The Data Security Standard (DES) is a ancient encryption duodecimal system with a 56 bit key element length. They have played an essential role in the development of cryptography and leaves its draw on today’s security systems. Nevertheless , the DES algorithm has its own serious flaws that can be exploited with sufficient computing vitality. In this article, we can explore the DES algorithm steps and shed light on the operation, important transformation and encryption process.

In a nutshell, the DES algorithm turns a 64 bit message wedge M into a 64 bit cipher mass C. This really is done by using a series of sixteen rounds. Each rounded of KKLK encryption needs a different sort of subkey. Furthermore, each of the 64 bits inside the message stop M relies on each of the previous principles blocks by using a initial XOR function.

All the 32 bit halves of the cipher block are expanded to 48 bits by using a great expansion échange function. This really is combined with the subkey to produce a last 48 bit cipher stop. This is after that XORed with all the original sales message block to develop the protected text.

For making brute force attacks more complicated, the message block is normally XORed with itself too many times. This is called a chaining or CBC function of DES encryption.