SlideShare ist ein Scribd-Unternehmen logo
1 von 5
Downloaden Sie, um offline zu lesen
International Journal of Trend in Scientific Research and Development (IJTSRD)
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1439
Performance Analysis of Data Encryption Standard (DES)
Thida Soe, Soe Soe Mon, Khin Aye Thu
Faculty of computer systems and Technology, University of Computer Studies, Hinthada, Myanmar
How to cite this paper: Thida Soe | Soe
Soe Mon | Khin Aye Thu "Performance
Analysis of Data Encryption Standard
(DES)" Published in
International
Journal of Trend in
Scientific Research
and Development
(ijtsrd), ISSN: 2456-
6470, Volume-3 |
Issue-5, August
2019, pp.1439-1443,
https://doi.org/10.31142/ijtsrd26650
Copyright © 2019 by author(s) and
International Journal ofTrend inScientific
Research and Development Journal. This
is an Open Access article distributed
under the terms of
the Creative
Commons Attribution
License (CC BY 4.0)
(http://creativecommons.org/licenses/by
/4.0)
ABSTRACT
Information security is becoming much more important in data storage and
transmission with the fast progression of digital data exchange in electronic
way. Cryptography has come up as a solution which plays a vital role in
information security system against malicious attacks. The cryptography is
most important aspect of communications security and becoming an
important building block for computer security.This securitymechanismuses
some algorithms to scramble data into unreadable text which can be only
being decoded or decrypted by party those possesses the associated key. To
protect sent messages that some of the most commonly used cryptography
methods with private key based algorithm are LOKI (89, 91, 97), DES, triple
DES, AES, Blowfish, etc. These algorithms also include several computational
issues as well as the analysis of DES algorithm. The main features that specify
and differentiate one algorithm from another are the ability to the speed of
encryption and decryption of the input plain text. This paper analyzes the
private key based algorithm DES and LOKI91 by computing index of
coincidence (IC) and time efficiency.
KEYWORDS: cryptography, DES, LOKI91, Index of Coincidence (IC), run time
INTRODUCTION
Cryptography algorithms play an important role in providing security to
networks. They can be categorized into symmetric (private) and asymmetric
(public) keys encryption.
In asymmetric keys, two keys are used; private and public
keys. Public key is used for encryption and private key is
used for decryption. In symmetric keys encryption or secret
key encryption, only one key is used to encrypt and decrypt
data. Symmetric algorithms can be divided into two
categories: block ciphers and stream ciphers. The block
ciphers operate on data in groups or blocks. The most
common secure algorithms are DESX, a variation of Data
Encryption Standard (DES), Blowfish and Advanced
Encryption Standard (AES), etc. The less common secure
algorithms are IDEA, RC6, LOKI (89/91/97), etc.
For each algorithm there are two key aspects used:
Algorithm type (define size of plain text shouldbe encrypted
per step) and algorithm mode (define cryptographic
Algorithm mode). Algorithm mode is a combination of a
series of the basic algorithm and some block cipher and
some feedback from previous steps. LOKI uses one 64-bit
keys, DESX uses one 128-bit key while AES uses various 128,
192 or 256 bit keys. Blowfish uses various 32-448 default
128 bits. Encryption algorithms consumesignificantamount
of computing resources such as CPU time, batterypoweretc.
We compare and analyzed algorithms DES and LOKI91.
A. Data Encryption Standard (DES)
DES is a block cipher. It encrypts the plaintext data ina block
of 64 bits and produces 64 bit cipher text. The cipher key
length is 56 bits and round key length is 48 bits. Initially the
key is consisting of 64 bits with the parity bits 8, 16, 24,
32,40,48,56, 64 and that bits are used for parity checking
and is ignored. DES is based on the fundamentalattributes of
cryptographic functions such as substitution(confusion) and
transposition (diffusion), exclusive-OR operation, shifting
and swapping. DES consists of 16 rounds and each round
used only one round key that keys are generated from the
round key generator. Round key generator crates the 48 bit
keys for each round.
 DES Algorithm
Fig.1 Schematic DES algorithm
IJTSRD26650
International Journal of Trend in Scientific Research and Development (IJTSRD)
@ IJTSRD | Unique Paper ID – IJTSRD26650
The algorithms steps are as follow:
1. In the first step, the initial 64-bit plain text block is
handed over to initial permutation (IP) function.
2. The initial permutation is performed on plain text.
3. The initial permutation produces two halves of
permuted block: Left plain text (L0) and Right pl
(R0).
4. Each of L0 and R0 goes through 16 rounds of the
encryption process, each with its own key.
The single round of DES is shown in Fig. 2. These steps are
A. From the 56-bit key, a different 48
generated by using key transformation.
B. Using the expansion permutation, the R
from 32 bits to 48 bits.
C. Now, the 48-bit key is XORed with 48
resulting output is given in the next
D. step.
E. Using the S-box substitution producethe32
bit input.
F. These 32 bits are permuted using straight P
permutation.
G. The straight P-box output 32 bits are XORed with the
L032 bits.
H. The result of the XORed 32 bits becomes the R
R0 become the L1. This process is called as swapping.
Now the R1 again given to the next roundandperformed
the 15 more rounds.
5. After the completionof16rounds,thefinal permutation
is performed.
Fig.2 Single Round of DES
B. LOKI
In cryptography, LOKI89 and LOKI91 are symmetric
key block ciphers designed as possible replacement
the Data Encryption Standard (DES). The ciphers were
developed based on a body of work analyzing DES, and are
very similar to DES in structure. The LOKI
named for Loki.
 LOKI89
The cipher uses a 64-bit block anda 64-bit key
a 16-round Feistel cipher andhas a similargeneralstructure,
but differs in the choice of the particular
"straight P-permutation", and the "Expansion permutation".
The S-Boxes use the non-linearitycriteriadeveloped byJosef
Pieprzyk, making them as "complex" and "unpredictable" as
possible. Their effectiveness was compared against the
known design criteria forthe DES S-boxes.Thepermutations
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com
26650 | Volume – 3 | Issue – 5 | July - August
bit plain text block is
handed over to initial permutation (IP) function.
The initial permutation is performed on plain text.
The initial permutation produces two halves of
) and Right plain text
goes through 16 rounds of the
encryption process, each with its own key.
The single round of DES is shown in Fig. 2. These steps are
bit key, a different 48-bit sub-key is
n.
Using the expansion permutation, the R0 is expended
