SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1777
DES- Data Encryption Standard
Indumathi Saikumar
Post Graduate Student, Electronic and Communication Engineering,
CMR College of Engineering and Technology, Telangana, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - The data encryption standard is also known as
DES.DES has been the most extensively used encryption
algorithm standardinrecent times. Encryptionand decryption
comprise of cryptography. Cryptography terminology is used
in the data encryption standard along with standard
algorithm to hide the original text. DES applies the cipher
algorithm to each data block. Data encryption is being used to
hide the true meaning of data so that it is very hard to attack
or crack. This paper deals with the simulation and synthesis
results of implemented DES algorithm. Analysis of
implementation is shown in step by step process. A test case is
analyzed step by step to check the results at each step of the
algorithm.
Key Words: DES, Cryptography, Encryption, Decryption
1. INTRODUCTION
Data which can be read and understood without any special
measures is called as plaintext. Disguising plaintextinsucha
way to hide its true meaning is called encryption.Encrypting
plaintext results in unreadable gibberish form called cipher
text. Encryption is done to hide the data from anyone for
whom it is not intended. Reverting the cipher text to its
original plaintext is called as decryption.DESmethodisused
to store sensitive informationortransmitinformationacross
insecure networks so that it cannot be read by anyone
except the intended recipient.
Fig -1: Encryption and decryption
Data encryption standard uses cryptographic algorithmthat
can be used to protect electronic data. There are three
methods of encryption standard they are symmetric
cryptography, asymmetric cryptography and hash function.
DES algorithm makes use of symmetric cryptograph. Block
cipher algorithm is used for encryption and decryption
purpose and the message is divided into blocks of bits. DES
processes the input data (Original message)of block size64-
bits and a secret key of 64-bits to provide a 64-bit cipher
text.
2. CRYPTOGRAPHY
Cryptography is derivedfromGreek languagekryptosmeans
hidden and grafos meaning write or speak which means
study of hiding information. It is the scienceofsecuringdata.
Cryptography is a science of using mathematics to encrypt
and decrypt data. Cryptography enables to store important
data or transmit it across insecure networkssothatitcannot
be read by anyone except the intended recipient.
Cryptography examples include the security of the ATM
cards, computer passwords and electronic commerce which
all depend upon cryptography.
2.1 Purpose of cryptography
Cryptography is necessary when communicating over any
medium such as internet. Mostly used for communicating
over un-trusted medium. To send information over an
untrusted medium there are some specific requirements
such as
Authentication: Authentication is a process of identifyingan
individual, such as based on username and password.
Privacy: Privacy is ensuring the sender that the messagecan
be read by the intended receiver and no one else.
Integrity: Assuring the receiver that the received message
has to been altered in any way from the original.
Non-repudiation: It is a method of guaranteeing message
transmission between two parties. Successful completion of
message sent and received.
3. METHODS OF ENCRYPTION
There are several blocks in an encryption method, the two
main blocks are the algorithms and the key. Algorithms are
the complex mathematical formulas that dictate the rules of
how the plaintext will be converted into cipher text. Key is a
set of random bits that will be inserted into the algorithm.
Two users can communicate via encryption, they must use
the same algorithm and the same key. In some encryption
cases, the receiver and sender use the same key and in other
encryption cases they must use differentkeysfor encryption
and decryption process.Therearethreedifferentmethodsof
encryption namelysymmetricasymmetricandhashfunction
method for encryption and decryption.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1778
Fig -2: Two types of cryptographic algorithms
Cryptography algorithms use either symmetric keys or
asymmetric keys. Symmetric keys are also calledsecretkeys
which uses a single key for encryption and decryption.
Asymmetric keys are also called as public keys which makes
use of two different keys for encryption and decryption.
3.1 Symmetric cryptography
In symmetric cryptography both the parties i.e. the sender
and the receiver will be using the same key for encryption
and decryption process as show in Figure 2.
Fig -3: Symmetric algorithms, both the sender and receiver
use the same keys to encryption and decryption message
A sender uses a key to encrypt plain text into cipher text and
sends it to the receiver. Receiver uses the same key to
decrypt the cipher text into plain text. As told above
symmetric key is also called as secret key, because this type
of encryption depends on each user, there can be more than
one user but the users should keep the key a secret and
properly protect it. If this key goes into the intruder’s hand,
that intruder has the access to decrypt any intercepted
