2
Optimized for
CS5010-40 DES/3DES Encryption/Decryption Cores
APPLICATIONS
♦ Electronic financial transactions
-
eCommerce
-Banking
-
Securities exchange
-
Point-of-Sale
♦ Secure corporate communications
-
Storage Area Networks (SAN)
-
Virtual Private Networks (VPN)
-
Video conferencing
-
Voice services
♦ Personal mobile communications
-
Video phones
-PDA
-
Point-to-Point Wireless
-
Wearable computers
♦ Secure environments
-
Satellite communications
-
Surveillance systems
-
Network appliances
DATA ENCRYPTION ALGORITHM
The Data Encryption Algorithm is an iterated block cipher
with a Feistel structure that encrypts and decrypts data in 64-
bit data blocks using a 56-bit key. The algorithm consists of:
•
An initial permutation of the input data
•
Sixteen rounds of the same process - the DES round
•
A final inverse initial permutation of the data
Figure 2 represents a block diagram of the Data Encryption
Algorithm. A DES round transforms the data using
permutations, additions and non-linear substitutions. The
DES key schedule consists of three parts:
1.
Key Permutation - to remove the eight redundant parity
bits within the 64-bit key, and to permute the key
2.
Scheduled Circular Shifting - the permuted key is circu-
larly shifted according to a schedule by either 1 or 2 bits,
to the left or right.
3.
Key Compression - the 56-bit shift key is compressed
using another permutation, or rearrangement, to obtain a
48-bit subkey.
The Triple Data Encryption Algorithm offers increased
security by extending the DES key to 112 or 168 bits, thus
greatly reducing the effectiveness of exhaustive key searches
or "brute-force" attacks. Triple DES is simply three successive
DES operations in the sequence of encrypt-decrypt-encrypt, or
decrypt-encrypt-decrypt if decrypting data.
Figure 2: DES Algorithm Structure