100 likes | 232 Views
Tools for Analyzing DES and TDES. Rukman Senanayake rukman@sri.com. Overview. Reasons for analyzing DES DES/TDES algorithm visualization Brief introduction of the tools Demo. Why do we need to analyze DES?. Modern Cryptography and DES Publication of the DES algorithm and its influence
E N D
Tools for Analyzing DES and TDES Rukman Senanayake rukman@sri.com
Overview • Reasons for analyzing DES • DES/TDES algorithm visualization • Brief introduction of the tools • Demo
Why do we need to analyze DES? • Modern Cryptography and DES • Publication of the DES algorithm and its influence • The NSA ‘tweaks’ and the outcry (reduction of the key length) • Understand the ‘tweaks’ -> Analyze DES in depth
Why do we need to analyze DES? • Bruce Schneier, one of the foremost security experts in the world, in his 2004 article (published by ZD.net) regarding DES’ thirty year reign points out the following interesting facts: “It's not an exaggeration to say that the publication of DES created the modern academic discipline of cryptography. The first academic cryptographers began their careers by trying to break DES, or at least trying to understand the NSA’s tweak. And almost all of the encryption algorithms -- public-key cryptography, in particular -- can trace their roots back to DES. Papers analyzing different aspects of DES are still being published today”.
DES/TDES Algorithms • Skip
The Tools… • Customizable S-Boxes • GUI with all intermediate results • Text report of the settings and encryption process • Parallel execution of encryption (for comparison) • TDES : Graphical overview of the algorithm • DES : All the steps (initial permutation, p-box permutation, etc) are implemented • These tools are SLOW (written in Java)