message encrypted with this key. Some type of symmetric
algorithms are DES, Triple DES, AES and etc.
The following list outlines theadvantagesanddisadvantages
of symmetric key systems:
Advantages:
1. Much faster than asymmetric method
2. Hard to break the key if large key size is used
3. Compared to asymmetric systems, symmetric
algorithms scream in speed.
Disadvantages:
1. Key distribution. The key must be delivered in a
proper way.
2. Scalability
3. Limited security
3.2 Asymmetric cryptography
In asymmetric cryptography two different keys are used for
encryption and decryption. In this type of cryptography a
pair of key is made up of one public key which can be known
to everyone and one private key which is known only to the
owner. Example of asymmetric cryptography is
demonstrated for better understanding.
Fig -4: A represents Alice’s lock, Lockbox, key, Safe Locker,
Encrypted message
Alice has a password for her safe locker and keeps key safely
in the locker. Lock isavailable to everyone. Lock iskeptinthe
lockbox. Alice friends bob, peter, mike can send her private
messages. To do that they need copies of Alice’s lock. Alice
sends them copies of her lock, and they put them in their
lockboxes. Her friends can now send private message with
Alice’s lockand sends it to her. When Alice receivesheremail
she opens the safelockerwithherpasswordtakesthekeyout
and unlocks the email. In the same way Alice can send
message to Bob, peter, mike. Alice encrypts a message with
Bob’s lock and sends it to Bob. Bob uses his key to unlock the
message.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1779
Fig -5: Symmetric algorithms, both the sender and receiver
use the same keys to encryption and decryption message
The following outlines the strengths and weaknesses of
asymmetric key systems: Strengths, Better key distribution
than symmetric systems, Better scalability than symmetric
systems, Can provide confidentiality, authentication, and
non-repudiation, Weaknesses, Works much slower than
symmetric systems.
The following are examples of asymmetric key algorithms:
 RSA
 Elliptic Curve Cryptosystem (ECC)
 Diffie-Hellman
 El Gamal
 Digital Signature Standard (DSS)
4. DES
The Data Encryption standard is used to protect electronic
data. DES algorithm uses symmetric block cipher for
encrypting and decrypting data. Encryption converts data
into gibberish language called cipher text. Decrypting the
cipher text gives us back the original data that is plaintext.
Converting the information from cipher to plain we use a
standard form of algorithm called Symmetric algorithm.
Fig -6: Overall Representation ofEncryptionanddecryption
DES takes an input of 64bits and the output is also of the
same size. The process requires a second input, which is a
secret key with length of 64bits. Block cipher algorithm is
used where message is divided into blocks of bits. Block
cipher is used forencryption and decryption. Theseblocksof
bits are put through substitution, transposition, and other
different mathematical functions.
Advantages of DES
 By using DES, input message of 64bits can be
encrypted using the secret key length of 64bits.
 The encrypted key is cipher key which is expanded
into a larger key, which is later used for other
operations
 DES is hard to attack
 DES is very hard to crack because of the number of
rounds used in encrypting message.
 DES is faster when compared RSA Encryption
Algorithm.
DES has high level of security. It is completely specified and
very easy to understand. It is adaptable to different
applications. Data rates are high. DES can be validated and
Exportable.
4.1 DES Application
 DES algorithm was made mandatoryforall financial
transactions by the U.S government which involves
electronic fund transfer.
 High speed in ATM
 It is used for secure video teleconferencing
 Used in Routers and Remote Access Servers
 It can be used by federal departments and agencies
when they require cryptographic protection for
sensitive information.
5. DATA ENCRYPTION STANDARD ALGORITHM
Data Encryption Standard means to encrypt plaintext onthe
basis of standard that was developed. There is some critical
data used for encryption and decryption know as a key. The
algorithm used to encrypt data is a standard algorithm.
Using standard algorithm data canencryptedanddecrypted.
Table1. Description of DES algorithm Blocks
IP Initial Permutation
IP-1 Inverse Permutation
PC1 Permuted Choice-1
PC2 Permuted Choice-2
E Expansion Permutation
P Permutation
The above mentioned functions are carried out for every
individual round. Based on the key provided a new key will
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1780
be generated in the key schedule block. The new key isgiven
as input to each round. There are four types
1. Permutation
2. Shifting
3. Substitution Box (S-box)
4. Instantiations
As per the standard, input 64 bits is taken, Initial
permutation will be performed after which the 16 rounds
with the input 64 bits key length is performed andfinallythe
result of the last round will be given to Inverse Permutation.
All the blocks perform operation separately.
Fig -7: Top Level Block diagram of DES Algorithm
The above Figure.7 shows top level block diagram of DES
algorithm.
6. ENCRYPTION
