Information security is becoming much more important in data storage and transmission with the fast progression of digital data exchange in electronic way. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The cryptography is most important aspect of communications security and becoming an important building block for computer security. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. To protect sent messages that some of the most commonly used cryptography methods with private key based algorithm are LOKI 89, 91, 97 , DES, triple DES, AES, Blowfish, etc. These algorithms also include several computational issues as well as the analysis of DES algorithm. The main features that specify and differentiate one algorithm from another are the ability to the speed of encryption and decryption of the input plain text. This paper analyzes the private key based algorithm DES and LOKI91 by computing index of coincidence IC and time efficiency. Thida Soe | Soe Soe Mon | Khin Aye Thu "Performance Analysis of Data Encryption Standard (DES)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26650.pdfPaper URL: https://www.ijtsrd.com/computer-science/computer-security/26650/performance-analysis-of-data-encryption-standard-des/thida-soe
Enhancement of DES Algorithm with Multi State LogicIJORCS
The principal goal to design any encryption algorithm must be the security against unauthorized access or attacks. Data Encryption Standard algorithm is a symmetric key algorithm and it is used to secure the data. Enhanced DES algorithm works on increasing the key length or complex S-BOX design or increased the number of states in which the information is to be represented or combination of above criteria. By increasing the key length, the number of combinations for key will increase which is hard for the intruder to do the brute force attack. As the S-BOX design will become the complex there will be a good avalanche effect. As the number of states increases in which the information is represented, it is hard for the intruder to crack the actual information. Proposed algorithm replace the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation called “Hash function” depends on using two keys. One key used in “F” function and another key consists of a combination of 16 states (0,1,2…13,14,15) instead of the ordinary 2 state key (0, 1). This replacement adds a new level of protection strength and more robustness against breaking methods.
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 2 1173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
Abstract
There is great research going on in the field of data security nowadays. Protecting information from disclosure and breach is of high importance to users personally and to organizations and businesses around the world, as most of information currently are sensitive electronic information transferred over the internet and stored in cloud based system. In this paper, we propose a method to increase the security of messages transferred on the internet, or information stored in the cloud. Our proposed method mainly relies on the Triple Data Encryption Standard (TDES) algorithm. TDES is intact the Data Encryption Standard repeated three times in succession to encrypt data. TDES is considered highly secure as there is no applicable method to break the code itself without knowing the key. We propose to encrypt the key using Cipher Feedback Block algorithm, before using TDES to encrypt data. Such that even when the key is disclosed, the key itself cannot decipher the ciphered text without enciphering the key with CFB. This introduces a new dimension of security to the TDES algorithm.
The method introduced in this paper increases the security of the TDES algorithm using CFB algorithm by increasing the key security, such that it is actually not possible to decipher the text without prior knowledge and agreement of key and algorithms used.
Keywords: Data Encryption Standard, Triple Data Encryption Algorithm, Cipher Feedback Block.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
The document presents information on encryption standards including Data Encryption Standard (DES), Triple DES (TDES), Advanced Encryption Standard (AES), and RSA. It discusses the encryption process, key features of standards such as block size and key size, and provides details on the algorithms and implementations of DES, TDES, and AES. Implementation results for DES and TDES are also presented, along with proposals for modified versions of TDES and DES with the goal of reducing area and power consumption.
Enhancement of DES Algorithm with Multi State LogicIJORCS
The principal goal to design any encryption algorithm must be the security against unauthorized access or attacks. Data Encryption Standard algorithm is a symmetric key algorithm and it is used to secure the data. Enhanced DES algorithm works on increasing the key length or complex S-BOX design or increased the number of states in which the information is to be represented or combination of above criteria. By increasing the key length, the number of combinations for key will increase which is hard for the intruder to do the brute force attack. As the S-BOX design will become the complex there will be a good avalanche effect. As the number of states increases in which the information is represented, it is hard for the intruder to crack the actual information. Proposed algorithm replace the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation called “Hash function” depends on using two keys. One key used in “F” function and another key consists of a combination of 16 states (0,1,2…13,14,15) instead of the ordinary 2 state key (0, 1). This replacement adds a new level of protection strength and more robustness against breaking methods.
New modification on feistel DES algorithm based on multi-level keys IJECEIAES
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryption algorithm and by replacing the predefined XOR operation with a new # operation. Our proposed algorithm uses three keys instead of one. The first key is the input key used for encrypting and decrypting operations. The second key is used for determining the number of bits, while the third key is used for determining the table numbers, which are from 0 to 255. Having evaluated the complexity of our proposed algorithm, the results show that it is the most complex compared with the well-known DES and other modified algorithms. Consequently, in our proposed algorithm, the attacker try a number of attempts 2 1173 at minimum to decrypt the message. This means that the proposed DES algorithm will increase the security level of the well-known DES.
Abstract
There is great research going on in the field of data security nowadays. Protecting information from disclosure and breach is of high importance to users personally and to organizations and businesses around the world, as most of information currently are sensitive electronic information transferred over the internet and stored in cloud based system. In this paper, we propose a method to increase the security of messages transferred on the internet, or information stored in the cloud. Our proposed method mainly relies on the Triple Data Encryption Standard (TDES) algorithm. TDES is intact the Data Encryption Standard repeated three times in succession to encrypt data. TDES is considered highly secure as there is no applicable method to break the code itself without knowing the key. We propose to encrypt the key using Cipher Feedback Block algorithm, before using TDES to encrypt data. Such that even when the key is disclosed, the key itself cannot decipher the ciphered text without enciphering the key with CFB. This introduces a new dimension of security to the TDES algorithm.
The method introduced in this paper increases the security of the TDES algorithm using CFB algorithm by increasing the key security, such that it is actually not possible to decipher the text without prior knowledge and agreement of key and algorithms used.
Keywords: Data Encryption Standard, Triple Data Encryption Algorithm, Cipher Feedback Block.
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
In modern world, security is the most valuable term in the field of communication system. Security comes
along with many technologies and methods, where one of the most secure technologies is Cryptography
where ordinary plain text is converted into cipher text for transferring data to the valid user. Cryptography
algorithms can be divided into two types based on the number of keys such as Symmetric and Asymmetric
where Symmetric algorithm works with one single key and Asymmetric algorithm works with two different
keys. However, selecting the appropriate algorithms for specific application has been always a challenging
task because of the latency, key size, and security issues. Cryptographic algorithms face different type of
attacks like brute force attack, man in the middle attack, cycle attacks etc., which are still remained as
threads. This paper presents the performance analysis, based on different performance metrics and threads,
of various techniques of cryptographic algorithms and identifies the suitable algorithms for different types
of applications.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJERA (International journal of Engineering Research and Applications) is International online, ... peer reviewed journal. For more detail or submit your article, please visit www.ijera.com
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
Today is the era of Internet and networks applications. So,Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. The role of Cryptography is most important in the field of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures
communication. In this study is made for the cryptography algorithms, particularly algorithms- AES, DES, RSA, Blowfishare compared and performance is evaluated. Also some enhanced algorithms are described and compared with the enhanced algorithms.
Keywords - AES, DES, BLOWFISH, Decryption, Encryption, Security
The document presents information on encryption standards including Data Encryption Standard (DES), Triple DES (TDES), Advanced Encryption Standard (AES), and RSA. It discusses the encryption process, key features of standards such as block size and key size, and provides details on the algorithms and implementations of DES, TDES, and AES. Implementation results for DES and TDES are also presented, along with proposals for modified versions of TDES and DES with the goal of reducing area and power consumption.
The document discusses the MD5 algorithm, which takes an input message of arbitrary length and produces a 128-bit fingerprint or message digest. It describes the technical process, including padding the message, appending the length, initializing buffers, processing the message in 16-word blocks using four auxiliary functions, and outputting the final message digest consisting of the values A, B, C, and D. The MD5 algorithm provides a secure way to compress a large file before encryption.
This presentation has information about what do you mean by an algorithm, what is hashing and various hashing algorithms and their applications. Approximate counting Algorithm and their applications, Counting Distinct Elements Algorithm and their applications and Frequency estimation algorithm and their applications . Also, the research papers we referenced.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics
and in particular genetic algorithms. The classic fitness function when using such an algorithm
is to compare n-gram statistics of a the decrypted message with those of the target message. We show that
using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation
between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no
hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm
perform worse than a random search on the cryptanalysis of the simplified data encryption standard
algorithm.
This document contains definitions and explanations of various cryptographic concepts and techniques:
- It defines traffic analysis attacks, rail fence transposition, block ciphers vs stream ciphers, cryptanalysis vs brute force attacks, unconditionally secure vs computationally secure ciphers, the Caesar cipher, monoalphabetic ciphers, Playfair ciphers, one-time pads, transposition ciphers, steganography, and Feistel ciphers.
- It also explains concepts like diffusion vs confusion, the purpose of S-boxes in DES, the avalanche effect, monoalphabetic vs polyalphabetic ciphers, and criteria for evaluating AES candidates.
The document provides an overview of the Advanced Encryption Standard (AES) algorithm. It defines key terms like block, state, and XOR used in AES. It then describes the AES algorithm which works by repeating rounds that include byte substitution, shifting rows, mixing columns, and adding a round key. The number of rounds depends on the key size, being 10 for a 16-byte key and 14 for a 32-byte key. Encryption and decryption are similar processes performed in reverse order.
Secure Hash Algorithm (SHA) was developed by NIST and NSA to hash messages into fixed-length message digests. SHA has multiple versions including SHA-1, SHA-2, and SHA-3. SHA-1 produces a 160-bit message digest and works by padding the input message, appending the length, dividing into blocks, initializing variables, and processing blocks through 80 rounds of operations to output the digest. SHA-512 is closely modeled after SHA-1 but produces a 512-bit digest and uses 1024-bit blocks.
Minor Project- AES Implementation in VerilogHardik Manocha
This presentation described about the Minor project I worked on for partial fulfillment of Bachelors Degree in G B Pant Engineering College. Presentation consisted of Advanced Encryption Standard (AES) and its implementation in Verilog. Different steps of the algorithm are presented.
The document discusses the Advanced Encryption Standard (AES) algorithm, which is used for encryption and involves several processes applied to a rectangular array called the state. AES uses a variable number of rounds depending on the key size, with each round consisting of sub bytes, shift rows, mix columns, and add round key transformations except for the last round which excludes mix columns. The Rijndael cipher which was selected as the AES algorithm operates on a 4x4 byte state and supports key sizes of 128, 192, and 256 bits.
MD5 is a hashing algorithm that takes an input of arbitrary length and produces a 128-bit hash value. It works by processing the input message in 512-bit blocks, padding the last block as needed, and performing transformations using auxiliary functions to update the hash value after each block. The implementation in C uses a state buffer to store the running hash value, along with functions for initialization, updating the hash with new data blocks, finalization including padding, and transforming blocks.
This document summarizes the MD5 algorithm and proposes methods to strengthen it against cracking. It analyzes the MD5 algorithm and common cracking approaches. It then proposes several measures to improve MD5 security, including increasing password complexity, using secondary encoding, and increasing the length of the MD5 hash value through concatenation to reduce collision probability. It includes a demonstration program that implements one proposed method of increasing hash length through multiple encodings and concatenation.
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If we can generate this S-Box dynamically, we increase the cryptographic strength of AES cipher system. In this paper we intend to introduce new algorithm that generate S-Box dynamically from cipher key. We describe how S-Box can be generated dynamically from cipher key and finally analyze the results and experiments.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the need for a new secure hash standard. It describes how hash functions work by condensing arbitrary messages into fixed-size message digests. The properties of preimage resistance, second preimage resistance, and collision resistance are explained. Common hashing algorithms like MD5, SHA-1, and SHA-2 are outlined along with vulnerabilities like birthday attacks. The document concludes by noting the need to replace standards like MD5 and SHA-1 due to successful cryptanalysis attacks.
Hash functions take a variable-length input and produce a fixed-length output. They are used to verify data integrity and ensure data has not been altered. Cryptographic hash functions have properties of being one-way and collision resistant. Secure Hash Algorithm 512 (SHA-512) is an iterative cryptographic hash function that produces a 512-bit hash value. It works by processing the input message in 1024-bit blocks through 80 rounds of compression functions using logical operations and round constants. SHA-512 and other cryptographic hash functions have applications in security protocols like TLS, PGP, and DNSSEC.
Block ciphers like DES encrypt data in blocks and use a symmetric key known to both the sender and receiver. The AES block cipher is commonly used today. It operates on 128-bit blocks and supports key sizes of 128, 192, or 256 bits. The AES algorithm consists of repeated rounds of substitutions, shifts, and XOR operations with a expanded key schedule. It was designed to improve upon DES by having stronger cryptography and being more computationally efficient.
This document discusses lightweight cryptography techniques for RFID systems with limited resources. It compares the Data Encryption Standard (DES) algorithm and a simplified version called Lightweight DES (DESL). DESL reduces gate complexity by eliminating initial/final permutations and using a single S-box, providing around a 20% reduction in gates compared to DES while maintaining throughput. The document also briefly introduces the Advanced Encryption Standard (AES) algorithm.
Data Encryption standard in cryptographyNithyasriA2
The document discusses the Data Encryption Standard (DES) algorithm. It provides an overview of DES, including its history, encryption process, key generation process, and decryption process. It describes how DES uses a Feistel cipher structure with a 64-bit block size and 56-bit key. It also discusses various attacks that have been performed on DES, such as differential cryptanalysis and linear cryptanalysis, and how DES has been shown to be insecure due to increases in computational power allowing brute force attacks. Improved versions of DES using multiple encryptions, such as triple DES, are also summarized to increase the key size and security.
This document provides an overview of block ciphers and the Data Encryption Standard (DES) algorithm. It begins with definitions of stream ciphers and block ciphers. It then discusses the principles of confusion and diffusion in encryption algorithms. The document introduces the Feistel cipher structure and how it was developed based on Claude Shannon's work. It provides details on the DES algorithm, including its history, design, encryption process using rounds and subkeys, decryption process, and the avalanche effect property.
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...IJECEIAES
Encryption algorithms play a dominant role in preventing unauthorized access to important data. This paper focus on the implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms on Microblaze soft core Processor and also their implementations on XC6VLX240t FPGA using Verilog Hardware Description language. This paper also gives a comparison of the issues related to the hardware and software implementations of the two cryptographic algorithms.
The document discusses Feistel block ciphers and their structure. A Feistel cipher uses multiple rounds of processing on a plaintext block, with each round consisting of a substitution step followed by a permutation step. The block is divided into two halves, and in each round the left half is combined with the right half and key using a round function, while the right half remains unchanged. The halves are then swapped. Feistel ciphers like DES use different subkeys derived from the main key in each round. The decryption process follows the same structure but with subkeys used in reverse order.
The document discusses the MD5 algorithm, which takes an input message of arbitrary length and produces a 128-bit fingerprint or message digest. It describes the technical process, including padding the message, appending the length, initializing buffers, processing the message in 16-word blocks using four auxiliary functions, and outputting the final message digest consisting of the values A, B, C, and D. The MD5 algorithm provides a secure way to compress a large file before encryption.
This presentation has information about what do you mean by an algorithm, what is hashing and various hashing algorithms and their applications. Approximate counting Algorithm and their applications, Counting Distinct Elements Algorithm and their applications and Frequency estimation algorithm and their applications . Also, the research papers we referenced.
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
In a world of accelerating communications, cryptography has become an essential component of the modern
means of communication systems. The emergence of the webas a reliable medium for commerce and
communication has made cryptography an essential component. Many algorithms or ciphers are in use
nowadays. The quality of the cipher is judged byits ability to prevent an unrelated party fromknowingthe
original content of the encrypted message. The proposed “Multilevel Encryption Model” is a cryptosystem that
adopts the basic principles of cryptography. It uses five symmetric keys (multiple)
in floating point numbers, plaintext, substitution techniques and key combinations with unintelligible
sequence to produce the ciphertext. The decryption process is also designed to reproduce the plaintext
In this paper we analyze the cryptanalysis of the simplified data encryption standard algorithm using metaheuristics
and in particular genetic algorithms. The classic fitness function when using such an algorithm
is to compare n-gram statistics of a the decrypted message with those of the target message. We show that
using such a function is irrelevant in case of Genetic Algorithm, simply because there is no correlation
between the distance to the real key (the optimum) and the value of the fitness, in other words, there is no
hidden gradient. In order to emphasize this assumption we experimentally show that a genetic algorithm
perform worse than a random search on the cryptanalysis of the simplified data encryption standard
algorithm.
This document contains definitions and explanations of various cryptographic concepts and techniques:
- It defines traffic analysis attacks, rail fence transposition, block ciphers vs stream ciphers, cryptanalysis vs brute force attacks, unconditionally secure vs computationally secure ciphers, the Caesar cipher, monoalphabetic ciphers, Playfair ciphers, one-time pads, transposition ciphers, steganography, and Feistel ciphers.
- It also explains concepts like diffusion vs confusion, the purpose of S-boxes in DES, the avalanche effect, monoalphabetic vs polyalphabetic ciphers, and criteria for evaluating AES candidates.
The document provides an overview of the Advanced Encryption Standard (AES) algorithm. It defines key terms like block, state, and XOR used in AES. It then describes the AES algorithm which works by repeating rounds that include byte substitution, shifting rows, mixing columns, and adding a round key. The number of rounds depends on the key size, being 10 for a 16-byte key and 14 for a 32-byte key. Encryption and decryption are similar processes performed in reverse order.
Secure Hash Algorithm (SHA) was developed by NIST and NSA to hash messages into fixed-length message digests. SHA has multiple versions including SHA-1, SHA-2, and SHA-3. SHA-1 produces a 160-bit message digest and works by padding the input message, appending the length, dividing into blocks, initializing variables, and processing blocks through 80 rounds of operations to output the digest. SHA-512 is closely modeled after SHA-1 but produces a 512-bit digest and uses 1024-bit blocks.
