Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

How to implement Data Encryption Algorithms (DES) in C++

Posted on 1998-11-06
5
Medium Priority
?
4,560 Views
Last Modified: 2012-06-21
I would like to understand how the des(data encryption standard) algorithm run and then to write a program using C++ or C. Can someone help me with this ??
Thank you.
0
Comment
Question by:zakirin
5 Comments
 

Author Comment

by:zakirin
ID: 1177202
Edited text of question
0
 
LVL 14

Accepted Solution

by:
AlexVirochovsky earned 680 total points
ID: 1177203
look at:
http://www.aci.net/Kalliste/des.htm
it doesn't have code but it has a very good explanation of the algorithm.
Aboute code: (usual C)
ftp://ftp.funet.fi/pub/crypt/cryptography/symmetric/des/
or
http://www.eskimo.com/~weidai/cryptlib.html (C++)

0
 

Expert Comment

by:nibbler
ID: 1177204
I don't know exactly which algorithm you mean with DES...
Is PGP-encryption / description ok ?? (This is the encryption they use to send data between banks etc..)

Here's how PGP-encrypion /decription algorithm works

- Get 2 big prime numbers (with 100 digits or so)
  we calls these p and q
- n = p * q (rember this, we need this value)
  phi(p) = p - 1
  phi(q) = q - 1
  phi(n) = phi(p) * phi(q) = (p-1)*(q-1) (also remember phi(n))
- E is the encryption key,
  D is the decryption key..      
  (E*D) mod phi(n) = 1
- Now we are going to calculate the D (decryption key)
 
Sorry, I forgot this step, I need to search it in my Mathematics book at home...

- When you get the D, you can calculate the E, by solving this
  equation.
  E*D = 1 (mod phi(n)) note '=' must have three bars...

- The message(M) can be encoded this way:
     E
  (M)
  It can be decoded with:
     D
  (M)
The big advantage of this method is that the description(D) can't be calculated (very fast, more then a few hundred years with a LOT of fast computers).

Well I will give you another comment when I've got the book at home...
 



0
 
LVL 22

Expert Comment

by:nietod
ID: 1177205
That is the DES algorythm.

>>The big advantage of this method is that the description(D) can't be
>> calculated (very fast, more then a few hundred years with a LOT
>> of fast computers).
Techniques have been developed to break this system using multiple computers.  A large key was broken in less than 3 months using 100 computers.  It is still a very good safeguard, but...
0
 

Author Comment

by:zakirin
ID: 1177206
Thanks a lot Alex.
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Container Orchestration platforms empower organizations to scale their apps at an exceptional rate. This is the reason numerous innovation-driven companies are moving apps to an appropriated datacenter wide platform that empowers them to scale at a …
Basic understanding on "OO- Object Orientation" is needed for designing a logical solution to solve a problem. Basic OOAD is a prerequisite for a coder to ensure that they follow the basic design of OO. This would help developers to understand the b…
The goal of the video will be to teach the user the concept of local variables and scope. An example of a locally defined variable will be given as well as an explanation of what scope is in C++. The local variable and concept of scope will be relat…
The viewer will be introduced to the technique of using vectors in C++. The video will cover how to define a vector, store values in the vector and retrieve data from the values stored in the vector.

971 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question