[8689] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Impact and purpose of IP/FP in DES

daemon@ATHENA.MIT.EDU (David Honig)
Wed Apr 25 11:04:49 2001

Message-Id: <3.0.6.32.20010424175220.008a9100@pop.sprynet.com>
Date: Tue, 24 Apr 2001 17:52:20 -0700
To: Martin Olsson <mnemo@home.se>, cryptography@wasabisystems.com
From: David Honig <honig@sprynet.com>
In-Reply-To: <3.0.6.32.20010424214236.00a19e30@mail2.mail.home.se>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 09:42 PM 4/24/01 +0200, Martin Olsson wrote:
>
>"The initial permutation and the corresponding final permutation do not
>affect the security of DES. (As near as anyone can tell, its primary
>purpose is to make it easier to load plaintext and ciphertext data into a
>DES chip in byte sized pieces. Remember that DES predates 16-bit or 32-bit
>microprocessor busses.) ... many software implementations of DES leave out
>both the initial and the final permutations. ... While the new algorithm is
>no less secure than DES, it does not follow the DES standard and should not
>be called DES."
>
></quote>
>
>First; I do not exactly understand what Mr.Schneier means. How can it be
>easier to transfer 8-bits of data into a chip if one first rearranges the
>bits? 

In software, this is a necessary chore for being compliant with the Standard.
However, cryptographically, it does nothing.

Hint: In hardware, its free.

dh




 






  







---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post