Minor Project- AES Implementation in VerilogHardik Manocha
This presentation described about the Minor project I worked on for partial fulfillment of Bachelors Degree in G B Pant Engineering College. Presentation consisted of Advanced Encryption Standard (AES) and its implementation in Verilog. Different steps of the algorithm are presented.
The document discusses the Advanced Encryption Standard (AES) algorithm, which is used for encryption and involves several processes applied to a rectangular array called the state. AES uses a variable number of rounds depending on the key size, with each round consisting of sub bytes, shift rows, mix columns, and add round key transformations except for the last round which excludes mix columns. The Rijndael cipher which was selected as the AES algorithm operates on a 4x4 byte state and supports key sizes of 128, 192, and 256 bits.
MD5 is a hashing algorithm that takes an input of arbitrary length and produces a 128-bit hash value. It works by processing the input message in 512-bit blocks, padding the last block as needed, and performing transformations using auxiliary functions to update the hash value after each block. The implementation in C uses a state buffer to store the running hash value, along with functions for initialization, updating the hash with new data blocks, finalization including padding, and transforming blocks.
This document summarizes the MD5 algorithm and proposes methods to strengthen it against cracking. It analyzes the MD5 algorithm and common cracking approaches. It then proposes several measures to improve MD5 security, including increasing password complexity, using secondary encoding, and increasing the length of the MD5 hash value through concatenation to reduce collision probability. It includes a demonstration program that implements one proposed method of increasing hash length through multiple encodings and concatenation.
Using Cipher Key to Generate Dynamic S-Box in AES Cipher SystemCSCJournals
The Advanced Encryption Standard (AES) is using in a large scale of applications that need to protect their data and information. The S-Box component that used in AES is fixed, and not changeable. If we can generate this S-Box dynamically, we increase the cryptographic strength of AES cipher system. In this paper we intend to introduce new algorithm that generate S-Box dynamically from cipher key. We describe how S-Box can be generated dynamically from cipher key and finally analyze the results and experiments.
The document discusses cryptographic hash functions, including an overview of their usage, properties, structures, attacks, and the need for a new secure hash standard. It describes how hash functions work by condensing arbitrary messages into fixed-size message digests. The properties of preimage resistance, second preimage resistance, and collision resistance are explained. Common hashing algorithms like MD5, SHA-1, and SHA-2 are outlined along with vulnerabilities like birthday attacks. The document concludes by noting the need to replace standards like MD5 and SHA-1 due to successful cryptanalysis attacks.
Hash functions take a variable-length input and produce a fixed-length output. They are used to verify data integrity and ensure data has not been altered. Cryptographic hash functions have properties of being one-way and collision resistant. Secure Hash Algorithm 512 (SHA-512) is an iterative cryptographic hash function that produces a 512-bit hash value. It works by processing the input message in 1024-bit blocks through 80 rounds of compression functions using logical operations and round constants. SHA-512 and other cryptographic hash functions have applications in security protocols like TLS, PGP, and DNSSEC.
Block ciphers like DES encrypt data in blocks and use a symmetric key known to both the sender and receiver. The AES block cipher is commonly used today. It operates on 128-bit blocks and supports key sizes of 128, 192, or 256 bits. The AES algorithm consists of repeated rounds of substitutions, shifts, and XOR operations with a expanded key schedule. It was designed to improve upon DES by having stronger cryptography and being more computationally efficient.
This document discusses lightweight cryptography techniques for RFID systems with limited resources. It compares the Data Encryption Standard (DES) algorithm and a simplified version called Lightweight DES (DESL). DESL reduces gate complexity by eliminating initial/final permutations and using a single S-box, providing around a 20% reduction in gates compared to DES while maintaining throughput. The document also briefly introduces the Advanced Encryption Standard (AES) algorithm.
Data Encryption standard in cryptographyNithyasriA2
The document discusses the Data Encryption Standard (DES) algorithm. It provides an overview of DES, including its history, encryption process, key generation process, and decryption process. It describes how DES uses a Feistel cipher structure with a 64-bit block size and 56-bit key. It also discusses various attacks that have been performed on DES, such as differential cryptanalysis and linear cryptanalysis, and how DES has been shown to be insecure due to increases in computational power allowing brute force attacks. Improved versions of DES using multiple encryptions, such as triple DES, are also summarized to increase the key size and security.
This document provides an overview of block ciphers and the Data Encryption Standard (DES) algorithm. It begins with definitions of stream ciphers and block ciphers. It then discusses the principles of confusion and diffusion in encryption algorithms. The document introduces the Feistel cipher structure and how it was developed based on Claude Shannon's work. It provides details on the DES algorithm, including its history, design, encryption process using rounds and subkeys, decryption process, and the avalanche effect property.
Comparison of AES and DES Algorithms Implemented on Virtex-6 FPGA and Microbl...IJECEIAES
Encryption algorithms play a dominant role in preventing unauthorized access to important data. This paper focus on the implementations of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) algorithms on Microblaze soft core Processor and also their implementations on XC6VLX240t FPGA using Verilog Hardware Description language. This paper also gives a comparison of the issues related to the hardware and software implementations of the two cryptographic algorithms.
The document discusses Feistel block ciphers and their structure. A Feistel cipher uses multiple rounds of processing on a plaintext block, with each round consisting of a substitution step followed by a permutation step. The block is divided into two halves, and in each round the left half is combined with the right half and key using a round function, while the right half remains unchanged. The halves are then swapped. Feistel ciphers like DES use different subkeys derived from the main key in each round. The decryption process follows the same structure but with subkeys used in reverse order.
This document summarizes key aspects of block ciphers and the Data Encryption Standard (DES). It discusses Feistel ciphers, DES encryption which uses a 56-bit key on 64-bit blocks, and cryptanalysis techniques like differential and linear cryptanalysis. Block cipher design principles emphasize choosing an appropriate number of rounds, designing a nonlinear round function F, and implementing an effective key scheduling algorithm to generate unique subkeys for each round.
This document discusses block ciphers and the Data Encryption Standard (DES). It explains that block ciphers encrypt data in blocks, while stream ciphers encrypt data bit-by-bit. DES is a symmetric block cipher that uses a Feistel network structure with 16 rounds to encrypt 64-bit blocks. Each round uses a 48-bit subkey and includes substitution via S-boxes and permutation. Modern cryptanalysis techniques like differential and linear cryptanalysis can potentially break DES, highlighting the need for newer block cipher designs.
This document summarizes the key aspects of cryptanalysis and the Data Encryption Standard (DES) algorithm. It discusses the tasks of a cryptanalyst in breaking encryption systems and outlines the basic structure and operation of DES. DES encrypts 64-bit blocks using a 56-bit key and 16 rounds of encryption. Each round uses a 48-bit subkey and the Feistel network structure to provide diffusion and confusion. The document also notes concerns about the cryptographic strength of DES' 56-bit keys and 8 substitution boxes against attacks over time.
In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithm’s design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.
1) The document proposes a hybrid 128-bit key AES-DES algorithm to enhance data security and transmission security for next generation networks.
2) It discusses some weaknesses in the AES encryption algorithm against algebraic cryptanalysis and outlines a hybrid approach that combines AES and DES algorithms.
3) The hybrid approach integrates the AES encryption process within the Feistel network structure of DES, using AES transformations like byte substitution and shift rows within each round of the DES Feistel network. This is intended to strengthen security by combining the advantages of both algorithms while reducing individual weaknesses.
ENSEMBLE OF BLOWFISH WITH CHAOS BASED S BOX DESIGN FOR TEXT AND IMAGE ENCRYPTIONIJNSA Journal
The rapid and extensive usage of Internet in the present decade has put forth information security as an utmost concern. Most of the commercial transactions taking place over the Internet involves a wide variety of data including text, images, audio and video. With the increasing use of digital techniques for transmitting and storing Multimedia data, the fundamental issue of protecting the confidentiality, integrity and authenticity of the information poses a major challenge for security professionals and hassled to the major developments in Cryptography . In cryptography, an S-Box (Substitution-box) is a basic component of symmetric key algorithms, which performs substitution and is typically used to make the relationship between the key and the cipher text non linear and most of the symmetric key algorithms like DES, Blowfish makes use of S boxes. This paper proposes a new method for design of S boxes based on chaos theory. Chaotic equations are popularly known for its randomness, extreme sensitivity to initial conditions and ergodicity. The modified design has been tested with blowfish algorithm which has no effective crypt analysis reported against its design till date because of its salient design features including the key dependant s boxes and complex key generation process. However every new key requires pre-processing equivalent to encrypting about 4 kilobytes of text, which is very slow compared to other block ciphers and it prevents its usage in memory limited applications and embedded systems. The modified design of S boxes maintains the non linearity [3] [5] and key dependency factors of S boxes with a major reduction in time complexity of generation of S boxes and P arrays. The algorithm has been implemented and the proposed design has been analyzed for size of key space, key sensitivity and Avalanche effect. Experimental results on text and Image Encryption show that the modified design of key generation continues to offer the same
level of security as the original Blowfish cipher with a less computational overhead in key generation.
