 11
  • 29. DES Supplementary Material ๐‘ณ๐’Šโˆ’๐Ÿ ๐‘น๐’Šโˆ’๐Ÿ Expansion Permutation XOR ๐‘ฒ๐’Š S-Box Permutation XOR ๐‘ณ๐’Š ๐‘น๐’Š 32 bit 48 bit 48 bit 48 bit 32 bit 32 bit 32 bit32 bit 32 bit 32 bit
  • 30. DES Supplementary Material 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
  • 31. DES Supplementary Material 16 7 20 21 29 12 28 17 1 15 23 26 5 18 31 10 2 8 24 14 32 27 3 9 19 13 30 6 22 11 4 25
  • 32. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 33. DES Supplementary Material 40 8 48 16 56 24 64 32 39 7 47 15 55 23 63 31 38 6 46 14 54 22 62 30 37 5 45 13 53 21 61 29 36 4 44 12 52 20 60 28 35 3 43 11 51 19 59 27 34 2 42 10 50 18 58 26 33 1 41 9 49 17 57 25
  • 34. DES Supplementary Material Initial permutation Round 1 Round 2 Round 16 32 bit Swap Final permutation 64-bit Plain text 64-bit Cipher text 48 bit 48 bit 48 bit K1 K2 K16 64 bit 64 bit 64 bit 64 bit 64 bit
  • 36. DES Supplementary Material www.YourCompany.com ยฉ 2020 Companyname PowerPoint Business Theme. All Rights Reserved. THANKS FOR YOUR TIME