ISSC266 : Week 3 |Cryptography Concept| Discussion(Peer Response)| DES and AES| Michael
Description

Having Trouble Meeting Your Deadline?
Get your assignment on ISSC266 : Week 3 |Cryptography Concept| Discussion(Peer Response)| DES and AES| Michael completed on time. avoid delay and – ORDER NOW
Hello,
Data Encryption Standard (DES) is an outdated method of encryption/decryption due to it encryption key size making it vulnerable to brute force attacks. DES is a block cipher with a 56-bit key length capable of encrypting blocks of 64 bits plain text into 64 bits of ciphertext (Geeksforgeeks, 2023). The reason the key length of 64 differs from 56 is because every 8th bit position (8, 16, 24, etc.) is removed before DES process begins. The DES process begins with the initial permutation function which is executed on plain text and then creates two equal sides of permuted block with 32 bits on each side (Geeksforgeeks, 2023). This process simply scrambles the 64 bit positions. Fast-forwarding in the DES process, there is a step for expansion permutation. This process takes the two sides of permuted block (32 bits each) and expands them to 48 bits for the purpose of expansion and permutation of the input while creating the output (Geeksforgeeks, 2023). The next steps involve the s-box substitution. Substitution takes a group of 8 s-boxes which take 6 bits input and produces 4 bits output. The first and last bits of the 6-bit input create a 2-bit binary number which are used to choose a substitution for the middle 4 bits which becomes the output (Ginni, 2022).
As the name suggests, the Advanced Encryption Standard (AES) is the superior encryption method and block cipher to DES. They differ in several ways but the biggest improvement is the increase from a key size of 56-bits in DES to three different options of 128, 192, or 256 bits in AES. The algorithm for AES begins similar to DES by taking blocks of 128 or more and applying substitutions and permutations (Cook, 2019). The s-box for AES is represented by a 16 by 16 table outlining inputs and outputs resulting in 256 possible 8-bit numbers (Cook, 2019). AES also has additional permutation after the initial in the forms of shifting rows and mixing columns in the table (Geeksforgeeks, 2023). The s-box is used in AES where a byte is never substituted by itself or another byte which compliments the current byte before substitution resulting in a 16 byte table previously mentioned (Geeksforgeeks, 2023).
-Mike
References:
Cook, J. (2019). Inside the AES S-Box. Retrieved from https://www.johndcook.com/blog/2019/05/25/aes-s-bo…
Geeksforgeeks (2023). Data Encryption Standard (DES). Retrieved from https://www.geeksforgeeks.org/data-encryption-stan…
Ginni (2022). What are the Roles of S-Boxes in DES? Retrieved from https://www.tutorialspoint.com/what-are-the-role-o…
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Order Now and we will direct you to our Order Page at Litessays. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.