HARDWARE IMPLEMENTATION OF ALGORITHM FOR CRYPTANALYSISijcisjournal
Cryptanalysis of block ciphers involves massive computations which are independent of each other and can be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are compared and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this work is to make cryptanalysis faster and better.
The document discusses stream ciphers and block ciphers. It explains that stream ciphers encrypt data bit-by-bit or byte-by-byte, requiring a randomly generated keystream, while block ciphers encrypt fixed-length blocks, allowing for broader applications. It then focuses on the Feistel cipher structure for block ciphers, proposed by Feistel to approximate an ideal block cipher for large block sizes. The Feistel structure uses a product cipher approach involving substitutions and permutations to provide diffusion and confusion and resist statistical cryptanalysis.
This document describes Tharindu Weerasinghe's MSc research project on developing a hybrid cipher by combining a block cipher and a stream cipher. It summarizes the background on block ciphers like DES and stream ciphers like RC4. It then describes the researcher's algorithm that first encrypts plaintext using 3DES (a block cipher) and then RC4 (a stream cipher), and decrypts in the reverse order. The document discusses the benefits of combining ciphers and addresses some vulnerabilities of using block and stream ciphers individually. It also mentions the researcher implemented the algorithm in Java and measured encryption/decryption times.
presentation based on data encryption standardsSwati Sharma
Block ciphers encrypt data in blocks, typically 64 or 128 bits, using cryptographic keys and algorithms. The Data Encryption Standard (DES) is a symmetric-key algorithm that encrypts data in 64-bit blocks using a 56-bit key. DES encryption uses a Feistel cipher structure involving multiple rounds of substitutions, permutations, and XOR operations to encrypt plaintext into ciphertext. The security of the algorithm increases with a larger block and key size, more complex round functions, and a greater number of rounds.
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
Cryptanalysis of block ciphers involves massive computations which are independent of each other and can
be instantiated simultaneously so that the solution space is explored at a faster rate. With the advent of low
cost Field Programmable Gate Arrays (FPGA’s), building special purpose hardware for computationally
intensive applications has now become possible. For this the Data Encryption Standard (DES) is used as a
proof of concept. This paper presents the design for Hardware implementation of DES cryptanalysis on
FPGA using exhaustive key search. Two architectures viz. Rolled and Unrolled DES architecture are compared
and based on experimental result the Rolled architecture is implemented on FPGA. The aim of this
work is to make cryptanalysis faster and better.
In cryptography, a block cipher is a deterministic algorithm operating on ... Systems as a means to effectively improve security by combining simple operations such as .... Finally, the cipher should be easily cryptanalyzable, such that it can be ...
This document discusses stream ciphers and block ciphers. It provides examples of stream ciphers like the Auto keyed Vigenère cipher and Vernam cipher. It explains that in a stream cipher, each plaintext digit is encrypted individually with the corresponding digit from a pseudorandom key stream. The document also discusses block ciphers, noting that they treat blocks of plaintext as a whole and produce cipher text blocks of equal length. It provides details on the DES algorithm, including its use of Feistel networks and substitution-permutation networks.
This document analyzes and compares the performance of various cryptography algorithms. It discusses symmetric key algorithms like DES, AES, Blowfish and IDEA as well as asymmetric algorithms like RSA and Diffie-Hellman. The performance is evaluated based on parameters like encryption/decryption time, memory usage and throughput. Experiments show that Blowfish has better performance than AES for encrypting audio files, with lower average encryption and decryption times. In conclusion, cryptography is important for network security and Blowfish performs encryption/decryption more efficiently than AES for audio files.
Similar to Performance Analysis of Data Encryption Standard DES (20)
‘Six Sigma Technique’ A Journey Through its Implementationijtsrd
The manufacturing industries all over the world are facing tough challenges for growth, development and sustainability in today’s competitive environment. They have to achieve apex position by adapting with the global competitive environment by delivering goods and services at low cost, prime quality and better price to increase wealth and consumer satisfaction. Cost Management ensures profit, growth and sustainability of the business with implementation of Continuous Improvement Technique like Six Sigma. This leads to optimize Business performance. The method drives for customer satisfaction, low variation, reduction in waste and cycle time resulting into a competitive advantage over other industries which did not implement it. The main objective of this paper ‘Six Sigma Technique A Journey Through Its Implementation’ is to conceptualize the effectiveness of Six Sigma Technique through the journey of its implementation. Aditi Sunilkumar Ghosalkar "‘Six Sigma Technique’: A Journey Through its Implementation" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64546.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64546/‘six-sigma-technique’-a-journey-through-its-implementation/aditi-sunilkumar-ghosalkar
Edge Computing in Space Enhancing Data Processing and Communication for Space...ijtsrd
Edge computing, a paradigm that involves processing data closer to its source, has gained significant attention for its potential to revolutionize data processing and communication in space missions. With the increasing complexity and data volume generated by modern space missions, traditional centralized computing approaches face challenges related to latency, bandwidth, and security. Edge computing in space, involving on board processing and analysis of data, offers promising solutions to these challenges. This paper explores the concept of edge computing in space, its benefits, applications, and future prospects in enhancing space missions. Manish Verma "Edge Computing in Space: Enhancing Data Processing and Communication for Space Missions" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64541.pdf Paper Url: https://www.ijtsrd.com/computer-science/artificial-intelligence/64541/edge-computing-in-space-enhancing-data-processing-and-communication-for-space-missions/manish-verma
Dynamics of Communal Politics in 21st Century India Challenges and Prospectsijtsrd
Communal politics in India has evolved through centuries, weaving a complex tapestry shaped by historical legacies, colonial influences, and contemporary socio political transformations. This research comprehensively examines the dynamics of communal politics in 21st century India, emphasizing its historical roots, socio political dynamics, economic implications, challenges, and prospects for mitigation. The historical perspective unravels the intricate interplay of religious identities and power dynamics from ancient civilizations to the impact of colonial rule, providing insights into the evolution of communalism. The socio political dynamics section delves into the contemporary manifestations, exploring the roles of identity politics, socio economic disparities, and globalization. The economic implications section highlights how communal politics intersects with economic issues, perpetuating disparities and influencing resource allocation. Challenges posed by communal politics are scrutinized, revealing multifaceted issues ranging from social fragmentation to threats against democratic values. The prospects for mitigation present a multifaceted approach, incorporating policy interventions, community engagement, and educational initiatives. The paper conducts a comparative analysis with international examples, identifying common patterns such as identity politics and economic disparities. It also examines unique challenges, emphasizing Indias diverse religious landscape, historical legacy, and secular framework. Lessons for effective strategies are drawn from international experiences, offering insights into inclusive policies, interfaith dialogue, media regulation, and global cooperation. By scrutinizing historical epochs, contemporary dynamics, economic implications, and international comparisons, this research provides a comprehensive understanding of communal politics in India. The proposed strategies for mitigation underscore the importance of a holistic approach to foster social harmony, inclusivity, and democratic values. Rose Hossain "Dynamics of Communal Politics in 21st Century India: Challenges and Prospects" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64528.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/history/64528/dynamics-of-communal-politics-in-21st-century-india-challenges-and-prospects/rose-hossain
Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in...ijtsrd
Background and Objective Telehealth has become a well known tool for the delivery of health care in Saudi Arabia, and the perspective and knowledge of healthcare providers are influential in the implementation, adoption and advancement of the method. This systematic review was conducted to examine the current literature base regarding telehealth and the related healthcare professional perspective and knowledge in the Kingdom of Saudi Arabia. Materials and Methods This systematic review was conducted by searching 7 databases including, MEDLINE, CINHAL, Web of Science, Scopus, PubMed, PsycINFO, and ProQuest Central. Studies on healthcare practitioners telehealth knowledge and perspectives published in English in Saudi Arabia from 2000 to 2023 were included. Boland directed this comprehensive review. The researchers examined each connected study using the AXIS tool, which evaluates cross sectional systematic reviews. Narrative synthesis was used to summarise and convey the data. Results Out of 1840 search results, 10 studies were included. Positive outlook and limited knowledge among providers were seen across trials. Healthcare professionals like telehealth for its ability to improve quality, access, and delivery, save time and money, and be successful. Age, gender, occupation, and work experience also affect health workers knowledge. In Saudi Arabia, healthcare professionals face inadequate expert assistance, patient privacy, internet connection concerns, lack of training courses, lack of telehealth understanding, and high costs while performing telemedicine. Conclusions Healthcare practitioners telehealth perceptions and knowledge were examined in this systematic study. Its collection of concerned experts different personal attitudes and expertise would help enhance telehealths implementation in Saudi Arabia, develop its healthcare delivery alternative, and eliminate frequent problems. Badriah Mousa I Mulayhi | Dr. Jomin George | Judy Jenkins "Assess Perspective and Knowledge of Healthcare Providers Towards Elehealth in Saudi Arabia: A Systematic Review" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64535.pdf Paper Url: https://www.ijtsrd.com/medicine/other/64535/assess-perspective-and-knowledge-of-healthcare-providers-towards-elehealth-in-saudi-arabia-a-systematic-review/badriah-mousa-i-mulayhi