DES intakes input data of block size 64 bits and 64 bit key to
provide a 64 bit cipher text. In the 64 bit key, everyeighthbit
is used as parity checking bit. So, 56 bits takes part in the
algorithm to encrypt data. The 64 bit data is sent to “initial
permutation” which provides 64 bit output. The 64 bitkeyis
being fed to “permutation choice1” (PC1). The output of PC1
is 56 bits by ignoring the bit with sequence number in
multiples of 8. The two outputs of PC1 are fed to the first
round in the sequence of 16 round blocks.
The round block divides its input into two equal parts, the
data bits have parts Li of 32 bits and Ri of 32 bits.
Fig -8: DES Algorithm blocks
Fig -9: DES Algorithm with 16 Rounds
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1781
Similarly, key bits are divided in two parts Ci and Di each of
28 bits of length. The 56 bits are used to generate the 48 bit
round key through the “permutation chooice2”. The 32 bit
round key Ri is expanded to 48 bit round key through
‘expansion permutation’. The output from PC2 block is XOR-
Ed with expansion permutation block to get the 48 bit
address for the substitution box (S-box). The 48 bits is given
as sequence to S-box into 8 sections, each of 6 bits.TheS-box
replaces every 6 bit of data to 4 bit data. The 32 bits from S-
box is sent to the ‘permutation function’ to provide more
diffusion of bits. “Permutation function” bits are XOR-Ed
with the 32-bit Li. This output of XOR is connected to the Ri
of the next round. Li of the next round is connected to Ri of
this round. The output from Li of 32 bits and Ri 32 bits is feed
to the ‘Inverse Permutation’. Output of 64 bits is obtained
from IP-1. C0 and D0 are connected to Ci and Di of the next
round. Out of 16 rounds of operation, 12 rounds have 2 left
circular shifts and the rest 4 have only 1. The 64 data bits
from the round 16 are operated with 32 bit swap and then
fed to the IP-1. In the Final stage of the encryption it provides
another transposition before getting the final 64 bit
sequence called Cipher text.
All the rounds of operation are clearly represented in the
figure.8 and figure.9 and also the Algorithm is clearly
explained. All the operations such as initial permutation,
inverse permutation, substitution box, expansion
permutation, key schedule for the key generation are carried
with respect to the pre-defined standard tables.
7. ANALSIS OF THE IMPLMENTATION
The DES algorithm can be implemented using the Verilog
HDL code. A test case is analyzed step by step to check the
results at each step of the algorithm.
Input data=0123456789ABCDEFH
Encryption key=133457799BBCDFF1H
0123456789ABCDEFH Initial Permutation CC00CCFFF0AAF0AAH
133457799BBCDFF1H Permutation Choice1 F0CCAAF556678FH
Round 1 Inputs, Operation and Outputs
Inputs: Li=CC00CCFFH
Ri=F0AAF0AAH
Ci=F0CCAAFH & Di=556678FH
F0CCAAFH Left Circular Shift (for C) E19955FH
556678FH Left Circular Shift (for D) AACCF1EH
556678FAACCF1EH Permutation Choice2 1B02EFFC7072H
F0AAF0AAH Expansion Permutation 7A15557A1555H
7A15557A1555H 6117BA866527H
1B02EFFC7072H
6117BA866527H Substitution Box 5C82B597H
5C82B597H Permutation Function 234AA9BBH
234AA9BB H EF4A6544H
CC00CCFFH
Outputs: Lo=F0AAF0AAH
Ro=EF4A6544H
Co=E19955FH & Do=AACCF1EH
The outputs of round 1 is given as inputs to the round2to its
respective ports.
After 16 rounds of operation the final outputs are
Lo= 43423234H,
Ro= 0A4CD995H,
Co=F0CCAAFH and Do=556678FH
The values of C and D return to the initial values after
completion of 16 rounds. The last stage is the inverse
permutation to get the final result.
0A4CD99543423234H IP-1 85E813540F0AB405H
XOR1
XOR1
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1782
Finally, we receive the cipher text.
Cipher text= 85E813540F0AB405H
Therefore when 64 bit input data and 64 bit key data is given
16 rounds of operations are performed with the standard
algorithm we get a 64 bit output that is a cipher text. This is
called encryption. In the same way with the same key the
data can be decrypted. The coding for DES algorithm in
Verilog HDL and implementation of the logic on FPGA can
provide the knowledge about the operations taking place in
DES to encrypt data.
3. CONCLUSION
The concept of cryptography long with encryption and
decryption is explained. DES has 16roundsofoperation.The
plaintext is taken to 16 rounds of operation which produces
a cipher text. With the same key and data any
implementation it produces same output as the algorithm
specified in this standard. Data Encryption Standard has
increased the level of security because of the 16 rounds of
operation. It is difficult for the unauthorized party to attack
and crack. s
REFERENCES
[1] Applied Cryptography: Protocols, Algorithms, and
Source Code in C, by Bruce Schneier.
[2] Understanding Cryptography: A Textbook for students
and Practitioners by christof Paar, Jan Pelzl , Bart
Preneel
[3] Public-Key Cryptography Arto Salomaa, second edition,
Springer, 1996. ISBN 3-540-61356-0.
[4] http://faculty.nps.edu/dedennin/publications/DES-
15Years.pdf
[5] http://csrc.nist.gov/groups/ST/toolkit/block_ciphers.ht
ml
[6] http://faculty.nps.edu/dedennin/publications/DES-
15Years.pdf
[7] https://en.wikibooks.org/wiki/Cryptography/DES
[8] http://csrc.nist.gov/publications/PubsSPs.html#800-
131A

