Submit Search
Upload
DES- Data Encryption Standard
•
1 like
•
65 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I3489.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 6
Download now
Download to read offline
Recommended
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
Mj3422172221
Mj3422172221
IJERA Editor
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
Recommended
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
IRJET Journal
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
IJERA Editor
Mj3422172221
Mj3422172221
IJERA Editor
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
International Journal of Science and Research (IJSR)
Communication Security
Communication Security
Axis Communications
H42063743
H42063743
IJERA Editor
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
IRJET Journal
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Public key cryptography
Public key cryptography
Lilies DLiestyowati
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
Neelabja Manna
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
INFOGAIN PUBLICATION
Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
Unit 1 Introducation
Unit 1 Introducation
Tushar Rajput
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
caijjournal
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main
kalachandru
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
More Related Content
What's hot
Communication Security
Communication Security
Axis Communications
H42063743
H42063743
IJERA Editor
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Universitas Pembangunan Panca Budi
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
eSAT Publishing House
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
ijtsrd
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
IRJET Journal
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Public key cryptography
Public key cryptography
Lilies DLiestyowati
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
Neelabja Manna
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
researchpaperfinal1
researchpaperfinal1
Sumit Bajaj
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
INFOGAIN PUBLICATION
Network security unit 1,2,3
Network security unit 1,2,3
WE-IT TUTORIALS
Unit 1 Introducation
Unit 1 Introducation
Tushar Rajput
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
caijjournal
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Jayanth Dwijesh H P
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
Editor IJCATR
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main
kalachandru
What's hot
(20)
Communication Security
Communication Security
H42063743
H42063743
RSA 32-bit Implementation Technique
RSA 32-bit Implementation Technique
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
Securing Messages from Brute Force Attack by Combined Approach of Honey Encry...
State of the art realistic cryptographic
State of the art realistic cryptographic
Public key cryptography
Public key cryptography
MAJOR PROJECT FORMAT--2013(new 1)
MAJOR PROJECT FORMAT--2013(new 1)
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
researchpaperfinal1
researchpaperfinal1
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
5 ijaems jan-2016-16-survey on encryption techniques in delay and disruption ...
Network security unit 1,2,3
Network security unit 1,2,3
Unit 1 Introducation
Unit 1 Introducation
Network security & cryptography full notes
Network security & cryptography full notes
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
SECURED TEXT MESSAGE TRANSMISSION IN A WIRELESS COMMUNICATION SYSTEM WITH THE...
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
1 s2.0-s1877050915013460-main
1 s2.0-s1877050915013460-main
Similar to DES- Data Encryption Standard
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
Valerie Felton
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET Journal
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
IRJET Journal
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
IRJET Journal
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
ijsrd.com
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
Yasmine Anino
N45028390
N45028390
IJERA Editor
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
eSAT Publishing House
Cryptography.pptx
Cryptography.pptx
AnmolBansal66
Cryptography Methodologies
Cryptography Methodologies
ijtsrd
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET Journal
Ijtra150171
Ijtra150171
International Journal of Technical Research & Application
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
ukd789555
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
KailasS9
Similar to DES- Data Encryption Standard
(20)
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
A REVIEW STUDY OF CRYPTOGRAPHY TECHNIQUES
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET- Data Transmission using RSA Algorithm
IRJET- Data Transmission using RSA Algorithm
IRJET- Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
A Review on Various Most Common Symmetric Encryptions Algorithms
A Review on Various Most Common Symmetric Encryptions Algorithms
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
A Survey on Cryptographic Techniques for Network Security.pdf
A Survey on Cryptographic Techniques for Network Security.pdf
N45028390
N45028390
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
Cryptography.pptx
Cryptography.pptx
Cryptography Methodologies
Cryptography Methodologies
IRJET-Triple Layered Security on Android Based SMS Transaction
IRJET-Triple Layered Security on Android Based SMS Transaction
Ijtra150171
Ijtra150171
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
Secret-Key-Cryptography-ppt-by-alljobs.co_.in_.pptx
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
An Understanding And Perspectives of END TO END ENCRYPTION (4).pdf
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Mark Billinghurst
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
abhishek36461
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
959SahilShah
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Satyam Kumar
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
ROCENODodongVILLACER
pipeline in computer architecture design
pipeline in computer architecture design
ssuser87fa0c1
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
C Sai Kiran
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Chandu841456
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Dr.Costas Sachpazis
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
PoojaBan
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
wendy cai
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
roselinkalist12
Recently uploaded
(20)
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Past, Present and Future of Generative AI
Past, Present and Future of Generative AI
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting .
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
pipeline in computer architecture design
pipeline in computer architecture design
Introduction to Machine Learning Unit-3 for II MECH
Introduction to Machine Learning Unit-3 for II MECH
An experimental study in using natural admixture as an alternative for chemic...
