DES |
|||||
Figure : Depiction of DES Encryption Algorithm |
|||||
The
overall scheme for DES encryption is illustrated in the above figure
.There are two inputs to the encryption function : the plain text to be
encrypted and the key. In this case the plain text and the key are 64
bits in length. Looking at the left-hand side of the figure , we can see that the processing of the plaintext proceeds in three phases. First, the 64-bit plain text passes through an initial permutation that rearranges the bits to produce the permuted input. This is followed by a phase consisting of 16 rounds of the same function, which involves both permutation and substitution functions. The output of the last (sixteenth)( round consists of 64 bits that are functions of the input plaintext and the key. The left and the right halves of the output are swapped to the preoutput. Finally, the preoutput is passed through a permutation that is the inverse of the initial permutation function to produce the 64-bit ciphertext. Source : Cryptography and network security – William Stallings The VHDL code of the above system was simulated and this is the Screenshot. The key and the plaintext were both '0', ciphertext is obtained after 16 clock cycles.
|
|||||
Previous | Next | ||||
Introduction | RAM | ||||