- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
What is the Simplified Data Encryption Standard?
Simplified Data Encryption Standard (S-DES) is equivalent to the DES algorithm. The SDES encryption algorithm produces an 8-bit block of plaintext (example: 10111101) and a 10-bit key as input and makes an 8-bit block of ciphertext as output. The S-DES decryption algorithm takes an 8-bit block of ciphertext and the same 10-bit key can develop that ciphertext as input and makes the initial 8-bit block of plaintext.
These algorithms generate a key and thus encapsulate the message with this key. There are two types of encryptions: asymmetric and symmetric, which are in vogue.
The presentation layer in S-DES manages the translation, encryption/decryption, authentication and compression. These are explained below −
It can transform the complex data structures used by an application string, integers, structures, etc., into a byte flow that can be shared across the network. The message is defined so that communicating devices agree to the structure of the data being transformed. For instance, ASCII or EBCDIC character sets.
It can handle security and privacy issues. Encryption can scramble the information so that only authorized persons can unscramble the conversation information. Decryption shifts the encryption procedure to interpret the message back into its original form.
There are two types of Encryption which are as follows −
Asymmetric Encryption − There are two numerically associated keys, such as the name public key and private keys that are created to encrypt and decrypt the message. Asymmetric encryption is considered more secure than symmetric encryption.
Symmetric Encryption − Symmetric encryption is also defined as conventional or single key Encryption. It is based on a secret key, which both communicating parties share. The sending party encrypts the plain text to cipher text messages using the secret key. The receiving party on receipt of the ciphertext message uses a similar secret key to decrypt it to plain text.
It can test the antecedents of the remote party being the real party instead of an impostor. It represents that the message is received from an authentic person, not from an impostor. A digital signature is one of the multiple authentication methods that use the public key encryption method.
It compresses data to reduce the amount of transmitted data, thus storing in bandwidth and money. There are three general techniques of data compression. Each method treated that the data stream can be changed into a more compact definition. This compact data stream is regenerated back into the original information at the destination device.
- Related Articles
- What are the Properties of Data Encryption Standard?
- What are the Weaknesses of Data Encryption Standard?
- DES (Data Encryption Standard) - DES Algorithm and Operation
- Advanced Encryption Standard (AES)
- What is Data Encryption in the Computer Network?
- What are the techniques of data Encryption?
- What is Data Encryption and Decryption in Blowfish Algorithm?
- What is the difference between Software Encryption and Hardware Encryption?
- What are the benefits of data encryption in Information Security?
- What is the Blowfish encryption algorithm?
- What is Cloud Encryption?
- What are the Standard Organizations for Data Communications?
- How does data encryption work?
- What is Public Key Encryption?