More Related Content

What's hot

Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...IRJET Journal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)Neelabja Manna
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...INFOGAIN PUBLICATION
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3 WE-IT TUTORIALS
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 IntroducationTushar Rajput
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notesgangadhar9989166446
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...caijjournal
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-mainkalachandru
 

What's hot (20)

Communication Security
Communication SecurityCommunication Security
Communication Security
 
H42063743
H42063743H42063743
H42063743
 
RSA 32-bit Implementation Technique
RSA 32-bit Implementation TechniqueRSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Unit 1 Introducation
Unit 1 IntroducationUnit 1 Introducation
Unit 1 Introducation
 
Network security & cryptography full notes
Network security & cryptography full notesNetwork security & cryptography full notes
Network security & cryptography full notes
 
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main
 

Similar to DES- Data Encryption Standard

IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESValerie Felton
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA AlgorithmIRJET Journal
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database SecurityIRJET Journal
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsJoe Osborn
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfYasmine Anino
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologiesijtsrd
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET Journal
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxukd789555
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfKailasS9
 

Similar to DES- Data Encryption Standard (20)

IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUESA REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
IRJET- Data Transmission using RSA Algorithm
IRJET-  	  Data Transmission using RSA AlgorithmIRJET-  	  Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Hybrid Encryption for Database Security
Hybrid Encryption for Database SecurityHybrid Encryption for Database Security
Hybrid Encryption for Database Security
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions AlgorithmsA Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
 
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption AlgorithmsA Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdfA Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
 
N45028390
N45028390N45028390
N45028390
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Cryptography.pptx
Cryptography.pptxCryptography.pptx
Cryptography.pptx
 
Cryptography Methodologies
Cryptography MethodologiesCryptography Methodologies
Cryptography Methodologies
 
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS TransactionIRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptxSecret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
 
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdfAn Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHC Sai Kiran
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...Chandu841456
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 

Recently uploaded (20)

young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
 
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECHIntroduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
 
