Question

In: Computer Science

Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption...

Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption Standard (AES) is the current NIST standard for encryption and is used in most applications. Explain the differences between the following concepts as they apply to both algorithms.

Concept

DES

AES

S-BOX

Permutation

Key Size

Solutions

Expert Solution

Q Data Encryption Standard (DES) is insecure because of the size of the encryption key. Advanced Encryption Standard (AES) is the current NIST standard for encryption and is used in most applications. Explain the differences between the following concepts as they apply to both algorithms.

Ans: Firstly let's know about the Data Encryption Standard (DES) and the Advanced Encryption Standard (AES) .

DES: It stands for the Data Encryption Standard.It is an algorithm for the symmetric-key of the  encryption of digital data.It is used for the cryptography.It has the key length of the 56 bits.The DES has the symmetric key block cipher.It basically takes the  64-bit plain text and 56-bit key , that produce the 64-bit Cipher text.

AES:It stands for the Advanced Encryption Standard.It is basically the secure and the fast encryption Standard that basically keeps prying eyes away from our data. AES  was basically introduced to replace the DES because we know that it uses very small cipher key and thus ,the algorithm was quite slower.It uses the S-BOX that performs the byte to byte substitution in the entire block (matrix).

Now let's see the differences between the following concepts of the DES and the AES:

Parameter DES AES

1.Key Length It's Key length is of 56 bits. It's key length varies from 128 bits,

192 bits to 256 bits.

2. Size It can encrypt 64 bits of plain text. It can encrypt 128 bits of plain text.

3. Network It's structure is based on the feistal network. it's structure is based on substitution-permutation network.

4. Rounds of Operations It perform 16 rounds of identical operations. It has the following rounds per key length:  128 bits - 10, 192 bits - 12, 256 bits - 14.

5. Security   It is basically week and in this the Triple DES(3DES) more secure as compare to the DES.

AES is more secure than the DES ,it has the de-facto world standard.

6 Derived from It  derives from Lucifer cipher. It derives from Square cipher.

S-BOX: It stands for the substitution-box.It perform the important role in the AES algorithm.That provides the confusion between the cipher text[10,11].Basically the main function of the AES is to with the use of the  a precomputed look-up-table (LUT) it has to transforms the 8 bits input data into 8 bits secret data.

In the DES , the S-BOX basically carry the  real mixing (confusion).In the DES it uses the 8 S-boxes, for each one with a 6-bit input and a 4-bit output.

Principle :

AES:  The Advanced Encryption Standard is basically works on the  Substitution and Permutation Principle.

DES: The Data Encryption Standard basically  work on Feistel Cipher structure.

THANKS, i think this will give you a better intuition about your question.If you have any doubt feel free to ask in the comment section.


Related Solutions

Secret-Key Encryption Lab
Secret-Key Encryption Lab
1. Bob wants to use DES to make a secured communication with Alice using DES key...
1. Bob wants to use DES to make a secured communication with Alice using DES key ‘Kb’ to encrypt and decrypt data. Bob uses PKI method to distribute the DES key to Alice. If Alice private key is ‘Kpa’, and her public key is ‘Kpb’. Please describe the process that Bob can send his DES key ‘Kb’ to Alice securely. 2. You receive a message that was encoded using a block encoding scheme with the encoding matrix M=3275 Verify by...
What is the name of the revolutionary key exchange that creates an encryption key, but only...
What is the name of the revolutionary key exchange that creates an encryption key, but only transmits enough information across the wire to encrypt and decrypt messages, without ever sharing the key itself across the wire? Group of answer choices Alice and Bob key exchange Sarbanes-Oxley key exchange Diffle-Hellman key exchange Whitfield-Martin key exchange
Which of the following best describes the primary key? Select one: a. It's the encryption key...
Which of the following best describes the primary key? Select one: a. It's the encryption key that gets exchanged first with another party. b. It's the password that needs to be entered to open the database. c. It's the first item that is entered into the database on a screen. d. It's a field that uniquely identifies the record.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. We have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Alice and Bob. Include a diagram.
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem...
Hybrid encryption combines the convenience of a public-key cryptosystem with the efficiency of a symmetric-key cryptosystem and it is used in both TLS and SSL. Say we have the secured RSA and AES available, show how to use hybrid encryption to encrypt a message m= m1m2m3m4m5 with 640 bits without a pre-shared secret between Jane and Karl. Show and explain every step involved.
When sending a large set of files, would you use symmetric key encryption or asymmetric key...
When sending a large set of files, would you use symmetric key encryption or asymmetric key encryption? Why? What is the disadvantage of using a one-time pad cipher? Why are computer racks often not fully equipped? What is the difference between a back-out and a brownout?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT