{"id":2731,"date":"2022-01-03T20:05:06","date_gmt":"2022-01-03T20:05:06","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2731"},"modified":"2022-01-03T20:05:07","modified_gmt":"2022-01-03T20:05:07","slug":"how-does-des-encryption-work-in-cryptography","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/","title":{"rendered":"How Does DES Encryption Work in Cryptography?"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Until fairly recently, DES was the gold standard in encryption. That\u2019s no longer the case, and today DES and its heir 3DES are known to be insecure and considered obsolete. However, modern encryption still uses similar techniques, so it\u2019s important to understand how DES works. Let\u2019s dig in!<\/h2>\n\n\n\n<p>In our last article, we explored the data encryption standard, or DES, in detail. To recap, DES is a symmetric encryption algorithm that uses 56-bit keys (64-bit keys with eight bits reserved for a specific purpose \u2014 more on that later) to encrypt data. Despite being used for the protection of sensitive data for decades by the US National Security Agency (NSA), <a href=\"https:\/\/www.nist.gov\/news-events\/news\/2005\/06\/nist-withdraws-outdated-data-encryption-standard\">DES has ultimately lost its place in the cryptographic world<\/a>. However, learning about the inner workings of the DES algorithm can open doors in understanding more recent algorithms like the advanced encryption standard, or AES.<\/p>\n\n\n\n<p>So, it\u2019s time to answer the question, \u201chow does DES encryption work?\u201d<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does DES Encryption Work? A Look at How DES Works<\/h2>\n\n\n\n<p>In a nutshell, DES encryption works by taking a plaintext input and breaking it into smaller chunks (64-bit blocks) to encrypt it using a cryptographic key. Basically, it takes your readable message and, block by block, converts it into unreadable gibberish that can only be decrypted by the decryption key holder.<\/p>\n\n\n\n<p>To better understand how DES encryption works, we first need to understand the fundamental components of this type of algorithm. Then can we get into what part they play in the final algorithm.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">An In-Depth Look at the Feistel Structure<\/h3>\n\n\n\n<p>The DES algorithm is based on German physicist and cryptographer Horst Feistel\u2019s <a href=\"https:\/\/www.ibm.com\/ibm\/history\/ibm100\/us\/en\/icons\/cryptography\/\">Lucifer<\/a> cipher. The Lucifer cipher is based on a combination of <a href=\"https:\/\/binaryterms.com\/transposition-technique-in-cryptography.html\">transposition<\/a> and <a href=\"https:\/\/binaryterms.com\/substitution-technique-in-cryptography.html\">substitution<\/a> cryptography. It is a <a href=\"https:\/\/www.thesslstore.com\/blog\/block-cipher-vs-stream-cipher\/\">block cipher<\/a>, meaning that it doesn\u2019t encrypt all the data at once, or bit-by-bit like a stream cipher does. Instead, it breaks down the data into blocks which makes the encryption faster and stronger. The size of the block depends on the cipher used, as does the size of the key.<\/p>\n\n\n\n<p>DES is a symmetric cipher. But what does that mean?<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>If the same key is used to encrypt and decrypt a block, it is called a symmetric cipher.<\/li><li>If different keys are used for encryption and decryption, it\u2019s an asymmetric cipher.&nbsp;<\/li><\/ul>\n\n\n\n<p>DES uses a 64-bit key to encrypt 64-bit blocks. Of these 64 bits in the key, eight specific bits (known as parity bits) are used to check for errors in the ciphertext. Every eighth bit is used as a parity bit, leaving 56 effective bits in the key. After the verification of the ciphertext, these eight parity bits are dropped. The original key (in normal font) and the parity bits (marked with bold font in the right-most column) are shown in the table below:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>1<\/td><td>2<\/td><td>3<\/td><td>4<\/td><td>5<\/td><td>6<\/td><td>7<\/td><td><strong>8<\/strong><\/td><\/tr><tr><td>9<\/td><td>10<\/td><td>11<\/td><td>12<\/td><td>13<\/td><td>14<\/td><td>15<\/td><td><strong>16<\/strong><\/td><\/tr><tr><td>17<\/td><td>18<\/td><td>19<\/td><td>20<\/td><td>21<\/td><td>22<\/td><td>23<\/td><td><strong>24<\/strong><\/td><\/tr><tr><td>25<\/td><td>26<\/td><td>27<\/td><td>28<\/td><td>29<\/td><td>30<\/td><td>31<\/td><td><strong>32<\/strong><\/td><\/tr><tr><td>33<\/td><td>34<\/td><td>35<\/td><td>36<\/td><td>37<\/td><td>38<\/td><td>39<\/td><td><strong>40<\/strong><\/td><\/tr><tr><td>41<\/td><td>42<\/td><td>43<\/td><td>44<\/td><td>45<\/td><td>46<\/td><td>47<\/td><td><strong>48<\/strong><\/td><\/tr><tr><td>49<\/td><td>50<\/td><td>51<\/td><td>52<\/td><td>53<\/td><td>54<\/td><td>55<\/td><td><strong>56<\/strong><\/td><\/tr><tr><td>57<\/td><td>58<\/td><td>59<\/td><td>60<\/td><td>61<\/td><td>62<\/td><td>63<\/td><td><strong>64<a><\/a><\/strong><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>DES uses initial permutation (IP) and final permutation (FP) functions as part of the Feistel structure. The IP is the first step, which involves rearranging the order of bits in the plaintext input. This is followed by 16 rounds of operations, which then concludes with the final permutation (which is the inverse of the IP).<\/p>\n\n\n\n<p>The order of operations is as shown in the figure below:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"357\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/basic-feistel-structure-des-encryption-1024x357.png\" alt=\"A basic visual illustration that breaks down the Feistel Structure that DES encryption relies upon.\" class=\"wp-image-2733\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/basic-feistel-structure-des-encryption-1024x357.png 1024w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/basic-feistel-structure-des-encryption-300x105.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/basic-feistel-structure-des-encryption-560x195.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/basic-feistel-structure-des-encryption-940x328.png 940w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/basic-feistel-structure-des-encryption.png 1046w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption> An overview diagram showing the basic Feistel structure of the DES algorithm and how it works. It involves the use of XORing, which we\u2019ll explain in just a few moments. <\/figcaption><\/figure>\n\n\n\n<p>Let\u2019s explore the concepts of initial and final permutation more in more depth.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Initial Permutation (IP)<\/h3>\n\n\n\n<p>An initial permutation is carried out just once at the beginning of the encryption process. In DES, after the entire plaintext is divided into blocks of 64 bits each, IP is carried out on each of them. This initial permutation is a step in the transposition process.<\/p>\n\n\n\n<p>The following table shows how the transposition should be carried out on the initial block of 64 bits.<\/p>\n\n\n\n<p><strong>Initial Permutation Table Example:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>58<\/td><td>50<\/td><td>42<\/td><td>34<\/td><td>26<\/td><td>18<\/td><td>10<\/td><td>2<\/td><\/tr><tr><td>60<\/td><td>52<\/td><td>44<\/td><td>36<\/td><td>28<\/td><td>20<\/td><td>12<\/td><td>4<\/td><\/tr><tr><td>62<\/td><td>54<\/td><td>46<\/td><td>38<\/td><td>30<\/td><td>22<\/td><td>14<\/td><td>6<\/td><\/tr><tr><td>64<\/td><td>56<\/td><td>48<\/td><td>40<\/td><td>32<\/td><td>24<\/td><td>16<\/td><td>8<\/td><\/tr><tr><td>57<\/td><td>49<\/td><td>41<\/td><td>33<\/td><td>25<\/td><td>17<\/td><td>9<\/td><td>1<\/td><\/tr><tr><td>59<\/td><td>51<\/td><td>43<\/td><td>35<\/td><td>27<\/td><td>19<\/td><td>11<\/td><td>3<\/td><\/tr><tr><td>61<\/td><td>53<\/td><td>45<\/td><td>37<\/td><td>29<\/td><td>21<\/td><td>13<\/td><td>5<\/td><\/tr><tr><td>63<\/td><td>55<\/td><td>47<\/td><td>39<\/td><td>31<\/td><td>23<\/td><td>15<\/td><td>7<a><\/a><\/td><\/tr><\/tbody><\/table><figcaption>Initial permutation table example source: <a href=\"https:\/\/www.theinsanetechie.in\/2014\/06\/des-implementation-in-java.html\">The Insane Techie<\/a>.<\/figcaption><\/figure>\n\n\n\n<p>Applying the above table means that the output of the first bit is the input of the 58<sup>th<\/sup> bit, the output of the second bit is the input of the 50<sup>th<\/sup> bit, the input of the last bit is the output of the seventh bit, and so on. An extra layer of security is added to the Feistel structure by scrambling the input.