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 

DES- Data Encryption Standard

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1777 DES- Data Encryption Standard Indumathi Saikumar Post Graduate Student, Electronic and Communication Engineering, CMR College of Engineering and Technology, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The data encryption standard is also known as DES.DES has been the most extensively used encryption algorithm standardinrecent times. Encryptionand decryption comprise of cryptography. Cryptography terminology is used in the data encryption standard along with standard algorithm to hide the original text. DES applies the cipher algorithm to each data block. Data encryption is being used to hide the true meaning of data so that it is very hard to attack or crack. This paper deals with the simulation and synthesis results of implemented DES algorithm. Analysis of implementation is shown in step by step process. A test case is analyzed step by step to check the results at each step of the algorithm. Key Words: DES, Cryptography, Encryption, Decryption 1. INTRODUCTION Data which can be read and understood without any special measures is called as plaintext. Disguising plaintextinsucha way to hide its true meaning is called encryption.Encrypting plaintext results in unreadable gibberish form called cipher text. Encryption is done to hide the data from anyone for whom it is not intended. Reverting the cipher text to its original plaintext is called as decryption.DESmethodisused to store sensitive informationortransmitinformationacross insecure networks so that it cannot be read by anyone except the intended recipient. Fig -1: Encryption and decryption Data encryption standard uses cryptographic algorithmthat can be used to protect electronic data. There are three methods of encryption standard they are symmetric cryptography, asymmetric cryptography and hash function. DES algorithm makes use of symmetric cryptograph. Block cipher algorithm is used for encryption and decryption purpose and the message is divided into blocks of bits. DES processes the input data (Original message)of block size64- bits and a secret key of 64-bits to provide a 64-bit cipher text. 2. CRYPTOGRAPHY Cryptography is derivedfromGreek languagekryptosmeans hidden and grafos meaning write or speak which means study of hiding information. It is the scienceofsecuringdata. Cryptography is a science of using mathematics to encrypt and decrypt data. Cryptography enables to store important data or transmit it across insecure networkssothatitcannot be read by anyone except the intended recipient. Cryptography examples include the security of the ATM cards, computer passwords and electronic commerce which all depend upon cryptography. 2.1 Purpose of cryptography Cryptography is necessary when communicating over any medium such as internet. Mostly used for communicating over un-trusted medium. To send information over an untrusted medium there are some specific requirements such as Authentication: Authentication is a process of identifyingan individual, such as based on username and password. Privacy: Privacy is ensuring the sender that the messagecan be read by the intended receiver and no one else. Integrity: Assuring the receiver that the received message has to been altered in any way from the original. Non-repudiation: It is a method of guaranteeing message transmission between two parties. Successful completion of message sent and received. 3. METHODS OF ENCRYPTION There are several blocks in an encryption method, the two main blocks are the algorithms and the key. Algorithms are the complex mathematical formulas that dictate the rules of how the plaintext will be converted into cipher text. Key is a set of random bits that will be inserted into the algorithm. Two users can communicate via encryption, they must use the same algorithm and the same key. In some encryption cases, the receiver and sender use the same key and in other encryption cases they must use differentkeysfor encryption and decryption process.Therearethreedifferentmethodsof encryption namelysymmetricasymmetricandhashfunction method for encryption and decryption.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1778 Fig -2: Two types of cryptographic algorithms Cryptography algorithms use either symmetric keys or asymmetric keys. Symmetric keys are also calledsecretkeys which uses a single key for encryption and decryption. Asymmetric keys are also called as public keys which makes use of two different keys for encryption and decryption. 