Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Data Encryption Standard - Step by Step

Comments

  • Closed Accounts Posts: 1,567 ✭✭✭Martyr


    The wiki entry on it isn't bad..do you just want to implement it?
    perhaps studying other peoples source code while reading the document would help.
    FIPS-46-3 is the main documentation released by NIST.

    the document you reference would probably make a little more sense if its design decisions had been revealed by its chief architects, IBM/NSA.


  • Closed Accounts Posts: 12,382 ✭✭✭✭AARRRGH


    Thanks for your reply.

    Well what I'm looking for I guess is a plain English step by step explanation of the algorithm.

    For example...

    You start with 64 bits.
    The least significant bit is stripped off each byte.
    You split the remaining 56 bits into two 28 bit halves.
    You rearrange half one like this:

    etc etc.

    I've found lots of explanations but they're written from the perspective of a maths teacher...


  • Closed Accounts Posts: 2,055 ✭✭✭probe


    dublindude wrote: »
    Thanks for your reply.

    Well what I'm looking for I guess is a plain English step by step explanation of the algorithm.

    For example...

    You start with 64 bits.
    The least significant bit is stripped off each byte.
    You split the remaining 56 bits into two 28 bit halves.
    You rearrange half one like this:

    etc etc.

    I've found lots of explanations but they're written from the perspective of a maths teacher...

    I presume that you are studying it from an academic perspective, (ie as a piece of history). DES has been broken over and over, and is 1980s technology.

    .probe


  • Closed Accounts Posts: 1,444 ✭✭✭Cantab.


    3DES is quite insecure.

    Can be cracked using the Copacobana in around 6 days (2007).

    180px-Copacobana.jpg


  • Closed Accounts Posts: 12,382 ✭✭✭✭AARRRGH


    Got it.

    http://www.aci.net/Kalliste/des.htm

    Very simple to understand. :)

    PS I'm aware DES is old technology etc., but it's an important encryption algorithm and IMO worth understanding if you're interested in cryptology.


  • Advertisement
Advertisement