An experimental study in using natural admixture as an alternative for chemic...
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
DES- Data Encryption Standard
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1777 DES- Data Encryption Standard Indumathi Saikumar Post Graduate Student, Electronic and Communication Engineering, CMR College of Engineering and Technology, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - The data encryption standard is also known as DES.DES has been the most extensively used encryption algorithm standardinrecent times. Encryptionand decryption comprise of cryptography. Cryptography terminology is used in the data encryption standard along with standard algorithm to hide the original text. DES applies the cipher algorithm to each data block. Data encryption is being used to hide the true meaning of data so that it is very hard to attack or crack. This paper deals with the simulation and synthesis results of implemented DES algorithm. Analysis of implementation is shown in step by step process. A test case is analyzed step by step to check the results at each step of the algorithm. Key Words: DES, Cryptography, Encryption, Decryption 1. INTRODUCTION Data which can be read and understood without any special measures is called as plaintext. Disguising plaintextinsucha way to hide its true meaning is called encryption.Encrypting plaintext results in unreadable gibberish form called cipher text. Encryption is done to hide the data from anyone for whom it is not intended. Reverting the cipher text to its original plaintext is called as decryption.DESmethodisused to store sensitive informationortransmitinformationacross insecure networks so that it cannot be read by anyone except the intended recipient. Fig -1: Encryption and decryption Data encryption standard uses cryptographic algorithmthat can be used to protect electronic data. There are three methods of encryption standard they are symmetric cryptography, asymmetric cryptography and hash function. DES algorithm makes use of symmetric cryptograph. Block cipher algorithm is used for encryption and decryption purpose and the message is divided into blocks of bits. DES processes the input data (Original message)of block size64- bits and a secret key of 64-bits to provide a 64-bit cipher text. 2. CRYPTOGRAPHY Cryptography is derivedfromGreek languagekryptosmeans hidden and grafos meaning write or speak which means study of hiding information. It is the scienceofsecuringdata. Cryptography is a science of using mathematics to encrypt and decrypt data. Cryptography enables to store important data or transmit it across insecure networkssothatitcannot be read by anyone except the intended recipient. Cryptography examples include the security of the ATM cards, computer passwords and electronic commerce which all depend upon cryptography. 2.1 Purpose of cryptography Cryptography is necessary when communicating over any medium such as internet. Mostly used for communicating over un-trusted medium. To send information over an untrusted medium there are some specific requirements such as Authentication: Authentication is a process of identifyingan individual, such as based on username and password. Privacy: Privacy is ensuring the sender that the messagecan be read by the intended receiver and no one else. Integrity: Assuring the receiver that the received message has to been altered in any way from the original. Non-repudiation: It is a method of guaranteeing message transmission between two parties. Successful completion of message sent and received. 3. METHODS OF ENCRYPTION There are several blocks in an encryption method, the two main blocks are the algorithms and the key. Algorithms are the complex mathematical formulas that dictate the rules of how the plaintext will be converted into cipher text. Key is a set of random bits that will be inserted into the algorithm. Two users can communicate via encryption, they must use the same algorithm and the same key. In some encryption cases, the receiver and sender use the same key and in other encryption cases they must use differentkeysfor encryption and decryption process.Therearethreedifferentmethodsof encryption namelysymmetricasymmetricandhashfunction method for encryption and decryption.