3.1 Symmetric cryptography In symmetric cryptography both the parties i.e. the sender and the receiver will be using the same key for encryption and decryption process as show in Figure 2. Fig -3: Symmetric algorithms, both the sender and receiver use the same keys to encryption and decryption message A sender uses a key to encrypt plain text into cipher text and sends it to the receiver. Receiver uses the same key to decrypt the cipher text into plain text. As told above symmetric key is also called as secret key, because this type of encryption depends on each user, there can be more than one user but the users should keep the key a secret and properly protect it. If this key goes into the intruder’s hand, that intruder has the access to decrypt any intercepted message encrypted with this key. Some type of symmetric algorithms are DES, Triple DES, AES and etc. The following list outlines theadvantagesanddisadvantages of symmetric key systems: Advantages: 1. Much faster than asymmetric method 2. Hard to break the key if large key size is used 3. Compared to asymmetric systems, symmetric algorithms scream in speed. Disadvantages: 1. Key distribution. The key must be delivered in a proper way. 2. Scalability 3. Limited security 3.2 Asymmetric cryptography In asymmetric cryptography two different keys are used for encryption and decryption. In this type of cryptography a pair of key is made up of one public key which can be known to everyone and one private key which is known only to the owner. Example of asymmetric cryptography is demonstrated for better understanding. Fig -4: A represents Alice’s lock, Lockbox, key, Safe Locker, Encrypted message Alice has a password for her safe locker and keeps key safely in the locker. Lock isavailable to everyone. Lock iskeptinthe lockbox. Alice friends bob, peter, mike can send her private messages. To do that they need copies of Alice’s lock. Alice sends them copies of her lock, and they put them in their lockboxes. Her friends can now send private message with Alice’s lockand sends it to her. When Alice receivesheremail she opens the safelockerwithherpasswordtakesthekeyout and unlocks the email. In the same way Alice can send message to Bob, peter, mike. Alice encrypts a message with Bob’s lock and sends it to Bob. Bob uses his key to unlock the message.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1779 Fig -5: Symmetric algorithms, both the sender and receiver use the same keys to encryption and decryption message The following outlines the strengths and weaknesses of asymmetric key systems: Strengths, Better key distribution than symmetric systems, Better scalability than symmetric systems, Can provide confidentiality, authentication, and non-repudiation, Weaknesses, Works much slower than symmetric systems. The following are examples of asymmetric key algorithms:  RSA  Elliptic Curve Cryptosystem (ECC)  Diffie-Hellman  El Gamal  Digital Signature Standard (DSS) 4. DES The Data Encryption standard is used to protect electronic data. DES algorithm uses symmetric block cipher for encrypting and decrypting data. Encryption converts data into gibberish language called cipher text. Decrypting the cipher text gives us back the original data that is plaintext. Converting the information from cipher to plain we use a standard form of algorithm called Symmetric algorithm. Fig -6: Overall Representation ofEncryptionanddecryption DES takes an input of 64bits and the output is also of the same size. The process requires a second input, which is a secret key with length of 64bits. Block cipher algorithm is used where message is divided into blocks of bits. Block cipher is used forencryption and decryption. Theseblocksof bits are put through substitution, transposition, and other different mathematical functions. Advantages of DES  By using DES, input message of 64bits can be encrypted using the secret key length of 64bits.  The encrypted key is cipher key which is expanded into a larger key, which is later used for other operations  DES is hard to attack  DES is very hard to crack because of the number of rounds used in encrypting message.  DES is faster when compared RSA Encryption Algorithm. DES has high level of security. It is completely specified and very easy to understand. It is adaptable to different applications. Data rates are high. DES can be validated and Exportable. 4.1 DES Application  DES algorithm was made mandatoryforall financial transactions by the U.S government which involves electronic fund transfer.  High speed in ATM  It is used for secure video teleconferencing  Used in Routers and Remote Access Servers  It can be used by federal departments and agencies when they require cryptographic protection for sensitive information. 5. DATA ENCRYPTION STANDARD ALGORITHM Data Encryption Standard means to encrypt plaintext onthe basis of standard that was developed. There is some critical data used for encryption and decryption know as a key. The algorithm used to encrypt data is a standard algorithm. Using standard algorithm data canencryptedanddecrypted. Table1. Description of DES algorithm Blocks IP Initial Permutation IP-1 Inverse Permutation PC1 Permuted Choice-1 PC2 Permuted Choice-2 E Expansion Permutation P Permutation The above mentioned functions are carried out for every individual round. Based on the key provided a new key will
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1780 be generated in the key schedule block. The new key isgiven as input to each round. There are four types 1. Permutation 2. Shifting 3. Substitution Box (S-box) 4. Instantiations As per the standard, input 64 bits is taken, Initial permutation will be performed after which the 16 rounds with the input 64 bits key length is performed andfinallythe result of the last round will be given to Inverse Permutation. All the blocks perform operation separately. Fig -7: Top Level Block diagram of DES Algorithm The above Figure.7 shows top level block diagram of DES algorithm. 6. ENCRYPTION DES intakes input data of block size 64 bits and 64 bit key to provide a 64 bit cipher text. In the 64 bit key, everyeighthbit is used as parity checking bit. So, 56 bits takes part in the algorithm to encrypt data. The 64 bit data is sent to “initial permutation” which provides 64 bit output. The 64 bitkeyis being fed to “permutation choice1” (PC1). The output of PC1 is 56 bits by ignoring the bit with sequence number in multiples of 8. The two outputs of PC1 are fed to the first round in the sequence of 16 round blocks. The round block divides its input into two equal parts, the data bits have parts Li of 32 bits and Ri of 32 bits. Fig -8: DES Algorithm blocks Fig -9: DES Algorithm with 16 Rounds
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1781 Similarly, key bits are divided in two parts Ci and Di each of 28 bits of length. The 56 bits are used to generate the 48 bit round key through the “permutation chooice2”. The 32 bit round key Ri is expanded to 48 bit round key through ‘expansion permutation’. The output from PC2 block is XOR- Ed with expansion permutation block to get the 48 bit address for the substitution box (S-box). The 48 bits is given as sequence to S-box into 8 sections, each of 6 bits.TheS-box replaces every 6 bit of data to 4 bit data. The 32 bits from S- box is sent to the ‘permutation function’ to provide more diffusion of bits. “Permutation function” bits are XOR-Ed with the 32-bit Li. This output of XOR is connected to the Ri of the next round. Li of the next round is connected to Ri of this round. The output from Li of 32 bits and Ri 32 bits is feed to the ‘Inverse Permutation’. Output of 64 bits is obtained from IP-1. C0 and D0 are connected to Ci and Di of the next round. Out of 16 rounds of operation, 12 rounds have 2 left circular shifts and the rest 4 have only 1. The 64 data bits from the round 16 are operated with 32 bit swap and then fed to the IP-1. In the Final stage of the encryption it provides another transposition before getting the final 64 bit sequence called Cipher text. All the rounds of operation are clearly represented in the figure.8 and figure.9 and also the Algorithm is clearly explained. All the operations such as initial permutation, inverse permutation, substitution box, expansion permutation, key schedule for the key generation are carried with respect to the pre-defined standard tables. 7. ANALSIS OF THE IMPLMENTATION The DES algorithm can be implemented using the Verilog HDL code. A test case is analyzed step by step to check the results at each step of the algorithm. Input data=0123456789ABCDEFH Encryption key=133457799BBCDFF1H 0123456789ABCDEFH Initial Permutation CC00CCFFF0AAF0AAH 133457799BBCDFF1H Permutation Choice1 F0CCAAF556678FH Round 1 Inputs, Operation and Outputs Inputs: Li=CC00CCFFH Ri=F0AAF0AAH Ci=F0CCAAFH & Di=556678FH F0CCAAFH Left Circular Shift (for C) E19955FH 556678FH Left Circular Shift (for D) AACCF1EH 556678FAACCF1EH Permutation Choice2 1B02EFFC7072H F0AAF0AAH Expansion Permutation 7A15557A1555H 7A15557A1555H 6117BA866527H 1B02EFFC7072H 6117BA866527H Substitution Box 5C82B597H 5C82B597H Permutation Function 234AA9BBH 234AA9BB H EF4A6544H CC00CCFFH Outputs: Lo=F0AAF0AAH Ro=EF4A6544H Co=E19955FH & Do=AACCF1EH The outputs of round 1 is given as inputs to the round2to its respective ports. After 16 rounds of operation the final outputs are Lo= 43423234H, Ro= 0A4CD995H, Co=F0CCAAFH and Do=556678FH The values of C and D return to the initial values after completion of 16 rounds. The last stage is the inverse permutation to get the final result. 0A4CD99543423234H IP-1 85E813540F0AB405H XOR1 XOR1
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1782 Finally, we receive the cipher text. Cipher text= 85E813540F0AB405H Therefore when 64 bit input data and 64 bit key data is given 16 rounds of operations are performed with the standard algorithm we get a 64 bit output that is a cipher text. This is called encryption. In the same way with the same key the data can be decrypted. The coding for DES algorithm in Verilog HDL and implementation of the logic on FPGA can provide the knowledge about the operations taking place in DES to encrypt data. 3. CONCLUSION The concept of cryptography long with encryption and decryption is explained. DES has 16roundsofoperation.The plaintext is taken to 16 rounds of operation which produces a cipher text. With the same key and data any implementation it produces same output as the algorithm specified in this standard. Data Encryption Standard has increased the level of security because of the 16 rounds of operation. It is difficult for the unauthorized party to attack and crack. s REFERENCES [1] Applied Cryptography: Protocols, Algorithms, and Source Code in C, by Bruce Schneier. [2] Understanding Cryptography: A Textbook for students and Practitioners by christof Paar, Jan Pelzl , Bart Preneel [3] Public-Key Cryptography Arto Salomaa, second edition, Springer, 1996. ISBN 3-540-61356-0. [4] http://faculty.nps.edu/dedennin/publications/DES- 15Years.pdf [5] http://csrc.nist.gov/groups/ST/toolkit/block_ciphers.ht ml [6] http://faculty.nps.edu/dedennin/publications/DES- 15Years.pdf [7] https://en.wikibooks.org/wiki/Cryptography/DES [8] http://csrc.nist.gov/publications/PubsSPs.html#800- 131A