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DES Encryption Relies on the Feistel Function<\/h3>\n\n\n\n<p>Test words go here to see how it affects the layout. In our previous article on DES encryption, we mentioned that it\u2019s important to learn about DES, even though it is obsolete, because many other encryption algorithms like <a href=\"https:\/\/www.schneier.com\/academic\/twofish\/\">Twofish<\/a>, <a href=\"https:\/\/www.schneier.com\/academic\/blowfish\/\">Blowfish<\/a>, and <a href=\"https:\/\/datatracker.ietf.org\/doc\/html\/rfc5830\">GOST<\/a> are based on the Feistel function. This function is also known as <strong>Luby-Rackoff block cipher<\/strong> or <strong>Feistel network<\/strong>.  <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/initial-permutation-734x1024.png\" alt=\"A line illustration of the initial permutation concept\" class=\"wp-image-2734\" width=\"647\" height=\"905\"\/><figcaption> A figure showing the input and output placement of the bits in the initial permutation process.  <\/figcaption><\/figure><\/div>\n\n\n\n<p>The Feistel function is a round function, meaning that rounds of encryption operations are carried out a specified number of times. Before each round, the data is divided into two parts \u2013 the left plain text (LPT) and the right plain text (RPT).<\/p>\n\n\n\n<p>In DES, a total of 16 rounds of Feistel\u2019s function occur, comprising the following steps:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The output of the IP is taken as an input for the Feistel function, let\u2019s call it X. The size of X is 64 bits.<\/li><li>X is divided into two parts with 32 bits each \u2013 the LPT and RPT.<\/li><li>Subkeys (K<sub>1,<\/sub> K<sub>2<\/sub>, K<sub>n<\/sub>, etc.) are derived from the original key, and one key is applied during each round.<\/li><li>The result (f) of LPT is carried out using RPT and K<sub>2<\/sub> \u2013 f(RPT,K<sub>1<\/sub>).<\/li><li>Mathematical function XOR (explained below) is performed on f(RPT,K<sub>1<\/sub>) and LPT, resulting in L<sub>1<\/sub>.<\/li><li>L<sub>1 <\/sub>is swapped with RPT. So, the next function is performed on RPT, resulting in L<sub>2<\/sub>.<\/li><\/ol>\n\n\n\n<h4 class=\"wp-block-heading\">ExclusiveOR (XOR) Function<\/h4>\n\n\n\n<p>The XOR function (pronounced \u201cex-or\u201d), is a logical operator that compares two sets bit by bit. It\u2019s a Boolean function, which means it returns a true or false value (0 or 1). If the bits match, XOR returns the value 0, and if they don\u2019t match, XOR returns 1. XOR is represented by the symbol <em>\ua69a<\/em>. The function is represented by L<sub>1 <\/sub>= f(RPT,K<sub>1<\/sub>) \ua69a LPT.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Set 1<\/strong><\/td><td><strong>Set 2<\/strong><\/td><td><strong>Output<\/strong><\/td><\/tr><tr><td>0<\/td><td>0<\/td><td>0<\/td><\/tr><tr><td>0<\/td><td>1<\/td><td>1<\/td><\/tr><tr><td>1<\/td><td>0<\/td><td>1<\/td><\/tr><tr><td>1<\/td><td>1<\/td><td>0<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>As shown in the above table, if the inputs from the two sets match, the resulting output is 0. Otherwise, if they do not match, the output is 1. Here\u2019s an example of the XOR function:<\/p>\n\n\n\n<p>1011010100 \ua69a 0010111011<\/p>\n\n\n\n<p>The resulting output will be 1001101111.<\/p>\n\n\n\n<p>The purpose of applying the XOR function is to make brute force attacks more difficult by ensuring that decryption of the text is not possible without the XOR key.&nbsp;<\/p>\n\n\n\n<p>The following figure shows how the Feistel function in DES works:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-encryption-486x1024.png\" alt=\"A more in-depth visual illustration that breaks down the Feistel Structure that DES encryption relies upon.\" class=\"wp-image-2735\" width=\"523\" height=\"1102\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-encryption-486x1024.png 486w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-encryption-142x300.png 142w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-encryption-560x1180.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-encryption.png 590w\" sizes=\"auto, (max-width: 523px) 100vw, 523px\" \/><figcaption> How does DES encryption work? Here&#8217;s a detailed figure showing how the Feistel structure works in DES encryption. <\/figcaption><\/figure>\n\n\n\n<p>The above figure shows the steps followed during the encryption of the plaintext. It is noteworthy that the left and the right text are swapped one last time after the 16 rounds are completed. If this step is missed for any reason, the decryption of the text will not be possible.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Final Permutation (FP)<\/h3>\n\n\n\n<p>Now that we understand how the initial permutation works, it\u2019s time to break down the final permutation. The final permutation table is the inverse of the IP. So, the final step of the encryption is done by doing the exact opposite of the first step.<\/p>\n\n\n\n<p>The final permutation table is as follows:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>40<\/td><td>8<\/td><td>48<\/td><td>16<\/td><td>56<\/td><td>24<\/td><td>64<\/td><td>32<\/td><\/tr><tr><td>39<\/td><td>7<\/td><td>47<\/td><td>15<\/td><td>55<\/td><td>23<\/td><td>63<\/td><td>31<\/td><\/tr><tr><td>38<\/td><td>6<\/td><td>46<\/td><td>14<\/td><td>54<\/td><td>22<\/td><td>62<\/td><td>30<\/td><\/tr><tr><td>37<\/td><td>5<\/td><td>45<\/td><td>13<\/td><td>53<\/td><td>21<\/td><td>61<\/td><td>29<\/td><\/tr><tr><td>36<\/td><td>4<\/td><td>44<\/td><td>12<\/td><td>52<\/td><td>20<\/td><td>60<\/td><td>28<\/td><\/tr><tr><td>35<\/td><td>3<\/td><td>43<\/td><td>11<\/td><td>51<\/td><td>19<\/td><td>59<\/td><td>27<\/td><\/tr><tr><td>34<\/td><td>2<\/td><td>42<\/td><td>10<\/td><td>50<\/td><td>18<\/td><td>58<\/td><td>26<\/td><\/tr><tr><td>33<\/td><td><strong>1<\/strong><strong><\/strong><\/td><td>41<\/td><td>9<\/td><td>49<\/td><td>17<\/td><td>57<\/td><td>25<a><\/a><\/td><\/tr><\/tbody><\/table><figcaption>Final permutation table example source: The Insane Techie. <\/figcaption><\/figure>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/final-permutation.png\" alt=\"A line illustration of the inverse initial permutation concept (i.e., final permutation)\" class=\"wp-image-2736\" width=\"655\" height=\"883\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/final-permutation.png 714w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/final-permutation-223x300.png 223w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/final-permutation-560x755.png 560w\" sizes=\"auto, (max-width: 655px) 100vw, 655px\" \/><figcaption> A figure showing the input and output of each bit in the final permutation process.<\/figcaption><\/figure><\/div>\n\n\n\n<p>In the final permutation, the inverse of IP is used. Do you remember we had the output of the first bit as the input of the 58<sup>th<\/sup> bit in IP? In FP, we invert that \u2014 meaning, the input of the 58<sup>th<\/sup> bit is the output of the first bit. You can see that the 58<sup>th<\/sup> bit is \u20181\u2019 in the FP table (marked in bold font in the table for your reference, second column from the left in the bottom row). The input of the seventh bit is the output of the 64<sup>th<\/sup> bit (the last bit).<\/p>\n\n\n\n<p>The initial permutation table is not a <a href=\"https:\/\/courses.lumenlearning.com\/boundless-algebra\/chapter\/introduction-to-matrices\/\">matrix<\/a> but a <a href=\"https:\/\/mathinsight.org\/vector_introduction\">vector<\/a>. Therefore, you will see that when we connect the input and the output, as shown in the figures IP and FP given above, we will be able to see the inverse pattern. However, the tables will not be reversed exactly. Vectors and matrices are complex mathematical concepts, and although I would like to go into more detail, I\u2019m putting on my brakes to keep this article from turning into a book!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">A Quick Look at DES Decryption and How It Works<\/h2>\n\n\n\n<p>DES encryption, like other encryption algorithms, is a two-way process. This means that information is encrypted with the intention of it being decrypted by the appropriate party. (Otherwise, if the right person can\u2019t read it, what\u2019s the point in encrypting and sending the data at all?)<\/p>\n\n\n\n<p>We saw that the DES algorithm uses IP and the Feistel function for encryption. To decrypt DES-encrypted data, in a general sense, the same steps are followed but in basically reverse order. Instead of the plaintext input, the 64-bit ciphertext output is used at the beginning of the process, and subkeys are used to help reverse engineer the data to calculate the original input plaintext.<\/p>\n\n\n\n<p>The 64-bit ciphertext is divided into two 32-bit blocks. After that, the same keys that were utilized to encipher the plaintext are used to decrypt the ciphertext. The main difference in the process is the generation of keys \u2013 during encryption, the keys are generated, whereas during decryption, the keys generated earlier for encryption are used in reverse order. The encryption key K<sub>1 <\/sub>becomes the decryption key K<sub>16, <\/sub>and K<sub>2 <\/sub>becomes K<sub>15<\/sub>. Other than that, all the steps are carried out in the same way as with encryption.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-decryption-470x1024.png\" alt=\"A basic visual illustration that breaks down the DES decryption process based on the Feistel Structure.\" class=\"wp-image-2737\" width=\"523\" height=\"1139\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-decryption-470x1024.png 470w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-decryption-138x300.png 138w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-decryption-560x1220.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/feistel-structure-des-decryption.png 612w\" sizes=\"auto, (max-width: 523px) 100vw, 523px\" \/><\/figure>\n\n\n\n<p>A detailed figure showing how Feistel structure works in DES decryption<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on How DES Encryption Works<\/h2>\n\n\n\n<p>DES is a complex algorithm that works by dividing an input text into smaller 64-bit blocks. Each block then goes through an initial permutation, and the result of the initial permutation is further divided into two parts called LPT and RPT. These two parts then go through the Feistel function for 16 rounds. After these rounds, the text goes through the final permutation. The resulting text is the ciphertext. The process is essentially reversed at the time of decryption.<\/p>\n\n\n\n<p>This DES algorithm serves as a base for many encryption algorithms used at present. Modern algorithms like AES and Twofish are more complex and so more difficult to crack. Most trustworthy SSL\/TLS certificates use AES encryption to secure data transferred online and we\u2019ll investigate AES in an upcoming article.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Until fairly recently, DES was the gold standard in encryption. That\u2019s no longer the case, and today DES and its heir 3DES are known to be insecure and considered obsolete&#8230;.<\/p>\n","protected":false},"author":19,"featured_media":2758,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[9],"tags":[220,75,221],"class_list":["post-2731","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encryption","tag-data-encryption-standard","tag-des","tag-how-des-works","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Does DES Encryption Work in Cryptography? - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"How does DES encryption work? It involves breaking input data into 64-bit blocks to encrypt in rounds using cryptographic keys.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Does DES Encryption Work in Cryptography? - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"How does DES encryption work? It involves breaking input data into 64-bit blocks to encrypt in rounds using cryptographic keys.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-03T20:05:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-01-03T20:05:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/how-does-des-encryption-work-feature.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Megha Thakkar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megha Thakkar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/\"},\"author\":{\"name\":\"Megha Thakkar\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"headline\":\"How Does DES Encryption Work in Cryptography?