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1778 Fig -2: Two types of cryptographic algorithms Cryptography algorithms use either symmetric keys or asymmetric keys. Symmetric keys are also calledsecretkeys which uses a single key for encryption and decryption. Asymmetric keys are also called as public keys which makes use of two different keys for encryption and decryption. 3.1 Symmetric cryptography In symmetric cryptography both the parties i.e. the sender and the receiver will be using the same key for encryption and decryption process as show in Figure 2. Fig -3: Symmetric algorithms, both the sender and receiver use the same keys to encryption and decryption message A sender uses a key to encrypt plain text into cipher text and sends it to the receiver. Receiver uses the same key to decrypt the cipher text into plain text. As told above symmetric key is also called as secret key, because this type of encryption depends on each user, there can be more than one user but the users should keep the key a secret and properly protect it. If this key goes into the intruder’s hand, that intruder has the access to decrypt any intercepted message encrypted with this key. Some type of symmetric algorithms are DES, Triple DES, AES and etc. The following list outlines theadvantagesanddisadvantages of symmetric key systems: Advantages: 1. Much faster than asymmetric method 2. Hard to break the key if large key size is used 3. Compared to asymmetric systems, symmetric algorithms scream in speed. Disadvantages: 1. Key distribution. The key must be delivered in a proper way. 2. Scalability 3. Limited security 3.2 Asymmetric cryptography In asymmetric cryptography two different keys are used for encryption and decryption. In this type of cryptography a pair of key is made up of one public key which can be known to everyone and one private key which is known only to the owner. Example of asymmetric cryptography is demonstrated for better understanding. Fig -4: A represents Alice’s lock, Lockbox, key, Safe Locker, Encrypted message Alice has a password for her safe locker and keeps key safely in the locker. Lock isavailable to everyone. Lock iskeptinthe lockbox. Alice friends bob, peter, mike can send her private messages. To do that they need copies of Alice’s lock. Alice sends them copies of her lock, and they put them in their lockboxes. Her friends can now send private message with Alice’s lockand sends it to her. When Alice receivesheremail she opens the safelockerwithherpasswordtakesthekeyout and unlocks the email. In the same way Alice can send message to Bob, peter, mike. Alice encrypts a message with Bob’s lock and sends it to Bob. Bob uses his key to unlock the message.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1779 Fig -5: Symmetric algorithms, both the sender and receiver use the same keys to encryption and decryption message The following outlines the strengths and weaknesses of asymmetric key systems: Strengths, Better key distribution than symmetric systems, Better scalability than symmetric systems, Can provide confidentiality, authentication, and non-repudiation, Weaknesses, Works much slower than symmetric systems. The following are examples of asymmetric key algorithms: RSA Elliptic Curve Cryptosystem (ECC) Diffie-Hellman El Gamal Digital Signature Standard (DSS) 4. DES The Data Encryption standard is used to protect electronic data. DES algorithm uses symmetric block cipher for encrypting and decrypting data. Encryption converts data into gibberish language called cipher text. Decrypting the cipher text gives us back the original data that is plaintext. Converting the information from cipher to plain we use a standard form of algorithm called Symmetric algorithm. Fig -6: Overall Representation ofEncryptionanddecryption DES takes an input of 64bits and the output is also of the same size. The process requires a second input, which is a secret key with length of 64bits. Block cipher algorithm is used where message is divided into blocks of bits. Block cipher is used forencryption and decryption. Theseblocksof bits are put through substitution, transposition, and other different mathematical functions. Advantages of DES By using DES, input message of 64bits can be encrypted using the secret key length of 64bits. The encrypted key is cipher key which is expanded into a larger key, which is later used for other operations DES is hard to attack DES is very hard to crack because of the number of rounds used in encrypting message. DES is faster when compared RSA Encryption Algorithm. DES has high level of security. It is completely specified and very easy to understand. It is adaptable to different applications. Data rates are high. DES can be validated and Exportable. 4.1 DES Application DES algorithm was made mandatoryforall financial transactions by the U.S government which involves electronic fund transfer. High speed in ATM It is used for secure video teleconferencing Used in Routers and Remote Access Servers It can be used by federal departments and agencies when they require cryptographic protection for sensitive information. 5. DATA ENCRYPTION STANDARD ALGORITHM Data Encryption Standard means to encrypt plaintext onthe basis of standard that was developed. There is some critical data used for encryption and decryption know as a key. The algorithm used to encrypt data is a standard algorithm. Using standard algorithm data canencryptedanddecrypted. Table1. Description of DES algorithm Blocks IP Initial Permutation IP-1 Inverse Permutation PC1 Permuted Choice-1 PC2 Permuted Choice-2 E Expansion Permutation P Permutation The above mentioned functions are carried out for every individual round. Based on the key provided a new key will