The Impact of Digital Media on the Decentralization of Power and the Erosion ...ijtsrd
The impact of digital media on the distribution of power and the weakening of traditional gatekeepers has gained considerable attention in recent years. The adoption of digital technologies and the internet has resulted in declining influence and power for traditional gatekeepers such as publishing houses and news organizations. Simultaneously, digital media has facilitated the emergence of new voices and players in the media industry. Digital medias impact on power decentralization and gatekeeper erosion is visible in several ways. One significant aspect is the democratization of information, which enables anyone with an internet connection to publish and share content globally, leading to citizen journalism and bypassing traditional gatekeepers. Another aspect is the disruption of conventional media industry business models, as traditional organizations struggle to adjust to the decrease in advertising revenue and the rise of digital platforms. Alternative business models, such as subscription models and crowdfunding, have become more prevalent, leading to the emergence of new players. Overall, the impact of digital media on the distribution of power and the weakening of traditional gatekeepers has brought about significant changes in the media landscape and the way information is shared. Further research is required to fully comprehend the implications of these changes and their impact on society. Dr. Kusum Lata "The Impact of Digital Media on the Decentralization of Power and the Erosion of Traditional Gatekeepers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64544.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64544/the-impact-of-digital-media-on-the-decentralization-of-power-and-the-erosion-of-traditional-gatekeepers/dr-kusum-lata
Online Voices, Offline Impact Ambedkars Ideals and Socio Political Inclusion ...ijtsrd
This research investigates the nexus between online discussions on Dr. B.R. Ambedkars ideals and their impact on social inclusion among college students in Gurugram, Haryana. Surveying 240 students from 12 government colleges, findings indicate that 65 actively engage in online discussions, with 80 demonstrating moderate to high awareness of Ambedkars ideals. Statistically significant correlations reveal that higher online engagement correlates with increased awareness p 0.05 and perceived social inclusion. Variations across colleges and a notable effect of college type on perceived social inclusion highlight the influence of contextual factors. Furthermore, the intersectional analysis underscores nuanced differences based on gender, caste, and socio economic status. Dr. Kusum Lata "Online Voices, Offline Impact: Ambedkar's Ideals and Socio-Political Inclusion - A Study of Gurugram District" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64543.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/political-science/64543/online-voices-offline-impact-ambedkars-ideals-and-sociopolitical-inclusion--a-study-of-gurugram-district/dr-kusum-lata
Problems and Challenges of Agro Entreprenurship A Studyijtsrd
Noting calls for contextualizing Agro entrepreneurs problems and challenges of the agro entrepreneurs and for greater attention to the Role of entrepreneurs in agro entrepreneurship research, we conduct a systematic literature review of extent research in agriculture entrepreneurship to overcome the study objectives of complications of agro entrepreneurs through various factors, Development of agriculture products is a key factor for the overall economic growth of agro entrepreneurs Agro Entrepreneurs produces firsthand large scale employment, utilizes the labor and natural resources, This research outlines the problems of Weather and Soil Erosions, Market price fluctuation, stimulates labor cost problems, reduces concentration of Price volatility, Dependency on Intermediaries, induces Limited Bargaining Power, and Storage and Transportation Costs. This paper mainly devoted to highlight Problems and challenges faced for the sustainable of Agro Entrepreneurs in India. Vinay Prasad B "Problems and Challenges of Agro Entreprenurship - A Study" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64540.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64540/problems-and-challenges-of-agro-entreprenurship--a-study/vinay-prasad-b
Comparative Analysis of Total Corporate Disclosure of Selected IT Companies o...ijtsrd
Disclosure is a process through which a business enterprise communicates with external parties. A corporate disclosure is communication of financial and non financial information of the activities of a business enterprise to the interested entities. Corporate disclosure is done through publishing annual reports. So corporate disclosure through annual reports plays a vital role in the life of all the companies and provides valuable information to investors. The basic objectives of corporate disclosure is to give a true and fair view of companies to the parties related either directly or indirectly like owner, government, creditors, shareholders etc. in the companies act, provisions have been made about mandatory and voluntary disclosure. The IT sector in India is rapidly growing, the trend to invest in the IT sector is rising and employment opportunities in IT sectors are also increasing. Therefore the IT sector is expected to have fair, full and adequate disclosure of all information. Unfair and incomplete disclosure may adversely affect the entire economy. A research study on disclosure practices of IT companies could play an important role in this regard. Hence, the present research study has been done to study and review comparative analysis of total corporate disclosure of selected IT companies of India and to put forward overall findings and suggestions with a view to increase disclosure score of these companies. The researcher hopes that the present research study will be helpful to all selected Companies for improving level of corporate disclosure through annual reports as well as the government, creditors, investors, all business organizations and upcoming researcher for comparative analyses of level of corporate disclosure with special reference to selected IT companies. Dr. Vaibhavi D. Thaker "Comparative Analysis of Total Corporate Disclosure of Selected IT Companies of India" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64539.pdf Paper Url: https://www.ijtsrd.com/other-scientific-research-area/other/64539/comparative-analysis-of-total-corporate-disclosure-of-selected-it-companies-of-india/dr-vaibhavi-d-thaker
The Impact of Educational Background and Professional Training on Human Right...ijtsrd
This study investigated the impact of educational background and professional training on human rights awareness among secondary school teachers in the Marathwada region of Maharashtra, India. The key findings reveal that higher levels of education, particularly a master’s degree, and fields of study related to education, humanities, or social sciences are associated with greater human rights awareness among teachers. Additionally, both pre service teacher training and in service professional development programs focused on human rights education significantly enhance teacher’s knowledge, skills, and competencies in promoting human rights principles in their classrooms. Baig Ameer Bee Mirza Abdul Aziz | Dr. Syed Azaz Ali Amjad Ali "The Impact of Educational Background and Professional Training on Human Rights Awareness among Secondary School Teachers" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64529.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64529/the-impact-of-educational-background-and-professional-training-on-human-rights-awareness-among-secondary-school-teachers/baig-ameer-bee-mirza-abdul-aziz
A Study on the Effective Teaching Learning Process in English Curriculum at t...ijtsrd
“One Language sets you in a corridor for life. Two languages open every door along the way” Frank Smith English as a foreign language or as a second language has been ruling in India since the period of Lord Macaulay. But the question is how much we teach or learn English properly in our culture. Is there any scope to use English as a language rather than a subject How much we learn or teach English without any interference of mother language specially in the classroom teaching learning scenario in West Bengal By considering all these issues the researcher has attempted in this article to focus on the effective teaching learning process comparing to other traditional strategies in the field of English curriculum at the secondary level to investigate whether they fulfill the present teaching learning requirements or not by examining the validity of the present curriculum of English. The purpose of this study is to focus on the effectiveness of the systematic, scientific, sequential and logical transaction of the course between the teachers and the learners in the perspective of the 5Es programme that is engage, explore, explain, extend and evaluate. Sanchali Mondal | Santinath Sarkar "A Study on the Effective Teaching Learning Process in English Curriculum at the Secondary Level of West Bengal" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd62412.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/62412/a-study-on-the-effective-teaching-learning-process-in-english-curriculum-at-the-secondary-level-of-west-bengal/sanchali-mondal
The Role of Mentoring and Its Influence on the Effectiveness of the Teaching ...ijtsrd
This paper reports on a study which was conducted to investigate the role of mentoring and its influence on the effectiveness of the teaching of Physics in secondary schools in the South West Region of Cameroon. The study adopted the convergent parallel mixed methods design, focusing on respondents in secondary schools in the South West Region of Cameroon. Both quantitative and qualitative data were collected, analysed separately, and the results were compared to see if the findings confirm or disconfirm each other. The quantitative analysis found that majority of the respondents 72 of Physics teachers affirmed that they had more experienced colleagues as mentors to help build their confidence, improve their teaching, and help them improve their effectiveness and efficiency in guiding learners’ achievements. Only 28 of the respondents disagreed with these statements. With majority respondents 72 agreeing with the statements, it implies that in most secondary schools, experienced Physics teachers act as mentors to build teachers’ confidence in teaching and improving students’ learning. The interview qualitative data analysis summarized how secondary school Principals use meetings with mentors and mentees to promote mentorship in the school milieu. This has helped strengthen teachers’ classroom practices in secondary schools in the South West Region of Cameroon. With the results confirming each other, the study recommends that mentoring should focus on helping teachers employ social interactions and instructional practices feedback and clarity in teaching that have direct measurable impact on students’ learning achievements. Andrew Ngeim Sumba | Frederick Ebot Ashu | Peter Agborbechem Tambi "The Role of Mentoring and Its Influence on the Effectiveness of the Teaching of Physics in Secondary Schools in the South West Region of Cameroon" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64524.pdf Paper Url: https://www.ijtsrd.com/management/management-development/64524/the-role-of-mentoring-and-its-influence-on-the-effectiveness-of-the-teaching-of-physics-in-secondary-schools-in-the-south-west-region-of-cameroon/andrew-ngeim-sumba
