Enhancement of DES Algorithm with Multi State Logic

Download Full Text
Author(s):
Payal Patel, Kruti Shah, Khushbu Shah
Published Date:
May 05, 2014
Issue:
Volume 4, Issue 3
Page(s):
13 - 17
DOI:
10.7815/ijorcs.43.2014.085
Views:
5221
Downloads:
130

Keywords:
des, encryption, decryption
Citation:
Payal Patel, Kruti Shah, Khushbu Shah, "Enhancement of DES Algorithm with Multi State Logic". International Journal of Research in Computer Science, 4 (3): pp. 13-17, May 2014. doi:10.7815/ijorcs.43.2014.085 Other Formats

Abstract

The principal goal to design any encryption algorithm must be the security against unauthorized access or attacks. Data Encryption Standard algorithm is a symmetric key algorithm and it is used to secure the data. Enhanced DES algorithm works on increasing the key length or complex S-BOX design or increased the number of states in which the information is to be represented or combination of above criteria. By increasing the key length, the number of combinations for key will increase which is hard for the intruder to do the brute force attack. As the S-BOX design will become the complex there will be a good avalanche effect. As the number of states increases in which the information is represented, it is hard for the intruder to crack the actual information. Proposed algorithm replace the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation called “Hash function” depends on using two keys. One key used in “F” function and another key consists of a combination of 16 states (0,1,2…13,14,15) instead of the ordinary 2 state key (0, 1). This replacement adds a new level of protection strength and more robustness against breaking methods.

  1. Dr. Mohammed M. Alani College of Computer Engineering and Sciences, Gulf University, Kingdom of Bahrain, “DES96 - Improved DES Security”, 7th International Multi-Conference on Systems, Signals and Devices, IEEE 2010.
  2. Akhil Kaushik Assistant Professor, Computers Department, Manoj Bamela Assistant Professor, Electronics Department, AnantKumar B.Tech Pre-final, Computers Engineering from T.I.T&S College Bhiwani, Haryana, India, “Block Encryption Standard for Transfer of Data”, International Conference on Networking and Information Technology, IEEE 2010.
  3. K. Anchugam and M. Tamilselvi, “New Data Encryption Standard Algorithm”, IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.4, April 2013.
  4. Prashanti G.,Dipti S, Sandhya Rani K., “A Novel Approach for Data Encryption Standard Algorithm”, International Journal of Engineering and Advanced Technology (IJEAT) ISSN: 2249 – 8958, Volume-2, Issue-5, June 2013.
  5. Devendra Kumar Malakar, Prof. Dineshchandra Jain,CSE Department, Shri Vaishnav Institute of Technology and Science,Indore, Madhya Pradesh,India, “The Problem Analysis on Encryption Techniques in Cryptography” , International Journal of Societal Applications of Computer Science Vol 2 Issue 5 May 2013,ISSN 2319 – 8443.
  6. M. A. Al Zain and E. Pardede, “Using Multi Shares for Ensuring Privacy in Database-as-a-Service”, 44th Hawaii, International Conference on System Sciences (HICSS),2011,pp 1-9. doi: 10.1109/HICSS.2011.478
  7. W. Stallings, “Cryptography and Network Security: Principles and Practices, 4th ed., Prentice Hall”.
  8. https://engineering.purdue.edu/kak/compsec/NewLectures/Lecture8.pdf

    Sorry, there are no citation(s) for this manuscript yet.