bit key is XORed with 48-bit Ki and the
box substitution producethe32-bitfrom48-
its are permuted using straight P-box
box output 32 bits are XORed with the
The result of the XORed 32 bits becomes the R1 and old
called as swapping.
next roundandperformed
After the completionof16rounds,thefinal permutation
DES
symmetric-
designed as possible replacements for
(DES). The ciphers were
developed based on a body of work analyzing DES, and are
algorithms were
key.Like DES, itis
andhas a similargeneralstructure,
but differs in the choice of the particular S-boxes, the
permutation", and the "Expansion permutation".
linearitycriteriadeveloped byJosef
Pieprzyk, making them as "complex" and "unpredictable" as
possible. Their effectiveness was compared against the
.Thepermutations
were designed to "mix" the outputs of the
as possible, promoting the avalanche and completeness
properties, essential for a good
unlike their equivalents in the DES, they are intended to be
as clean and simple as possible, aiding the analysis of the
design.
Following the publication of LOKI89
new differential cryptanalysis
resulted in the design being changed to become LOKI91.
 LOKI91
LOKI91 was designed in response to the attacks on LOKI89.
The changes included removing the initial and final
whitening, a new S-box, and small alterations to the
schedule. More specifically, the S
minimize the probability of seeing different inputs resulting
in the same output (a hook which
cryptanalysis uses), thus improving LOKI91's immunity to
this attack. The changes to the key schedule were designed
to reduce the number of "equivalent" or "related" keys,
which resulted in the exhaustive search space for the cipher
being reduced.
Whilst the resulting cipher is clearly stronger and more
secure than LOKI89, there are a number of potential attacks.
Consequently these ciphers should be viewed as academic
efforts to advance the field of block cipher design, rather
than algorithms for use. The number of citations and
published critiques suggests this aim has been achieved.
 LOKI91 Algorithm
Fig.3 Schematic LOKI91 algorithm
The mechanics of LOKI91 are similar to DES. The data block
then divided into a left half and right half and goes through
16 rounds, much like DES. In each round, the right half is
first XORed with a piece of the key, then through an
expansion permutation.
The 48 bit output is divided into four 12
block is sent through an S-box substitution. Then, thefour8
bits output are recombined to form a single 32
and sent through the permutation. Finally, the right half is
XORed with the left half to become the new right half, and
the right half becomes the new left half. After 16 rounds, the
block is again XORed with the key to produce the ciphertext.
www.ijtsrd.com eISSN: 2456-6470
August 2019 Page 1440
were designed to "mix" the outputs of the S-boxes as quickly
as possible, promoting the avalanche and completeness
properties, essential for a good Feistel cipher. However
unlike their equivalents in the DES, they are intended to be
as clean and simple as possible, aiding the analysis of the
Following the publication of LOKI89, information on the
differential cryptanalysis became available. This
resulted in the design being changed to become LOKI91.
designed in response to the attacks on LOKI89.
The changes included removing the initial and final key
box, and small alterations to the key
. More specifically, the S-boxes were changed to
minimize the probability of seeing different inputs resulting
in the same output (a hook which Differential
uses), thus improving LOKI91's immunity to
this attack. The changes to the key schedule were designed
to reduce the number of "equivalent" or "related" keys,
n the exhaustive search space for the cipher
Whilst the resulting cipher is clearly stronger and more
secure than LOKI89, there are a number of potential attacks.
Consequently these ciphers should be viewed as academic
the field of block cipher design, rather
than algorithms for use. The number of citations and
published critiques suggests this aim has been achieved.
Fig.3 Schematic LOKI91 algorithm
The mechanics of LOKI91 are similar to DES. The data block
then divided into a left half and right half and goes through
16 rounds, much like DES. In each round, the right half is
first XORed with a piece of the key, then through an
The 48 bit output is divided into four 12-bit blocks, and each
box substitution. Then, thefour8-
bits output are recombined to form a single 32-bit number
and sent through the permutation. Finally, the right half is
the left half to become the new right half, and
the right half becomes the new left half. After 16 rounds, the
block is again XORed with the key to produce the ciphertext.
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1441
The sub-keys are generated from the key in a straight
forward manner. The 64-bit key is split into a left half and a
right half. This left half is then rotated 12 or 13 bits totheleft
and then every two rounds the left and right halves are
exchanged. As with DES, the same algorithm can be used for
both encryption and decryption, with some modification in
how the sub-keys are used.
C. Analysis of DES and LOKI91 Algorithms
 Implementation of DES Algorithm
The procedures of encryption program are as follow:
1. Read a key of any 8 characters.
2. Convert the key from ASCII to binary from, and then
obtain 64-bits input.
3. Change the first 28 bits position by using the first of
permuted choice (PC-1). Then we obtain Ci 28 bits and
the last 28 bits for the second part, so we get Di 28 bits.
4. We should check whether we could use a 1 circular left
shift (1 rotate left) or two circular left shift (2 rotate
left). After these operations, we concatenate the Ci and
Di then obtain CDi 56 bits. Then change the CDi position
by using the permuted choice 2(PC-2), so we get Ki 48
bits.
5. After repeating this operation 16 times, we get 16
number of Ki.
6. Read the input file name and the output file name the
operation.
7. If end of encounter, the process will stop.
8. Read the 8 characters from input files and convert the
ASCII code to binary for, so we obtain the 64 bits input.
Then change position by using initial permutation (IP).
9. The left 32 bits is called left permuted input L0 and the
right 32 bits is called right permuted R0.
10. For J = 1 to 16.
11. L(J) = R(J-1)
12. This R(J-1) is expended from 32 bits to 48 bits by using
the expansion table. The operate XOR calculation of this
R(J-1) 48 bits and K(J) 48 bits and get new nr0 48 bits.
13. Exacts 6 bits from nr0. The first bit and the last bit
represents the row and the middle 4 bits represents the
column of selection function Si. Then we get 4 bits from
Si and after this operation 8 times, we obtain 8 number
of Si. We concatenate S1 to S8 we obtain var32 bits.
14. Change positions in var32 by using the primitive
