Skip to Main Content
Computer Security Art and Science, 2nd Edition
book

Computer Security Art and Science, 2nd Edition

by Matt Bishop
November 2018
Intermediate to advanced content levelIntermediate to advanced
1440 pages
48h 29m
English
Addison-Wesley Professional
Content preview from Computer Security Art and Science, 2nd Edition

Appendix F

The Encryption Standards

The two ciphers described in Chapter 10 are built upon iterations of functions both to encrypt and to generate keys. This appendix describes them in detail.

F.1 Data Encryption Standard

The DES (see section 10.2.3) takes as input a 64-bit plaintext message, and iterates through 16 rounds to generate a 64-bit ciphertext. Each round requires a 48-bit key, called a round key. A schedule of 16 round keys is generated from the 64-bit DES key. Section F.1.2 describes the generation of the round keys.

The input to the DES is 64 bits. The bits are permuted, and the resulting bits split into two halves. One half is given to a function, along with the round key for that round, and the output is combined with the other ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Security Engineering, 3rd Edition

Security Engineering, 3rd Edition

Ross Anderson
Defensive Security Handbook, 2nd Edition

Defensive Security Handbook, 2nd Edition

Lee Brotherston, Amanda Berlin, William F. Reyor

Publisher Resources

ISBN: 9780134097145