Design Simulation and Hardware Construction of an Arduino Microcontroller Bas...ijtsrd
This study primarily focuses on the design of a high side buck converter using an Arduino microcontroller. The converter is specifically intended for use in DC DC applications, particularly in standalone solar PV systems where the PV output voltage exceeds the load or battery voltage. To evaluate the performance of the converter, simulation experiments are conducted using Proteus Software. These simulations provide insights into the input and output voltages, currents, powers, and efficiency under different state of charge SoC conditions of a 12V,70Ah rechargeable lead acid battery. Additionally, the hardware design of the converter is implemented, and practical data is collected through operation, monitoring, and recording. By comparing the simulation results with the practical results, the efficiency and performance of the designed converter are assessed. The findings indicate that while the buck converter is suitable for practical use in standalone PV systems, its efficiency is compromised due to a lower output current. Chan Myae Aung | Dr. Ei Mon "Design Simulation and Hardware Construction of an Arduino-Microcontroller Based DC-DC High-Side Buck Converter for Standalone PV System" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64518.pdf Paper Url: https://www.ijtsrd.com/engineering/mechanical-engineering/64518/design-simulation-and-hardware-construction-of-an-arduinomicrocontroller-based-dcdc-highside-buck-converter-for-standalone-pv-system/chan-myae-aung
Sustainable Energy by Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadikuijtsrd
Energy becomes sustainable if it meets the needs of the present without compromising the ability of future generations to meet their own needs. Some of the definitions of sustainable energy include the considerations of environmental aspects such as greenhouse gas emissions, social, and economic aspects such as energy poverty. Generally far more sustainable than fossil fuel are renewable energy sources such as wind, hydroelectric power, solar, and geothermal energy sources. Worthy of note is that some renewable energy projects, like the clearing of forests to produce biofuels, can cause severe environmental damage. The sustainability of nuclear power which is a low carbon source is highly debated because of concerns about radioactive waste, nuclear proliferation, and accidents. The switching from coal to natural gas has environmental benefits, including a lower climate impact, but could lead to delay in switching to more sustainable options. “Carbon capture and storage” can be built into power plants to remove the carbon dioxide CO2 emissions, but this technology is expensive and has rarely been implemented. Leading non renewable energy sources around the world is fossil fuels, coal, petroleum, and natural gas. Nuclear energy is usually considered another non renewable energy source, although nuclear energy itself is a renewable energy source, but the material used in nuclear power plants is not. The paper addresses the issue of sustainable energy, its attendant benefits to the future generation, and humanity in general. Paul A. Adekunte | Matthew N. O. Sadiku | Janet O. Sadiku "Sustainable Energy" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64534.pdf Paper Url: https://www.ijtsrd.com/engineering/electrical-engineering/64534/sustainable-energy/paul-a-adekunte
Concepts for Sudan Survey Act Implementations Executive Regulations and Stand...ijtsrd
This paper aims to outline the executive regulations, survey standards, and specifications required for the implementation of the Sudan Survey Act, and for regulating and organizing all surveying work activities in Sudan. The act has been discussed for more than 5 years. The Land Survey Act was initiated by the Sudan Survey Authority and all official legislations were headed by the Sudan Ministry of Justice till it was issued in 2022. The paper presents conceptual guidelines to be used for the Survey Act implementation and to regulate the survey work practice, standardizing the field surveys, processing, quality control, procedures, and the processes related to survey work carried out by the stakeholders and relevant authorities in Sudan. The conceptual guidelines are meant to improve the quality and harmonization of geospatial data and to aid decision making processes as well as geospatial information systems. The established comprehensive executive regulations will govern and regulate the implementation of the Sudan Survey Geomatics Act in all surveying and mapping practices undertaken by the Sudan Survey Authority SSA and state local survey departments for public or private sector organizations. The targeted standards and specifications include the reference frame, projection, coordinate systems, and the guidelines and specifications that must be followed in the field of survey work, processes, and mapping products. In the last few decades, there has been a growing awareness of the importance of geomatics activities and measurements on the Earths surface in space and time, together with observing and mapping the changes. In such cases, data must be captured promptly, standardized, and obtained with more accuracy and specified in much detail. The paper will also highlight the current situation in Sudan, the degree to which survey standards are used, the problems encountered, and the errors that arise from not using the standards and survey specifications. Kamal A. A. Sami "Concepts for Sudan Survey Act Implementations - Executive Regulations and Standards" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63484.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63484/concepts-for-sudan-survey-act-implementations--executive-regulations-and-standards/kamal-a-a-sami
Towards the Implementation of the Sudan Interpolated Geoid Model Khartoum Sta...ijtsrd
The discussions between ellipsoid and geoid have invoked many researchers during the recent decades, especially during the GNSS technology era, which had witnessed a great deal of development but still geoid undulation requires more investigations. To figure out a solution for Sudans local geoid, this research has tried to intake the possibility of determining the geoid model by following two approaches, gravimetric and geometrical geoid model determination, by making use of GNSS leveling benchmarks at Khartoum state. The Benchmarks are well distributed in the study area, in which, the horizontal coordinates and the height above the ellipsoid have been observed by GNSS while orthometric heights were carried out using precise leveling. The Global Geopotential Model GGM represented in EGM2008 has been exploited to figure out the geoid undulation at the benchmarks in the study area. This is followed by a fitting process, that has been done to suit the geoid undulation data which has been computed using GNSS leveling data and geoid undulation inspired by the EGM2008. Two geoid surfaces were created after the fitting process to ensure that they are identical and both of them could be counted for getting the same geoid undulation with an acceptable accuracy. In this respect, statistical operation played an important role in ensuring the consistency and integrity of the model by applying cross validation techniques splitting the data into training and testing datasets for building the geoid model and testing its eligibility. The geometrical solution for geoid undulation computation has been utilized by applying straightforward equations that facilitate the calculation of the geoid undulation directly through applying statistical techniques for the GNSS leveling data of the study area to get the common equation parameters values that could be utilized to calculate geoid undulation of any position in the study area within the claimed accuracy. Both systems were checked and proved eligible to be used within the study area with acceptable accuracy which may contribute to solving the geoid undulation problem in the Khartoum area, and be further generalized to determine the geoid model over the entire country, and this could be considered in the future, for regional and continental geoid model. Ahmed M. A. Mohammed. | Kamal A. A. Sami "Towards the Implementation of the Sudan Interpolated Geoid Model (Khartoum State Case Study)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63483.pdf Paper Url: https://www.ijtsrd.com/engineering/civil-engineering/63483/towards-the-implementation-of-the-sudan-interpolated-geoid-model-khartoum-state-case-study/ahmed-m-a-mohammed
Activating Geospatial Information for Sudans Sustainable Investment Mapijtsrd
Sudan is witnessing an acceleration in the processes of development and transformation in the performance of government institutions to raise the productivity and investment efficiency of the government sector. The development plans and investment opportunities have focused on achieving national goals in various sectors. This paper aims to illuminate the path to the future and provide geospatial data and information to develop the investment climate and environment for all sized businesses, and to bridge the development gap between the Sudan states. The Sudan Survey Authority SSA is the main advisor to the Sudan Government in conducting surveying, mappings, designing, and developing systems related to geospatial data and information. In recent years, SSA made a strategic partnership with the Ministry of Investment to activate Geospatial Information for Sudans Sustainable Investment and in particular, for the preparation and implementation of the Sudan investment map, based on the directives and objectives of the Ministry of Investment MI in Sudan. This paper comes within the framework of activating the efforts of the Ministry of Investment to develop technical investment services by applying techniques adopted by the Ministry and its strategic partners for advancing investment processes in the country. Kamal A. A. Sami "Activating Geospatial Information for Sudan's Sustainable Investment Map" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63482.pdf Paper Url: https://www.ijtsrd.com/engineering/information-technology/63482/activating-geospatial-information-for-sudans-sustainable-investment-map/kamal-a-a-sami
