DES Data Encryption Standard Algorithm PPT

DES algorithm:

As mentioned in the above section, a DES Data Encryption Standard algorithm is used for the decryption process and the detailed coding procedure followed to implement this algorithm is explained in this section. A block level coding is done to develop the DES algorithm and to do this different blocks are created like init block, data block and encryption block and the corresponding data is assigned to these blocks as per the project requirement.

To create the required key, a separate 32 bit key block is created and then users are assigned with this key using the traditional swapping process. The main aim of this algorithm is to created the keys and then share the key among the users and to achieve this, a separate method known as keyGenerator is used and once the required key is generated using this function, the corresponding keys are assigned to the users as per the predefined conditions and requirements.

In general the keys are random numbers and a separate set of numbers are used for this process and to achieve this task, a function known as Initialperm is used and the required random numbers are generated. For any communication process among the clients and the server, the corresponding IP address are used and thus a separate IP block is maintained to store the IP address of all the nodes that participate in the communication process.

Once the required keys are generated and assigned, they are stored in a separate block known as key block and this particular key block is passed as the required input for the method known as PCI and then these keys can be used for the basic decryption and encryption process to achieve the required secure communication among the client and server.

Distribution of the bits based on the left and right are done using the math function of java and thus the random numbers are shifted as per the requirement. The key generation process is repeated for number of times to ensure the better quality of the keys and distributed and the corresponding key details are maintained in a separate table known as Etable. The actual coding used to develop this DES algorithm is given in the appendix section.

This Paper is written & submitted by Vamshidhar A.

Leave a Reply

Your email address will not be published. Required fields are marked *