\",\"datePublished\":\"2022-01-03T20:05:06+00:00\",\"dateModified\":\"2022-01-03T20:05:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/\"},\"wordCount\":1807,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-does-des-encryption-work-feature.jpg\",\"keywords\":[\"Data Encryption Standard\",\"DES\",\"How DES Works\"],\"articleSection\":[\"Encryption\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/\",\"name\":\"How Does DES Encryption Work in Cryptography? - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-does-des-encryption-work-feature.jpg\",\"datePublished\":\"2022-01-03T20:05:06+00:00\",\"dateModified\":\"2022-01-03T20:05:07+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"description\":\"How does DES encryption work? It involves breaking input data into 64-bit blocks to encrypt in rounds using cryptographic keys.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-does-des-encryption-work-feature.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/how-does-des-encryption-work-feature.jpg\",\"width\":1600,\"height\":1000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/how-does-des-encryption-work-in-cryptography\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Does DES Encryption Work in Cryptography?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\",\"name\":\"Megha Thakkar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"caption\":\"Megha Thakkar\"},\"description\":\"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?).\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Does DES Encryption Work in Cryptography? - InfoSec Insights","description":"How does DES encryption work? It involves breaking input data into 64-bit blocks to encrypt in rounds using cryptographic keys.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/","og_locale":"en_US","og_type":"article","og_title":"How Does DES Encryption Work in Cryptography? - InfoSec Insights","og_description":"How does DES encryption work? It involves breaking input data into 64-bit blocks to encrypt in rounds using cryptographic keys.","og_url":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/","og_site_name":"InfoSec Insights","article_published_time":"2022-01-03T20:05:06+00:00","article_modified_time":"2022-01-03T20:05:07+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/how-does-des-encryption-work-feature.jpg","type":"image\/jpeg"}],"author":"Megha Thakkar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Megha Thakkar","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/"},"author":{"name":"Megha Thakkar","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"headline":"How Does DES Encryption Work in Cryptography?","datePublished":"2022-01-03T20:05:06+00:00","dateModified":"2022-01-03T20:05:07+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/"},"wordCount":1807,"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/how-does-des-encryption-work-feature.jpg","keywords":["Data Encryption Standard","DES","How DES Works"],"articleSection":["Encryption"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/","url":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/","name":"How Does DES Encryption Work in Cryptography? - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/how-does-des-encryption-work-feature.jpg","datePublished":"2022-01-03T20:05:06+00:00","dateModified":"2022-01-03T20:05:07+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"description":"How does DES encryption work? It involves breaking input data into 64-bit blocks to encrypt in rounds using cryptographic keys.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/how-does-des-encryption-work-feature.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2022\/01\/how-does-des-encryption-work-feature.jpg","width":1600,"height":1000},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/how-does-des-encryption-work-in-cryptography\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Does DES Encryption Work in Cryptography?"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da","name":"Megha Thakkar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","caption":"Megha Thakkar"},"description":"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?)."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2731","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2731"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2731\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2758"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2731"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2731"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2731"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}