Educational Unity Embracing Diversity for a Stronger Societyijtsrd
In a rapidly changing global landscape, the importance of education as a unifying force cannot be overstated. This paper explores the crucial role of educational unity in fostering a stronger and more inclusive society through the embrace of diversity. By examining the benefits of diverse learning environments, the paper aims to highlight the positive impact on societal strength. The discussion encompasses various dimensions, from curriculum design to classroom dynamics, and emphasizes the need for educational institutions to become catalysts for unity in diversity. It highlights the need for a paradigm shift in educational policies, curricula, and pedagogical approaches to ensure that they are reflective of the diverse fabric of society. This paper also addresses the challenges associated with implementing inclusive educational practices and offers practical strategies for overcoming barriers. It advocates for collaborative efforts between educational institutions, policymakers, and communities to create a supportive ecosystem that promotes diversity and unity. Mr. Amit Adhikari | Madhumita Teli | Gopal Adhikari "Educational Unity: Embracing Diversity for a Stronger Society" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64525.pdf Paper Url: https://www.ijtsrd.com/humanities-and-the-arts/education/64525/educational-unity-embracing-diversity-for-a-stronger-society/mr-amit-adhikari
Integration of Indian Indigenous Knowledge System in Management Prospects and...ijtsrd
The diversity of indigenous knowledge systems in India is vast and can vary significantly between different communities and regions. Preserving and respecting these knowledge systems is crucial for maintaining cultural heritage, promoting sustainable practices, and fostering cross cultural understanding. In this paper, an overview of the prospects and challenges associated with incorporating Indian indigenous knowledge into management is explored. It is found that IIKS helps in management in many areas like sustainable development, tourism, food security, natural resource management, cultural preservation and innovation, etc. However, IIKS integration with management faces some challenges in the form of a lack of documentation, cultural sensitivity, language barriers legal framework, etc. Savita Lathwal "Integration of Indian Indigenous Knowledge System in Management: Prospects and Challenges" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63500.pdf Paper Url: https://www.ijtsrd.com/management/accounting-and-finance/63500/integration-of-indian-indigenous-knowledge-system-in-management-prospects-and-challenges/savita-lathwal
DeepMask Transforming Face Mask Identification for Better Pandemic Control in...ijtsrd
The COVID 19 pandemic has highlighted the crucial need of preventive measures, with widespread use of face masks being a key method for slowing the viruss spread. This research investigates face mask identification using deep learning as a technological solution to be reducing the risk of coronavirus transmission. The proposed method uses state of the art convolutional neural networks CNNs and transfer learning to automatically recognize persons who are not wearing masks in a variety of circumstances. We discuss how this strategy improves public health and safety by providing an efficient manner of enforcing mask wearing standards. The report also discusses the obstacles, ethical concerns, and prospective applications of face mask detection systems in the ongoing fight against the pandemic. Dilip Kumar Sharma | Aaditya Yadav "DeepMask: Transforming Face Mask Identification for Better Pandemic Control in the COVID-19 Era" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd64522.pdf Paper Url: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/64522/deepmask-transforming-face-mask-identification-for-better-pandemic-control-in-the-covid19-era/dilip-kumar-sharma
Streamlining Data Collection eCRF Design and Machine Learningijtsrd
Efficient and accurate data collection is paramount in clinical trials, and the design of Electronic Case Report Forms eCRFs plays a pivotal role in streamlining this process. This paper explores the integration of machine learning techniques in the design and implementation of eCRFs to enhance data collection efficiency. We delve into the synergies between eCRF design principles and machine learning algorithms, aiming to optimize data quality, reduce errors, and expedite the overall data collection process. The application of machine learning in eCRF design brings forth innovative approaches to data validation, anomaly detection, and real time adaptability. This paper discusses the benefits, challenges, and future prospects of leveraging machine learning in eCRF design for streamlined and advanced data collection in clinical trials. Dhanalakshmi D | Vijaya Lakshmi Kannareddy "Streamlining Data Collection: eCRF Design and Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-8 | Issue-1 , February 2024, URL: https://www.ijtsrd.com/papers/ijtsrd63515.pdf Paper Url: https://www.ijtsrd.com/biological-science/biotechnology/63515/streamlining-data-collection-ecrf-design-and-machine-learning/dhanalakshmi-d
Gender and Mental Health - Counselling and Family Therapy Applications and In...PsychoTech Services
A proprietary approach developed by bringing together the best of learning theories from Psychology, design principles from the world of visualization, and pedagogical methods from over a decade of training experience, that enables you to: Learn better, faster!
Information and Communication Technology in EducationMJDuyan
(𝐓𝐋𝐄 𝟏𝟎𝟎) (𝐋𝐞𝐬𝐬𝐨𝐧 2)-𝐏𝐫𝐞𝐥𝐢𝐦𝐬
𝐄𝐱𝐩𝐥𝐚𝐢𝐧 𝐭𝐡𝐞 𝐈𝐂𝐓 𝐢𝐧 𝐞𝐝𝐮𝐜𝐚𝐭𝐢𝐨𝐧:
Students will be able to explain the role and impact of Information and Communication Technology (ICT) in education. They will understand how ICT tools, such as computers, the internet, and educational software, enhance learning and teaching processes. By exploring various ICT applications, students will recognize how these technologies facilitate access to information, improve communication, support collaboration, and enable personalized learning experiences.
𝐃𝐢𝐬𝐜𝐮𝐬𝐬 𝐭𝐡𝐞 𝐫𝐞𝐥𝐢𝐚𝐛𝐥𝐞 𝐬𝐨𝐮𝐫𝐜𝐞𝐬 𝐨𝐧 𝐭𝐡𝐞 𝐢𝐧𝐭𝐞𝐫𝐧𝐞𝐭:
-Students will be able to discuss what constitutes reliable sources on the internet. They will learn to identify key characteristics of trustworthy information, such as credibility, accuracy, and authority. By examining different types of online sources, students will develop skills to evaluate the reliability of websites and content, ensuring they can distinguish between reputable information and misinformation.
Andreas Schleicher presents PISA 2022 Volume III - Creative Thinking - 18 Jun...EduSkills OECD
Andreas Schleicher, Director of Education and Skills at the OECD presents at the launch of PISA 2022 Volume III - Creative Minds, Creative Schools on 18 June 2024.
A Free 200-Page eBook ~ Brain and Mind Exercise.pptxOH TEIK BIN
(A Free eBook comprising 3 Sets of Presentation of a selection of Puzzles, Brain Teasers and Thinking Problems to exercise both the mind and the Right and Left Brain. To help keep the mind and brain fit and healthy. Good for both the young and old alike.
Answers are given for all the puzzles and problems.)
With Metta,
Bro. Oh Teik Bin 🙏🤓🤔🥰
2. International Journal of Trend in Scientific Research and Development (IJTSRD)
@ IJTSRD | Unique Paper ID – IJTSRD26650
The algorithms steps are as follow:
1. In the first step, the initial 64-bit plain text block is
handed over to initial permutation (IP) function.
2. The initial permutation is performed on plain text.
3. The initial permutation produces two halves of
permuted block: Left plain text (L0) and Right pl
(R0).
4. Each of L0 and R0 goes through 16 rounds of the
encryption process, each with its own key.
The single round of DES is shown in Fig. 2. These steps are
A. From the 56-bit key, a different 48
generated by using key transformation.
B. Using the expansion permutation, the R
from 32 bits to 48 bits.
C. Now, the 48-bit key is XORed with 48
resulting output is given in the next
D. step.
E. Using the S-box substitution producethe32
bit input.
F. These 32 bits are permuted using straight P
permutation.
G. The straight P-box output 32 bits are XORed with the
L032 bits.
H. The result of the XORed 32 bits becomes the R
R0 become the L1. This process is called as swapping.
Now the R1 again given to the next roundandperformed
the 15 more rounds.
5. After the completionof16rounds,thefinal permutation
is performed.
Fig.2 Single Round of DES
B. LOKI
In cryptography, LOKI89 and LOKI91 are symmetric
key block ciphers designed as possible replacement
the Data Encryption Standard (DES). The ciphers were
developed based on a body of work analyzing DES, and are
very similar to DES in structure. The LOKI
named for Loki.
LOKI89
The cipher uses a 64-bit block anda 64-bit key
a 16-round Feistel cipher andhas a similargeneralstructure,
but differs in the choice of the particular
"straight P-permutation", and the "Expansion permutation".
The S-Boxes use the non-linearitycriteriadeveloped byJosef
Pieprzyk, making them as "complex" and "unpredictable" as
possible. Their effectiveness was compared against the
known design criteria forthe DES S-boxes.Thepermutations
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com
26650 | Volume – 3 | Issue – 5 | July - August
bit plain text block is
handed over to initial permutation (IP) function.
The initial permutation is performed on plain text.
The initial permutation produces two halves of
) and Right plain text
goes through 16 rounds of the
encryption process, each with its own key.
The single round of DES is shown in Fig. 2. These steps are
bit key, a different 48-bit sub-key is
n.
Using the expansion permutation, the R0 is expended
bit key is XORed with 48-bit Ki and the
box substitution producethe32-bitfrom48-
its are permuted using straight P-box
box output 32 bits are XORed with the
The result of the XORed 32 bits becomes the R1 and old
called as swapping.
next roundandperformed
After the completionof16rounds,thefinal permutation
DES
symmetric-
designed as possible replacements for
(DES). The ciphers were
developed based on a body of work analyzing DES, and are
algorithms were
key.Like DES, itis
andhas a similargeneralstructure,
but differs in the choice of the particular S-boxes, the
permutation", and the "Expansion permutation".
linearitycriteriadeveloped byJosef
Pieprzyk, making them as "complex" and "unpredictable" as
possible. Their effectiveness was compared against the
.Thepermutations
were designed to "mix" the outputs of the
as possible, promoting the avalanche and completeness
properties, essential for a good
unlike their equivalents in the DES, they are intended to be
as clean and simple as possible, aiding the analysis of the
design.
Following the publication of LOKI89
new differential cryptanalysis
resulted in the design being changed to become LOKI91.
LOKI91
LOKI91 was designed in response to the attacks on LOKI89.