function (P), and so we obtain 32 bits pvar32.
15. This pvar32 and L(J-1) are subjected to XOR calculation,
thus obtain R(J).
16. Next J. After this operation, get 16 numbers of R(J) and
L(J).
17. Concatenate the last position of R(16), then obtain
preoutput RL64 bits.
18. Operate the initial permutation inverse (IP-1) with RL.
Then obtain the ciphertext 64 bits.
19. Write to a ciphertext 64 bits to output file.
20. Go to step 7.
 Implementation of LOKI91 Algorithm
The LOKI91 Algorithm is developed by window XP personal
computer using visual C++ programming language.
1. Read a key of any 8 characters.
2. Convert the key from ASCII to binary from, and then
obtain 64-bits input.
3. Change the first 32 bits position by using the first of
permuted choice (PC-1). Then we obtain Ci 32 bits and
the last 32 bits for the second part, so we get Di 32 bits.
4. After the first round, the rotation of the left sub-key
alternated between 12 and 13 bits totheleft.Then every
two round, the left and right halves are exchanged.
5. After repeating tis operation 16 times, we get 16
number of Ki.
6. Read the input file name and the output file name the
operation.
7. If end of encounter, the process will stop.
8. Read the 8 characters from input files and convert the
ASCII code to binary for, so we obtain the 64 bits input.
Then change position by using initial permutation (IP).
9. The left 32 bits is called left permuted input L0 and the
right 32 bits is called right permuted R0.
10. For J = 1 to 16.
11. L(J) = R(J-1)
12. This R(J-1) is expended from 32 bits to 48 bits by using
the expansion table. The operate XOR calculation of this
R(j-1) 48 bits and K(j) 48 bits and get new nr0 48 bits.
13. Divided into four 12 bit blocks. The two left-most bits
and the two right-most bits represent the row and the
middle 8 bits represent the column of selection function
Si. Then we get 8 bit from Si and after this operation 8
times, we obtain 8 number of Si.
14. Change positions in var 32 by using the primitive
function (P), and so we obtain 32 bits pvar 32.
15. This pvar 32 and L(J-1) are subjectedtoXORcalculation,
thus obtain R(J).
16. Next J. After this operation, get 16 numbers of R(J) and
L(J).
17. Concatenate the last position of R(16), then obtain
preoutput RL64 bits.
18. Operate the initial permutation inverse (IP-1) with RL.
Then obtain the ciphertext 64 bits.
19. Write to a ciphertext 64 bits to output file.
20. Go to step 7.
 Index of Coincidence (IC)
The index of coincidence IC, measures the variation in the
frequencies of letters in the ciphertext.Iftheperiodofcipher
is one (1), that is simple substitution has been used, there
will be considerable variation in the letter frequencies of IC
will be high. As the period increase,thevariationis gradually
eliminated (due to the diffusion) and IC is low.
Let the length of the text be N and let the size of the alphabet
be n. Consider the i-th letter ai in the alphabet.
Suppose ai appears in the given text Fi times. Since the
number of ai's in the text is Fi, picking the
first ai has Fi different choices and picking the second ai has
only Fi-1 different choices because one ai has been selected.
Since there are N(N-1) different ways of picking two
characters from the text, the probability of having two ais is
Since the alphabet has n different letters and the above
applies to each of them, the probability of having two
identical letters from the text is’
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1442
Therefore, the index of coincidence is:
English has n = 26 letters.
D. Experimental and Simulation Analysis
We analyzed the two algorithms withEnglishtexts and these
texts are selected randomly. And then input file sizes are
used from small to large size. Different samples yieldslightly
different result. We analyzed the performance of these
algorithms by computing Index of Coincidence (IC) andtime
efficiency.
TABLE1 ENCRYPTION AND DECRYPTION EXECUTION TIME
Input File Size(Bytes)
Encryption Execution
Time(Seconds)
Decryption Execution
Time(Seconds)
DES LOKI91 DES LOKI91
100 0.12 0.11 0.14 0.13
500 0.14 0.12 0.16 0.15
2000 0.15 0.13 0.17 0.14
5000 0.14 0.12 0.15 0.12
10000 0.16 0.14 0.18 0.15
TABLE2 INDEX OF COINCIDENCE (IC)
Input File Size(Bytes) Index of Coincidence (IC) for Plaintext Index of Coincidence (IC) for Ciphertex
DES LOKI91 DES LOKI91
100 0.959604 0.959604 0.067401 0.067522
500 0.955932 0.955932 0.081535 0.082189
2000 0.961995 0.961995 0.089604 0.090311
5000 0.976799 0.976799 0.102679 0.103218
10000 0.982129 0.982129 0.097445 0.100812
TABLE 1 represents the five different sizes of files and corresponding encryption and decryption execution time taken by DES
and LOKI91 algorithms in seconds. By analyzing the TABLE 1, we conclude that the encryption and decryption time taken by
LOKI91 is slightly small as compare to DES. These comparisons are shown in Fig.4.
TABLE 2 represents the five different sizes of files and corresponding IndexofCoincidence(IC)byDESandLOKI91 algorithms.
By analyzing the table 2, we conclude that the IC for ciphertext by LOKI91 is large as compare to DES. These comparisons are
shown in Fig.5.
(a) (b)
Fig. 4 Execution Time for (a) Encryption (b) Decryption
Fig. 5 Index of Coincidence (IC) for Ciphertext
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1443
E. CONCLUSIONS
This paper presents the performance evaluation of
cryptographic algorithms for various types of files. we have
studied that the encryption and decryption execution time
consumed by DES algorithm is not quite different for some
sort of message compared to LOKI91 algorithm. Index of
Coincidence (IC) for the ciphertext byDESis smallerthan the
LOKI91. Thus, the performance of DES is very good as
compared to LOKI91.
References
[1] Rishabh Arora Sandeep Sharma, PhD, “Performance
Analysis of Cryptography Algorithms”, International
Journal of Computer Applications (0975 – 8887)
Volume 48– No.21, June 2012.
[2] Sombir Singh1 , Sunil K Maakar 2 and Dr. Sudesh
Kumar3, “A Performance Analysis of DES and RSA
Cryptography”, International Journal of Emerging
Trends & Technology in Computer Science (IJETTCS),
Volume 2, Issue 3, May – June 2013.
[3] Abdullah Al Hasib, Abul Ahsan Md. Mahmudul Haque,"
A Comparative Study of the Performance and Security
Issues of AES and RSA Cryptography", Third
International Conference on Convergence and Hybrid
Information Technology,2008.
[4] William Stallings, “CryptographyandNetwork Security
Principles and Practices.” Prentice Hall, November 16,
2005.
[5] A. Nadeem, "A performance comparison of data
encryption algorithms", IEEE information and
communication technologies, pp.84-89, 2006.Bn
[6] Gaurav Shrivastava, “Analysis ImprovedCryptosystem
Using DES with RSA.” VSRDIJCSIT, Vol. 1 (7), 465-470,
2011.
[7] Charels Connell, “An Analysis of New DES: A Modified
Version of DES”, Locust Street Burlington, USA, Boston
MA 02215 USA.

Weitere ähnliche Inhalte

Was ist angesagt?

A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms Er Piyush Gupta IN ⊞⌘
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithmsHridyesh Bisht
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
A critical reassessment of
A critical reassessment ofA critical reassessment of
A critical reassessment ofijcisjournal
 
AES by example
AES by exampleAES by example
AES by exampleShiraz316
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogHardik Manocha
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_reportNikhil Gupta
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption StandardPrince Rachit
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in CSourav Punoriyar
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
 

Was ist angesagt? (17)

MD-5 : Algorithm
MD-5 : AlgorithmMD-5 : Algorithm
MD-5 : Algorithm
 
A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms A Comparative Analysis between SHA and MD5 algorithms
A Comparative Analysis between SHA and MD5 algorithms
 
Data streaming algorithms
Data streaming algorithmsData streaming algorithms
Data streaming algorithms
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
A critical reassessment of
A critical reassessment ofA critical reassessment of
A critical reassessment of
 
cns 2marks
cns 2markscns 2marks
cns 2marks
 
AES by example
AES by exampleAES by example
AES by example
 
Secure Hash Algorithm
Secure Hash AlgorithmSecure Hash Algorithm
Secure Hash Algorithm
 
Minor Project- AES Implementation in Verilog
Minor Project- AES Implementation in VerilogMinor Project- AES Implementation in Verilog
Minor Project- AES Implementation in Verilog
 
Aes128 bit project_report
Aes128 bit project_reportAes128 bit project_report
Aes128 bit project_report
 
AES-Advanced Encryption Standard
AES-Advanced Encryption StandardAES-Advanced Encryption Standard
AES-Advanced Encryption Standard
 
Basic explanation to md5 implementation in C
Basic explanation to md5 implementation in CBasic explanation to md5 implementation in C
Basic explanation to md5 implementation in C
 
Md5
Md5Md5
Md5
 
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemUsing Cipher Key to Generate Dynamic S-Box in AES Cipher System
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Sha
ShaSha
Sha
 
Unit 2
Unit 2Unit 2
Unit 2
 

Ähnlich wie Performance Analysis of Data Encryption Standard DES

Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptographyNithyasriA2
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...IJECEIAES
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Shiraz316
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptxDrAnilKannur1
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISijcisjournal
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionTharindu Weerasinghe
 
presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standardsSwati Sharma
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
block ciphers
block ciphersblock ciphers
block ciphersAsad Ali
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptxKannanN45
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-IIrathnadeepa2
 

Ähnlich wie Performance Analysis of Data Encryption Standard DES (20)

Final report
Final reportFinal report
Final report
 
Data Encryption standard in cryptography
Data Encryption standard in cryptographyData Encryption standard in cryptography
Data Encryption standard in cryptography
 
chap3.pdf
chap3.pdfchap3.pdf
chap3.pdf
 
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...
 
CNS2 unit 2.pdf
CNS2 unit 2.pdfCNS2 unit 2.pdf
CNS2 unit 2.pdf
 
Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1Chapter 3-block-cipher-des1
Chapter 3-block-cipher-des1
 
DES.ppt
DES.pptDES.ppt
DES.ppt
 
Block Ciphers and DES.pptx
Block Ciphers and DES.pptxBlock Ciphers and DES.pptx
Block Ciphers and DES.pptx
 
Proposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DESProposing an Encryption Algorithm based on DES
Proposing an Encryption Algorithm based on DES
 
icwet1097
icwet1097icwet1097
icwet1097
 
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTION
 
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISHARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSIS
 
Unit 2
Unit  2Unit  2
Unit 2
 
Secured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryptionSecured algorithm for gsm encryption & decryption
Secured algorithm for gsm encryption & decryption
 
presentation based on data encryption standards
presentation based on data encryption standardspresentation based on data encryption standards
presentation based on data encryption standards
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
block ciphers
block ciphersblock ciphers
block ciphers
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
Network Security UNIT-II
Network Security UNIT-IINetwork Security UNIT-II
Network Security UNIT-II
 
82 86
82 8682 86
82 86
 

Mehr von ijtsrd

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
 

Mehr von ijtsrd (20)

‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation‘Six Sigma Technique’ A Journey Through its Implementation
‘Six Sigma Technique’ A Journey Through its Implementation
 
Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...Edge Computing in Space Enhancing Data Processing and Communication for Space...
Edge Computing in Space Enhancing Data Processing and Communication for Space...
 
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and ProspectsDynamics of Communal Politics in 21st Century India Challenges and Prospects
Dynamics of Communal Politics in 21st Century India Challenges and Prospects
 
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...
 
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...The Impact of Digital Media on the Decentralization of Power and the Erosion ...
The Impact of Digital Media on the Decentralization of Power and the Erosion ...
 
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...
 
Problems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A StudyProblems and Challenges of Agro Entreprenurship A Study
Problems and Challenges of Agro Entreprenurship A Study
 
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...
 
The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...The Impact of Educational Background and Professional Training on Human Right...
The Impact of Educational Background and Professional Training on Human Right...
 
A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...A Study on the Effective Teaching Learning Process in English Curriculum at t...
A Study on the Effective Teaching Learning Process in English Curriculum at t...
 
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...
 
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...
 
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. SadikuSustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku
 
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...
 
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...
 
Activating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment MapActivating Geospatial Information for Sudans Sustainable Investment Map
Activating Geospatial Information for Sudans Sustainable Investment Map
 
Educational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger SocietyEducational Unity Embracing Diversity for a Stronger Society
Educational Unity Embracing Diversity for a Stronger Society
 
Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...Integration of Indian Indigenous Knowledge System in Management Prospects and...
Integration of Indian Indigenous Knowledge System in Management Prospects and...
 
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...
 
Streamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine LearningStreamlining Data Collection eCRF Design and Machine Learning
Streamlining Data Collection eCRF Design and Machine Learning
 

Kürzlich hochgeladen

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...DhatriParmar
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDhatriParmar
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxSayali Powar
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxDhatriParmar
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptxmary850239
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1GloryAnnCastre1
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQuiz Club NITW
 

Kürzlich hochgeladen (20)

Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
Beauty Amidst the Bytes_ Unearthing Unexpected Advantages of the Digital Wast...
 
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of EngineeringFaculty Profile prashantha K EEE dept Sri Sairam college of Engineering
Faculty Profile prashantha K EEE dept Sri Sairam college of Engineering
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptxDecoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
Decoding the Tweet _ Practical Criticism in the Age of Hashtag.pptx
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptxBIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
BIOCHEMISTRY-CARBOHYDRATE METABOLISM CHAPTER 2.pptx
 
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptxMan or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
Man or Manufactured_ Redefining Humanity Through Biopunk Narratives.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx4.11.24 Mass Incarceration and the New Jim Crow.pptx
4.11.24 Mass Incarceration and the New Jim Crow.pptx
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1Reading and Writing Skills 11 quarter 4 melc 1
Reading and Writing Skills 11 quarter 4 melc 1
 
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITWQ-Factor General Quiz-7th April 2024, Quiz Club NITW
Q-Factor General Quiz-7th April 2024, Quiz Club NITW
 
Paradigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTAParadigm shift in nursing research by RS MEHTA
Paradigm shift in nursing research by RS MEHTA
 
Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"Mattingly "AI & Prompt Design: Large Language Models"
Mattingly "AI & Prompt Design: Large Language Models"
 

Performance Analysis of Data Encryption Standard DES

  • 1. International Journal of Trend in Scientific Research and Development (IJTSRD) Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470 @ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1439 Performance Analysis of Data Encryption Standard (DES) Thida Soe, Soe Soe Mon, Khin Aye Thu Faculty of computer systems and Technology, University of Computer Studies, Hinthada, Myanmar How to cite this paper: Thida Soe | Soe Soe Mon | Khin Aye Thu "Performance Analysis of Data Encryption Standard (DES)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456- 6470, Volume-3 | Issue-5, August 2019, pp.1439-1443, https://doi.org/10.31142/ijtsrd26650 Copyright © 2019 by author(s) and International Journal ofTrend inScientific Research and Development Journal. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (CC BY 4.0) (http://creativecommons.org/licenses/by /4.0) ABSTRACT Information security is becoming much more important in data storage and transmission with the fast progression of digital data exchange in electronic way. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The cryptography is most important aspect of communications security and becoming an important building block for computer security.This securitymechanismuses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. To protect sent messages that some of the most commonly used cryptography methods with private key based algorithm are LOKI (89, 91, 97), DES, triple DES, AES, Blowfish, etc. These algorithms also include several computational issues as well as the analysis of DES algorithm. The main features that specify and differentiate one algorithm from another are the ability to the speed of encryption and decryption of the input plain text. This paper analyzes the private key based algorithm DES and LOKI91 by computing index of coincidence (IC) and time efficiency. KEYWORDS: cryptography, DES, LOKI91, Index of Coincidence (IC), run time INTRODUCTION Cryptography algorithms play an important role in providing security to networks. They can be categorized into symmetric (private) and asymmetric (public) keys encryption. In asymmetric keys, two keys are used; private and public keys. Public key is used for encryption and private key is used for decryption. In symmetric keys encryption or secret key encryption, only one key is used to encrypt and decrypt data. Symmetric algorithms can be divided into two categories: block ciphers and stream ciphers. The block ciphers operate on data in groups or blocks. The most common secure algorithms are DESX, a variation of Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES), etc. The less common secure algorithms are IDEA, RC6, LOKI (89/91/97), etc. For each algorithm there are two key aspects used: Algorithm type (define size of plain text shouldbe encrypted per step) and algorithm mode (define cryptographic Algorithm mode). Algorithm mode is a combination of a series of the basic algorithm and some block cipher and some feedback from previous steps. LOKI uses one 64-bit keys, DESX uses one 128-bit key while AES uses various 128, 192 or 256 bit keys. Blowfish uses various 32-448 default 128 bits. Encryption algorithms consumesignificantamount of computing resources such as CPU time, batterypoweretc. We compare and analyzed algorithms DES and LOKI91. A. Data Encryption Standard (DES) DES is a block cipher. It encrypts the plaintext data ina block of 64 bits and produces 64 bit cipher text. The cipher key length is 56 bits and round key length is 48 bits. Initially the key is consisting of 64 bits with the parity bits 8, 16, 24, 32,40,48,56, 64 and that bits are used for parity checking and is ignored. DES is based on the fundamentalattributes of cryptographic functions such as substitution(confusion) and transposition (diffusion), exclusive-OR operation, shifting and swapping. DES consists of 16 rounds and each round used only one round key that keys are generated from the round key generator. Round key generator crates the 48 bit keys for each round.  DES Algorithm Fig.1 Schematic DES algorithm IJTSRD26650
  • 2. International Journal of Trend in Scientific Research and Development (IJTSRD) @ IJTSRD | Unique Paper ID – IJTSRD26650 The algorithms steps are as follow: 1. In the first step, the initial 64-bit plain text block is handed over to initial permutation (IP) function. 2. The initial permutation is performed on plain text. 3. The initial permutation produces two halves of permuted block: Left plain text (L0) and Right pl (R0). 4. Each of L0 and R0 goes through 16 rounds of the encryption process, each with its own key. The single round of DES is shown in Fig. 2. These steps are A. From the 56-bit key, a different 48 generated by using key transformation. B. Using the expansion permutation, the R from 32 bits to 48 bits. C. Now, the 48-bit key is XORed with 48 resulting output is given in the next D. step. E. Using the S-box substitution producethe32 bit input. F. These 32 bits are permuted using straight P permutation. G. The straight P-box output 32 bits are XORed with the L032 bits. H. The result of the XORed 32 bits becomes the R R0 become the L1. This process is called as swapping. Now the R1 again given to the next roundandperformed the 15 more rounds. 5. After the completionof16rounds,thefinal permutation is performed. Fig.2 Single Round of DES B. LOKI In cryptography, LOKI89 and LOKI91 are symmetric key block ciphers designed as possible replacement the Data Encryption Standard (DES). The ciphers were developed based on a body of work analyzing DES, and are very similar to DES in structure. The LOKI named for Loki.  LOKI89 The cipher uses a 64-bit block anda 64-bit key a 16-round Feistel cipher andhas a similargeneralstructure, but differs in the choice of the particular "straight P-permutation", and the "Expansion permutation". The S-Boxes use the non-linearitycriteriadeveloped byJosef Pieprzyk, making them as "complex" and "unpredictable" as possible. Their effectiveness was compared against the known design criteria forthe DES S-boxes.Thepermutations International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com 26650 | Volume – 3 | Issue – 5 | July - August bit plain text block is handed over to initial permutation (IP) function. The initial permutation is performed on plain text. The initial permutation produces two halves of ) and Right plain text goes through 16 rounds of the encryption process, each with its own key. The single round of DES is shown in Fig. 2. These steps are bit key, a different 48-bit sub-key is n. Using the expansion permutation, the R0 is expended bit key is XORed with 48-bit Ki and the box substitution producethe32-bitfrom48- its are permuted using straight P-box box output 32 bits are XORed with the The result of the XORed 32 bits becomes the R1 and old called as swapping. next roundandperformed After the completionof16rounds,thefinal permutation DES symmetric- designed as possible replacements for (DES). The ciphers were developed based on a body of work analyzing DES, and are algorithms were key.Like DES, itis andhas a similargeneralstructure, but differs in the choice of the particular S-boxes, the permutation", and the "Expansion permutation". linearitycriteriadeveloped byJosef Pieprzyk, making them as "complex" and "unpredictable" as possible. Their effectiveness was compared against the .Thepermutations were designed to "mix" the outputs of the as possible, promoting the avalanche and completeness properties, essential for a good unlike their equivalents in the DES, they are intended to be as clean and simple as possible, aiding the analysis of the design. Following the publication of LOKI89 new differential cryptanalysis resulted in the design being changed to become LOKI91.  LOKI91 LOKI91 was designed in response to the attacks on LOKI89. The changes included removing the initial and final whitening, a new S-box, and small alterations to the schedule. More specifically, the S minimize the probability of seeing different inputs resulting in the same output (a hook which cryptanalysis uses), thus improving LOKI91's immunity to this attack. The changes to the key schedule were designed to reduce the number of "equivalent" or "related" keys, which resulted in the exhaustive search space for the cipher being reduced. Whilst the resulting cipher is clearly stronger and more secure than LOKI89, there are a number of potential attacks. Consequently these ciphers should be viewed as academic efforts to advance the field of block cipher design, rather than algorithms for use. The number of citations and published critiques suggests this aim has been achieved.  LOKI91 Algorithm Fig.3 Schematic LOKI91 algorithm The mechanics of LOKI91 are similar to DES. The data block then divided into a left half and right half and goes through 16 rounds, much like DES. In each round, the right half is first XORed with a piece of the key, then through an expansion permutation. The 48 bit output is divided into four 12 block is sent through an S-box substitution. Then, thefour8 bits output are recombined to form a single 32 and sent through the permutation. Finally, the right half is XORed with the left half to become the new right half, and the right half becomes the new left half. After 16 rounds, the block is again XORed with the key to produce the ciphertext. www.ijtsrd.com eISSN: 2456-6470 August 2019 Page 1440 were designed to "mix" the outputs of the S-boxes as quickly as possible, promoting the avalanche and completeness properties, essential for a good Feistel cipher. However unlike their equivalents in the DES, they are intended to be as clean and simple as possible, aiding the analysis of the Following the publication of LOKI89, information on the differential cryptanalysis became available. This resulted in the design being changed to become LOKI91. designed in response to the attacks on LOKI89. The changes included removing the initial and final key box, and small alterations to the key . More specifically, the S-boxes were changed to minimize the probability of seeing different inputs resulting in the same output (a hook which Differential uses), thus improving LOKI91's immunity to this attack. The changes to the key schedule were designed to reduce the number of "equivalent" or "related" keys, n the exhaustive search space for the cipher Whilst the resulting cipher is clearly stronger and more secure than LOKI89, there are a number of potential attacks. Consequently these ciphers should be viewed as academic the field of block cipher design, rather than algorithms for use. The number of citations and published critiques suggests this aim has been achieved. Fig.3 Schematic LOKI91 algorithm The mechanics of LOKI91 are similar to DES. The data block then divided into a left half and right half and goes through 16 rounds, much like DES. In each round, the right half is first XORed with a piece of the key, then through an The 48 bit output is divided into four 12-bit blocks, and each box substitution. Then, thefour8- bits output are recombined to form a single 32-bit number and sent through the permutation. Finally, the right half is the left half to become the new right half, and the right half becomes the new left half. After 16 rounds, the block is again XORed with the key to produce the ciphertext.
  • 3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1441 The sub-keys are generated from the key in a straight forward manner. The 64-bit key is split into a left half and a right half. This left half is then rotated 12 or 13 bits totheleft and then every two rounds the left and right halves are exchanged. As with DES, the same algorithm can be used for both encryption and decryption, with some modification in how the sub-keys are used. C. Analysis of DES and LOKI91 Algorithms  Implementation of DES Algorithm The procedures of encryption program are as follow: 1. Read a key of any 8 characters. 2. Convert the key from ASCII to binary from, and then obtain 64-bits input. 3. Change the first 28 bits position by using the first of permuted choice (PC-1). Then we obtain Ci 28 bits and the last 28 bits for the second part, so we get Di 28 bits. 4. We should check whether we could use a 1 circular left shift (1 rotate left) or two circular left shift (2 rotate left). After these operations, we concatenate the Ci and Di then obtain CDi 56 bits. Then change the CDi position by using the permuted choice 2(PC-2), so we get Ki 48 bits. 5. After repeating this operation 16 times, we get 16 number of Ki. 6. Read the input file name and the output file name the operation. 7. If end of encounter, the process will stop. 8. Read the 8 characters from input files and convert the ASCII code to binary for, so we obtain the 64 bits input. Then change position by using initial permutation (IP). 9. The left 32 bits is called left permuted input L0 and the right 32 bits is called right permuted R0. 10. For J = 1 to 16. 11. L(J) = R(J-1) 12. This R(J-1) is expended from 32 bits to 48 bits by using the expansion table. The operate XOR calculation of this R(J-1) 48 bits and K(J) 48 bits and get new nr0 48 bits. 13. Exacts 6 bits from nr0. The first bit and the last bit represents the row and the middle 4 bits represents the column of selection function Si. Then we get 4 bits from Si and after this operation 8 times, we obtain 8 number of Si. We concatenate S1 to S8 we obtain var32 bits. 14. Change positions in var32 by using the primitive function (P), and so we obtain 32 bits pvar32. 15. This pvar32 and L(J-1) are subjected to XOR calculation, thus obtain R(J). 16. Next J. After this operation, get 16 numbers of R(J) and L(J). 17. Concatenate the last position of R(16), then obtain preoutput RL64 bits. 18. Operate the initial permutation inverse (IP-1) with RL. Then obtain the ciphertext 64 bits. 19. Write to a ciphertext 64 bits to output file. 20. Go to step 7.  Implementation of LOKI91 Algorithm The LOKI91 Algorithm is developed by window XP personal computer using visual C++ programming language. 1. Read a key of any 8 characters. 2. Convert the key from ASCII to binary from, and then obtain 64-bits input. 3. Change the first 32 bits position by using the first of permuted choice (PC-1). Then we obtain Ci 32 bits and the last 32 bits for the second part, so we get Di 32 bits. 4. After the first round, the rotation of the left sub-key alternated between 12 and 13 bits totheleft.Then every two round, the left and right halves are exchanged. 5. After repeating tis operation 16 times, we get 16 number of Ki. 6. Read the input file name and the output file name the operation. 7. If end of encounter, the process will stop. 8. Read the 8 characters from input files and convert the ASCII code to binary for, so we obtain the 64 bits input. Then change position by using initial permutation (IP). 9. The left 32 bits is called left permuted input L0 and the right 32 bits is called right permuted R0. 10. For J = 1 to 16. 11. L(J) = R(J-1) 12. This R(J-1) is expended from 32 bits to 48 bits by using the expansion table. The operate XOR calculation of this R(j-1) 48 bits and K(j) 48 bits and get new nr0 48 bits. 13. Divided into four 12 bit blocks. The two left-most bits and the two right-most bits represent the row and the middle 8 bits represent the column of selection function Si. Then we get 8 bit from Si and after this operation 8 times, we obtain 8 number of Si. 14. Change positions in var 32 by using the primitive function (P), and so we obtain 32 bits pvar 32. 15. This pvar 32 and L(J-1) are subjectedtoXORcalculation, thus obtain R(J). 16. Next J. After this operation, get 16 numbers of R(J) and L(J). 17. Concatenate the last position of R(16), then obtain preoutput RL64 bits. 18. Operate the initial permutation inverse (IP-1) with RL. Then obtain the ciphertext 64 bits. 19. Write to a ciphertext 64 bits to output file. 20. Go to step 7.  Index of Coincidence (IC) The index of coincidence IC, measures the variation in the frequencies of letters in the ciphertext.Iftheperiodofcipher is one (1), that is simple substitution has been used, there will be considerable variation in the letter frequencies of IC will be high. As the period increase,thevariationis gradually eliminated (due to the diffusion) and IC is low. Let the length of the text be N and let the size of the alphabet be n. Consider the i-th letter ai in the alphabet. Suppose ai appears in the given text Fi times. Since the number of ai's in the text is Fi, picking the first ai has Fi different choices and picking the second ai has only Fi-1 different choices because one ai has been selected. Since there are N(N-1) different ways of picking two characters from the text, the probability of having two ais is Since the alphabet has n different letters and the above applies to each of them, the probability of having two identical letters from the text is’
  • 4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1442 Therefore, the index of coincidence is: English has n = 26 letters. D. Experimental and Simulation Analysis We analyzed the two algorithms withEnglishtexts and these texts are selected randomly. And then input file sizes are used from small to large size. Different samples yieldslightly different result. We analyzed the performance of these algorithms by computing Index of Coincidence (IC) andtime efficiency. TABLE1 ENCRYPTION AND DECRYPTION EXECUTION TIME Input File Size(Bytes) Encryption Execution Time(Seconds) Decryption Execution Time(Seconds) DES LOKI91 DES LOKI91 100 0.12 0.11 0.14 0.13 500 0.14 0.12 0.16 0.15 2000 0.15 0.13 0.17 0.14 5000 0.14 0.12 0.15 0.12 10000 0.16 0.14 0.18 0.15 TABLE2 INDEX OF COINCIDENCE (IC) Input File Size(Bytes) Index of Coincidence (IC) for Plaintext Index of Coincidence (IC) for Ciphertex DES LOKI91 DES LOKI91 100 0.959604 0.959604 0.067401 0.067522 500 0.955932 0.955932 0.081535 0.082189 2000 0.961995 0.961995 0.089604 0.090311 5000 0.976799 0.976799 0.102679 0.103218 10000 0.982129 0.982129 0.097445 0.100812 TABLE 1 represents the five different sizes of files and corresponding encryption and decryption execution time taken by DES and LOKI91 algorithms in seconds. By analyzing the TABLE 1, we conclude that the encryption and decryption time taken by LOKI91 is slightly small as compare to DES. These comparisons are shown in Fig.4. TABLE 2 represents the five different sizes of files and corresponding IndexofCoincidence(IC)byDESandLOKI91 algorithms. By analyzing the table 2, we conclude that the IC for ciphertext by LOKI91 is large as compare to DES. These comparisons are shown in Fig.5. (a) (b) Fig. 4 Execution Time for (a) Encryption (b) Decryption Fig. 5 Index of Coincidence (IC) for Ciphertext
  • 5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470 @ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1443 E. CONCLUSIONS This paper presents the performance evaluation of cryptographic algorithms for various types of files. we have studied that the encryption and decryption execution time consumed by DES algorithm is not quite different for some sort of message compared to LOKI91 algorithm. Index of Coincidence (IC) for the ciphertext byDESis smallerthan the LOKI91. Thus, the performance of DES is very good as compared to LOKI91. References [1] Rishabh Arora Sandeep Sharma, PhD, “Performance Analysis of Cryptography Algorithms”, International Journal of Computer Applications (0975 – 8887) Volume 48– No.21, June 2012. [2] Sombir Singh1 , Sunil K Maakar 2 and Dr. Sudesh Kumar3, “A Performance Analysis of DES and RSA Cryptography”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Volume 2, Issue 3, May – June 2013. [3] Abdullah Al Hasib, Abul Ahsan Md. Mahmudul Haque," A Comparative Study of the Performance and Security Issues of AES and RSA Cryptography", Third International Conference on Convergence and Hybrid Information Technology,2008. [4] William Stallings, “CryptographyandNetwork Security Principles and Practices.” Prentice Hall, November 16, 2005. [5] A. Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, pp.84-89, 2006.Bn [6] Gaurav Shrivastava, “Analysis ImprovedCryptosystem Using DES with RSA.” VSRDIJCSIT, Vol. 1 (7), 465-470, 2011. [7] Charels Connell, “An Analysis of New DES: A Modified Version of DES”, Locust Street Burlington, USA, Boston MA 02215 USA.