Question

In: Computer Science

Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption...

Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption Standard (AES) is the current NIST standard for encryption and is used in most applications. Explain the differences between the following concepts as they apply to both algorithms.

Concept

DES

AES

S-BOX

Permutation

Key Size

Solutions

Expert Solution

Q Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption Standard (AES) is the current NIST standard for encryption and is used in most applications. Explain the differences between the following concepts as they apply to both algorithms.

Ans: Firstly let's know about the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) .

DES: It stands for the Data Encryption Standard.It is an algorithm for the symmetric-key of the  encryption of digital data.It is used for the cryptography.It has the key length of the 56 bits.The DES has the symmetric key block cipher.It basically takes the  64-bit plain text and 56-bit key , that produce the 64-bit Cipher text.

AES:It stands for the Advanced Encryption Standard.It is basically the secure and the fast encryption Standard that basically keeps prying eyes away from our data. AES  was basically introduced to replace the DES because we know that it uses very small cipher key and thus ,the algorithm was quite slower.It uses the S-BOX that performs the byte to byte substitution in the entire block (matrix).

Now let's see the differences between the following concepts of the DES and the AES:

Parameter DES AES

1.Key Length It's Key length is of 56 bits. It's key length varies from 128 bits,

192 bits to 256 bits.

2. Size It can encrypt 64 bits of plain text. It can encrypt 128 bits of plain text.

3. Network It's structure is based on the feistal network. it's structure is based on substitution-permutation network.

4. Rounds of Operations It perform 16 rounds of identical operations. It has the following rounds per key length:  128 bits - 10, 192 bits - 12, 256 bits - 14.

5. Security   It is basically week and in this the Triple DES(3DES) more secure as compare to the DES.

AES is more secure than the DES ,it has the de-facto world standard.

6 Derived from It  derives from Lucifer cipher. It derives from Square cipher.

S-BOX: It stands for the substitution-box.It perform the important role in the AES algorithm.That provides the confusion between the cipher text[10,11].Basically the main function of the AES is to with the use of the  a precomputed look-up-table (LUT) it has to transforms the 8 bits input data into 8 bits secret data.

In the DES , the S-BOX basically carry the  real mixing (confusion).In the DES it uses the 8 S-boxes, for each one with a 6-bit input and a 4-bit output.

Principle :

AES:  The Advanced Encryption Standard is basically works on the  Substitution and Permutation Principle.

DES: The Data Encryption Standard basically  work on Feistel Cipher structure.

THANKS, i think this will give you a better intuition about your question.If you have any doubt feel free to ask in the comment section.


Related Solutions

Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is...
Perform a Web search for “Announcing the Advanced Encryption Standard (AES).” Read this document, which is a FIPS 197 standard. Write a short overview of the development and implementation of this cryptosystem. Your response must include the type of Algorithm used, the size of data blocks that can be processed, and the lengths of the cipher keys.
Describe in detail the encryption and decryption process for Simplified DES by showing your results at...
Describe in detail the encryption and decryption process for Simplified DES by showing your results at each step Details of decryption process: input: 10 bit key = 1 1 1 1 1 1 1 1 1 1 and 8 bit plaintext = 0 0 0 0 0 0 0 0 Output from IP = Output from first Fk using K2 = Output from SW = Output from first Fk using K1 = Output from IP-1 =
Secret-Key Encryption Lab
Secret-Key Encryption Lab
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and...
Cryptography*** Let’s assume you do DES double encryption by encrypting a plaintext twice with K1 and K2 respectively. Is this method more secure than the regular single DES encryption? Please explain your reason.
What is the name of the revolutionary key exchange that creates an encryption key, but only...
What is the name of the revolutionary key exchange that creates an encryption key, but only transmits enough information across the wire to encrypt and decrypt messages, without ever sharing the key itself across the wire? Group of answer choices Alice and Bob key exchange Sarbanes-Oxley key exchange Diffle-Hellman key exchange Whitfield-Martin key exchange
What are two types of encryption for wireless networks? Which encryption standard is considered to be...
What are two types of encryption for wireless networks? Which encryption standard is considered to be more secure? Why? The property written in the format 00:00:00:0A:0B:0C for a device is called its ______________. Why should you disable the SSID on a wireless network? What is an evil twin attack? Why would you disable a Bluetooth device when you are in a public place? What happens when you jailbreak or root a device? What potential problems are caused by jailbreaking or...
Which of the following best describes the primary key? Select one: a. It's the encryption key...
Which of the following best describes the primary key? Select one: a. It's the encryption key that gets exchanged first with another party. b. It's the password that needs to be entered to open the database. c. It's the first item that is entered into the database on a screen. d. It's a field that uniquely identifies the record.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT