Open Access Open Access  Restricted Access Subscription or Fee Access

New Data Encryption Standard Algorithm

C.V. Anchugam

Abstract


A goal is the design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has a significant value, either directly or indirectly, which requires protection. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Performance and security level is the main characteristics that differentiate one encryption algorithm from another. Here introduces a new method to enhance the performance of the Data Encryption Standard (DES) algorithm is introduced here. This is done by replacing the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation depends on using two keys, each key consists of a combination of 4 states (0, 1, 2, 3) instead of the ordinary 2 state key (0, 1). This replacement adds a new level of protection strength and more robustness against breaking methods. The New Comparative Study between DES, 3DES and AES within Nine Factors achieving an efficiency, flexibility and security, which is a challenge of researchers.

Keywords


Comparison of DES, 3DES and AES, DES, Encryption, Decryption.

Full Text:

PDF

References


National Bureau of Standards – Data Encryption Standard, Fips Publication 46, 1977.

O.P. Verma, Ritu Agarwal, Dhiraj Dafouti,Shobha Tyagi “ Performance Analysis Of Data Encryption Algorithms “ , 2011

Gurjeevan Singh, Ashwani Kumar Singla, K.S.Sandha “Performance Evaluation of Symmetric Cryptography Algorithms”, IJECT, 2011.

Diaa Salama, Abdul Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoun“Performance Evaluation of Symmetric Encryption Algorithm “, IJCSNS, 2008

Dr. Mohammed M. Alani “ Improved DES Security” ,International Multi-Conference On System, Signals and Devices, 2010

Tingyuan Nie, Teng Zhang “A Study of DES and Blowfish Encryption Algorithm”,TENCON, 2009

Afaf M. Ali Al- Neaimi, Rehab F. Hassan “New Approach for Modified Blowfish Algorithm Using 4 – States Keys”, The 5th International Conference On Information Technology, 2011

J.Orlin Grabbe “The DES Algorithm Illustrated”

Dhanraj, C.Nandini, and Mohd Tajuddin “An Enhanced Approch for Secret Key Algorithm based on Data Encryption Standard”, International Journal of Research And Review in Computer Science, August 2011

Gurjeevan Singh, Ashwani Kumar, K.S. Sandha “A Study of New Trends in Blowfish Algorithm “, International Journal of Engineering Research and Application,2011

W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed., Prentice Hall, 1999.

B.Scheier, Applied Cryptography: Protocols, Algorithms and Source Code in C,2nd ed.., John Wiley & Sons, 1995.

A.W. Naji, A.A.Zaidan, B.B.Zaidan, Ibrahim A.S.Muhamadi, “Novel Approach for Cover File of Hidden Data in the Unused Area Two within EXE File Using Distortion Techniques and Advance Encryption Standard.”, Proceeding of World Academy of Science Engineering and Technology (WASET),Vol.56, ISSN:2070-3724, P.P 498-502.

M. Abomhara, Omar Zakaria, Othman O. Khalifa , A.A.Zaidan, B.B.Zaidan, “Enhancing Selective Encryption for H.264/AVC Using Advance Encryption Standard “, International Journal of Computer and Electrical Engineering (IJCEE), ISSN: 1793-8198,Vol.2 , NO.2, April 2010, Singapore.

A.W. Naji, Shihab A. Hameed, B.B.Zaidan, Wajdi F. Al-Khateeb, Othman O. Khalifa, A.A.Zaidan and Teddy S. Gunawan, “ Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advance Encryption Standard and Distortion Techniques”, International Journal of Computer Science and Information Security (IJCSIS), Vol. 3, No 1 ISSN: 1947-5500, P.P 73-78,3 Aug 2009, USA.

Hamdan. Alanazi, Hamid.A.Jalab, A.A.Zaidan, B.B.Zaidan, “New Frame Work of Hidden Data with in Non Multimedia File”, International Journal of Computer and Network Security, 2010, Vol.2, No.1, ISSN: 1985-1553, P.P 46-54,30 January, Vienna, Austria.

Alaa Taqa, A.A Zaidan, B.B Zaidan ,“New Framework for High Secure Data Hidden in the MPEG Using AES Encryption Algorithm”, International Journal of Computer and Electrical Engineering (IJCEE), Vol.1 ,No.5, ISSN: 1793-8163, p.p.566-571 , December (2009). Singapore.

A.A.Zaidan, B.B.Zaidan, Hamid.A.Jalab,“ A New System for Hiding Data within (Unused Area Two + Image Page) of Portable Executable File using Statistical Technique and Advance Encryption Standard “, International Journal of Computer Theory and Engineering (IJCTE), 2010, VOL 2, NO 2, ISSN:1793-8201,Singapore.


Refbacks

  • There are currently no refbacks.


Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 License.