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1780 be generated in the key schedule block. The new key isgiven as input to each round. There are four types 1. Permutation 2. Shifting 3. Substitution Box (S-box) 4. Instantiations As per the standard, input 64 bits is taken, Initial permutation will be performed after which the 16 rounds with the input 64 bits key length is performed andfinallythe result of the last round will be given to Inverse Permutation. All the blocks perform operation separately. Fig -7: Top Level Block diagram of DES Algorithm The above Figure.7 shows top level block diagram of DES algorithm. 6. ENCRYPTION DES intakes input data of block size 64 bits and 64 bit key to provide a 64 bit cipher text. In the 64 bit key, everyeighthbit is used as parity checking bit. So, 56 bits takes part in the algorithm to encrypt data. The 64 bit data is sent to “initial permutation” which provides 64 bit output. The 64 bitkeyis being fed to “permutation choice1” (PC1). The output of PC1 is 56 bits by ignoring the bit with sequence number in multiples of 8. The two outputs of PC1 are fed to the first round in the sequence of 16 round blocks. The round block divides its input into two equal parts, the data bits have parts Li of 32 bits and Ri of 32 bits. Fig -8: DES Algorithm blocks Fig -9: DES Algorithm with 16 Rounds
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1781 Similarly, key bits are divided in two parts Ci and Di each of 28 bits of length. The 56 bits are used to generate the 48 bit round key through the “permutation chooice2”. The 32 bit round key Ri is expanded to 48 bit round key through ‘expansion permutation’. The output from PC2 block is XOR- Ed with expansion permutation block to get the 48 bit address for the substitution box (S-box). The 48 bits is given as sequence to S-box into 8 sections, each of 6 bits.TheS-box replaces every 6 bit of data to 4 bit data. The 32 bits from S- box is sent to the ‘permutation function’ to provide more diffusion of bits. “Permutation function” bits are XOR-Ed with the 32-bit Li. This output of XOR is connected to the Ri of the next round. Li of the next round is connected to Ri of this round. The output from Li of 32 bits and Ri 32 bits is feed to the ‘Inverse Permutation’. Output of 64 bits is obtained from IP-1. C0 and D0 are connected to Ci and Di of the next round. Out of 16 rounds of operation, 12 rounds have 2 left circular shifts and the rest 4 have only 1. The 64 data bits from the round 16 are operated with 32 bit swap and then fed to the IP-1. In the Final stage of the encryption it provides another transposition before getting the final 64 bit sequence called Cipher text. All the rounds of operation are clearly represented in the figure.8 and figure.9 and also the Algorithm is clearly explained. All the operations such as initial permutation, inverse permutation, substitution box, expansion permutation, key schedule for the key generation are carried with respect to the pre-defined standard tables. 7. ANALSIS OF THE IMPLMENTATION The DES algorithm can be implemented using the Verilog HDL code. A test case is analyzed step by step to check the results at each step of the algorithm. Input data=0123456789ABCDEFH Encryption key=133457799BBCDFF1H 0123456789ABCDEFH Initial Permutation CC00CCFFF0AAF0AAH 133457799BBCDFF1H Permutation Choice1 F0CCAAF556678FH Round 1 Inputs, Operation and Outputs Inputs: Li=CC00CCFFH Ri=F0AAF0AAH Ci=F0CCAAFH & Di=556678FH F0CCAAFH Left Circular Shift (for C) E19955FH 556678FH Left Circular Shift (for D) AACCF1EH 556678FAACCF1EH Permutation Choice2 1B02EFFC7072H F0AAF0AAH Expansion Permutation 7A15557A1555H 7A15557A1555H 6117BA866527H 1B02EFFC7072H 6117BA866527H Substitution Box 5C82B597H 5C82B597H Permutation Function 234AA9BBH 234AA9BB H EF4A6544H CC00CCFFH Outputs: Lo=F0AAF0AAH Ro=EF4A6544H Co=E19955FH & Do=AACCF1EH The outputs of round 1 is given as inputs to the round2to its respective ports. After 16 rounds of operation the final outputs are Lo= 43423234H, Ro= 0A4CD995H, Co=F0CCAAFH and Do=556678FH The values of C and D return to the initial values after completion of 16 rounds. The last stage is the inverse permutation to get the final result. 0A4CD99543423234H IP-1 85E813540F0AB405H XOR1 XOR1
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1782 Finally, we receive the cipher text. Cipher text= 85E813540F0AB405H Therefore when 64 bit input data and 64 bit key data is given 16 rounds of operations are performed with the standard algorithm we get a 64 bit output that is a cipher text. This is called encryption. In the same way with the same key the data can be decrypted. The coding for DES algorithm in Verilog HDL and implementation of the logic on FPGA can provide the knowledge about the operations taking place in DES to encrypt data. 3. CONCLUSION The concept of cryptography long with encryption and decryption is explained. DES has 16roundsofoperation.The plaintext is taken to 16 rounds of operation which produces a cipher text. With the same key and data any implementation it produces same output as the algorithm specified in this standard. Data Encryption Standard has increased the level of security because of the 16 rounds of operation. It is difficult for the unauthorized party to attack and crack. s REFERENCES [1] Applied Cryptography: Protocols, Algorithms, and Source Code in C, by Bruce Schneier. [2] Understanding Cryptography: A Textbook for students and Practitioners by christof Paar, Jan Pelzl , Bart Preneel [3] Public-Key Cryptography Arto Salomaa, second edition, Springer, 1996. ISBN 3-540-61356-0. [4] http://faculty.nps.edu/dedennin/publications/DES- 15Years.pdf [5] http://csrc.nist.gov/groups/ST/toolkit/block_ciphers.ht ml [6] http://faculty.nps.edu/dedennin/publications/DES- 15Years.pdf [7] https://en.wikibooks.org/wiki/Cryptography/DES [8] http://csrc.nist.gov/publications/PubsSPs.html#800- 131A
Download now