Cryptography Reference
In-Depth Information
S-boxes
confuse data
KEY
Figure 2.1: A schematic view of one round of DES. 64 bits enter and
are split into two 32-bit halves. The left half is scrambled up with the
key using the S-boxes. This result is then mixed in with the right half
and the result of adding these two together becomes the new left half.
The new right half is just a copy of the old left half.
000000
1110
000001
0100
000010
1101
000011
0001
000100
0010
000101
1110
000110
1011
000111
1000
001000
0011
001001
1010
001010
0110
001011
1100
001100
0101
001101
1001
001110
0000
001111
0111
010000
0000
010001
1111
010010
0111
010011
0100
010100
1110
010101
0010
010110
1101
010111
0001
011000
1010
011001
0110
011010
1100
011011
1011
011100
1001
011101
0101
011110
0011
011111
1000
100000
0100
100001
0001
100010
1110
100011
1000
100100
1101
100101
0110
100110
0010
100111
1011
101000
1111
101001
1100
101010
1001
101011
0111
101100
0011
101101
1010
101110
0101
101111
0000
110000
1111
110001
1100
110010
1000
110011
0010
110100
0100
110101
1001
110110
0001
110111
0111
111000
0101
111001
1011
111010
0011
111011
1110
111100
1010
111101
0000
111110
0110
111111
1101
Figure 2.2: This table shows how the first DES S-box converts 6-bit
values into 4-bit ones. Note that a change in one input bit will gener-
ally change two output bits. The function is also nonlinear and diffi-
cult to approximate with linear functions.
 
Search WWH ::




Custom Search