Skip to main content
Log in

Formulations of some bit switching functions in DES

  • Published:
Wuhan University Journal of Natural Sciences

Abstract

In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and realized by using table look-up technique in the implementation of the cryptosystem. This paper presents explicit formulas for the initial permutation IP, its inverse IP−1, the expansion function E, and the permuted choice PC_1. It also gives the program realizations of these functions in C++ applying these formulas. With the advantage of the omission of the storage space for these matrixes and the tedious inputs of tables in the implementations of DES, our experimental results shows that the explicit formulas are useful in some situations, such as wireless sensor networks where the memory capacity is limited, especially when the size of file for encrypting is not too large, preferably smaller than 256KB.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Federal Information Processing Standards. Data Encryption Standard (DES) [S]. National Institute of Standards and Technology, FIPS 46-3, 1999.

  2. Stinson D R. Cryptography: Theory and Practice [M]. Third Edition. Boca Raton: Chapman & Hall/CRC, 2006.

    Google Scholar 

  3. Courtois N T, Bard G V. Algebraic cryptanalysis of the data encryption standard [C]//Cryptography and Coding-11th IMA International Conference. Berlin, Heidelberg: Springer-Verlag, 2007: 152–169.

    Google Scholar 

  4. Desmedt Y. A Brief Survey of Research Jointly with Jean-Jacques Quisquater [C]//Cryptography and Security: From Theory to Applications. Berlin, Heidelberg: Springer-Verlag, 2012: 8–12.

    Google Scholar 

  5. De Cannière C. Analysis and Design of Symmetric Encryption Algorithms [D]. Leuven: Katholieke Universiteit, 2007.

    Google Scholar 

  6. Verma O P, Agarwal R, Dafouti D, et al. Peformanceanalysis of data encryption algorithms [C]//2011 3rd International Conference on Electronics Computer Technology. Washington D C: IEEE Computer Society, 2011: 399–403.

    Google Scholar 

  7. Agrawal H, Sharma M. Implementation and analysis of various symmetric cryptosystems [J]. Indian Journal of Science and Technology, 2010, 3(12): 1173–1.

    Google Scholar 

  8. Coppersmith D. The data encryption standard (DES) and its strength against attacks [J]. IBM Journal of Research and Development, 1994, 38(3): 243–250.

    Article  Google Scholar 

  9. Davio M, Desmedt Y, Fosseprez M, et al. Analytical characteristics of the DES [C]//Advances in Cryptology -Proc of Crypto 83. New York: Plenum Press, 1984: 171–202.

    Google Scholar 

  10. Brown L P. Analysis of the DES and Its Implications for the Design of an Extended DES [R]. Canberra: University of New South Wales, Department of Computer Science, Australian Defence Force Academy, 1988.

    Google Scholar 

  11. Davies D W. Some regular properties of the data encryption standard [C]//Advances in Cryptology -Proc of Crypto 82. New York: Plenum Press, 1982: 89–96.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lin You.

Additional information

Foundation item: Supported by the National Natural Science Foundation of China (61272045), Natural Science Foundation of Outstanding Youth Team Project of Zhejiang Province (R1090138) and Project of the State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences, Beijing)

Biography: YOU Lin, male, Professor, Ph.D., research direction: algebra, information security and cryptography, biometrics recognition and its applications.

Rights and permissions

Reprints and permissions

About this article

Cite this article

You, L., Yang, Y. & Wen, W. Formulations of some bit switching functions in DES. Wuhan Univ. J. Nat. Sci. 18, 402–406 (2013). https://doi.org/10.1007/s11859-013-0948-2

Download citation

  • Received:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11859-013-0948-2

Key words

CLC number

Navigation