The changes included removing the initial and final
whitening, a new S-box, and small alterations to the
schedule. More specifically, the S
minimize the probability of seeing different inputs resulting
in the same output (a hook which
cryptanalysis uses), thus improving LOKI91's immunity to
this attack. The changes to the key schedule were designed
to reduce the number of "equivalent" or "related" keys,
which resulted in the exhaustive search space for the cipher
being reduced.
Whilst the resulting cipher is clearly stronger and more
secure than LOKI89, there are a number of potential attacks.
Consequently these ciphers should be viewed as academic
efforts to advance the field of block cipher design, rather
than algorithms for use. The number of citations and
published critiques suggests this aim has been achieved.
LOKI91 Algorithm
Fig.3 Schematic LOKI91 algorithm
The mechanics of LOKI91 are similar to DES. The data block
then divided into a left half and right half and goes through
16 rounds, much like DES. In each round, the right half is
first XORed with a piece of the key, then through an
expansion permutation.
The 48 bit output is divided into four 12
block is sent through an S-box substitution. Then, thefour8
bits output are recombined to form a single 32
and sent through the permutation. Finally, the right half is
XORed with the left half to become the new right half, and
the right half becomes the new left half. After 16 rounds, the
block is again XORed with the key to produce the ciphertext.
www.ijtsrd.com eISSN: 2456-6470
August 2019 Page 1440
were designed to "mix" the outputs of the S-boxes as quickly
as possible, promoting the avalanche and completeness
properties, essential for a good Feistel cipher. However
unlike their equivalents in the DES, they are intended to be
as clean and simple as possible, aiding the analysis of the
Following the publication of LOKI89, information on the
differential cryptanalysis became available. This
resulted in the design being changed to become LOKI91.
designed in response to the attacks on LOKI89.
The changes included removing the initial and final key
box, and small alterations to the key
. More specifically, the S-boxes were changed to
minimize the probability of seeing different inputs resulting
in the same output (a hook which Differential
uses), thus improving LOKI91's immunity to
this attack. The changes to the key schedule were designed
to reduce the number of "equivalent" or "related" keys,
n the exhaustive search space for the cipher
Whilst the resulting cipher is clearly stronger and more
secure than LOKI89, there are a number of potential attacks.
Consequently these ciphers should be viewed as academic
the field of block cipher design, rather
than algorithms for use. The number of citations and
published critiques suggests this aim has been achieved.
Fig.3 Schematic LOKI91 algorithm
The mechanics of LOKI91 are similar to DES. The data block
then divided into a left half and right half and goes through
16 rounds, much like DES. In each round, the right half is
first XORed with a piece of the key, then through an
The 48 bit output is divided into four 12-bit blocks, and each
box substitution. Then, thefour8-
bits output are recombined to form a single 32-bit number
and sent through the permutation. Finally, the right half is
the left half to become the new right half, and
the right half becomes the new left half. After 16 rounds, the
block is again XORed with the key to produce the ciphertext.
3. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1441
The sub-keys are generated from the key in a straight
forward manner. The 64-bit key is split into a left half and a
right half. This left half is then rotated 12 or 13 bits totheleft
and then every two rounds the left and right halves are
exchanged. As with DES, the same algorithm can be used for
both encryption and decryption, with some modification in
how the sub-keys are used.
C. Analysis of DES and LOKI91 Algorithms
Implementation of DES Algorithm
The procedures of encryption program are as follow:
1. Read a key of any 8 characters.
2. Convert the key from ASCII to binary from, and then
obtain 64-bits input.
3. Change the first 28 bits position by using the first of
permuted choice (PC-1). Then we obtain Ci 28 bits and
the last 28 bits for the second part, so we get Di 28 bits.
4. We should check whether we could use a 1 circular left
shift (1 rotate left) or two circular left shift (2 rotate
left). After these operations, we concatenate the Ci and
Di then obtain CDi 56 bits. Then change the CDi position
by using the permuted choice 2(PC-2), so we get Ki 48
bits.
5. After repeating this operation 16 times, we get 16
number of Ki.
6. Read the input file name and the output file name the
operation.
7. If end of encounter, the process will stop.
8. Read the 8 characters from input files and convert the
ASCII code to binary for, so we obtain the 64 bits input.
Then change position by using initial permutation (IP).
9. The left 32 bits is called left permuted input L0 and the
right 32 bits is called right permuted R0.
10. For J = 1 to 16.
11. L(J) = R(J-1)
12. This R(J-1) is expended from 32 bits to 48 bits by using
the expansion table. The operate XOR calculation of this
R(J-1) 48 bits and K(J) 48 bits and get new nr0 48 bits.
13. Exacts 6 bits from nr0. The first bit and the last bit
represents the row and the middle 4 bits represents the
column of selection function Si. Then we get 4 bits from
Si and after this operation 8 times, we obtain 8 number
of Si. We concatenate S1 to S8 we obtain var32 bits.
14. Change positions in var32 by using the primitive
function (P), and so we obtain 32 bits pvar32.
15. This pvar32 and L(J-1) are subjected to XOR calculation,
thus obtain R(J).
16. Next J. After this operation, get 16 numbers of R(J) and
L(J).
17. Concatenate the last position of R(16), then obtain
preoutput RL64 bits.
18. Operate the initial permutation inverse (IP-1) with RL.
Then obtain the ciphertext 64 bits.
19. Write to a ciphertext 64 bits to output file.
20. Go to step 7.
Implementation of LOKI91 Algorithm
The LOKI91 Algorithm is developed by window XP personal
computer using visual C++ programming language.
1. Read a key of any 8 characters.
2. Convert the key from ASCII to binary from, and then
obtain 64-bits input.
3. Change the first 32 bits position by using the first of
permuted choice (PC-1). Then we obtain Ci 32 bits and
the last 32 bits for the second part, so we get Di 32 bits.
4. After the first round, the rotation of the left sub-key
alternated between 12 and 13 bits totheleft.Then every
two round, the left and right halves are exchanged.
5. After repeating tis operation 16 times, we get 16
number of Ki.
6. Read the input file name and the output file name the
operation.
7. If end of encounter, the process will stop.
8. Read the 8 characters from input files and convert the
ASCII code to binary for, so we obtain the 64 bits input.
Then change position by using initial permutation (IP).
9. The left 32 bits is called left permuted input L0 and the
right 32 bits is called right permuted R0.
10. For J = 1 to 16.
11. L(J) = R(J-1)
12. This R(J-1) is expended from 32 bits to 48 bits by using
the expansion table. The operate XOR calculation of this
R(j-1) 48 bits and K(j) 48 bits and get new nr0 48 bits.
13. Divided into four 12 bit blocks. The two left-most bits
and the two right-most bits represent the row and the
middle 8 bits represent the column of selection function
Si. Then we get 8 bit from Si and after this operation 8
times, we obtain 8 number of Si.
14. Change positions in var 32 by using the primitive
function (P), and so we obtain 32 bits pvar 32.
15. This pvar 32 and L(J-1) are subjectedtoXORcalculation,
thus obtain R(J).
16. Next J. After this operation, get 16 numbers of R(J) and
L(J).
17. Concatenate the last position of R(16), then obtain
preoutput RL64 bits.
18. Operate the initial permutation inverse (IP-1) with RL.
Then obtain the ciphertext 64 bits.
19. Write to a ciphertext 64 bits to output file.
20. Go to step 7.
Index of Coincidence (IC)
The index of coincidence IC, measures the variation in the
frequencies of letters in the ciphertext.Iftheperiodofcipher
is one (1), that is simple substitution has been used, there
will be considerable variation in the letter frequencies of IC
will be high. As the period increase,thevariationis gradually
eliminated (due to the diffusion) and IC is low.
Let the length of the text be N and let the size of the alphabet
be n. Consider the i-th letter ai in the alphabet.
Suppose ai appears in the given text Fi times. Since the
number of ai's in the text is Fi, picking the
first ai has Fi different choices and picking the second ai has
only Fi-1 different choices because one ai has been selected.
Since there are N(N-1) different ways of picking two
characters from the text, the probability of having two ais is
Since the alphabet has n different letters and the above
applies to each of them, the probability of having two
identical letters from the text is’
4. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1442
Therefore, the index of coincidence is:
English has n = 26 letters.
D. Experimental and Simulation Analysis
We analyzed the two algorithms withEnglishtexts and these
texts are selected randomly. And then input file sizes are
used from small to large size. Different samples yieldslightly
different result. We analyzed the performance of these
algorithms by computing Index of Coincidence (IC) andtime
efficiency.
TABLE1 ENCRYPTION AND DECRYPTION EXECUTION TIME
Input File Size(Bytes)
Encryption Execution
Time(Seconds)
Decryption Execution
Time(Seconds)
DES LOKI91 DES LOKI91
100 0.12 0.11 0.14 0.13
500 0.14 0.12 0.16 0.15
2000 0.15 0.13 0.17 0.14
5000 0.14 0.12 0.15 0.12
10000 0.16 0.14 0.18 0.15
TABLE2 INDEX OF COINCIDENCE (IC)
Input File Size(Bytes) Index of Coincidence (IC) for Plaintext Index of Coincidence (IC) for Ciphertex
DES LOKI91 DES LOKI91
100 0.959604 0.959604 0.067401 0.067522
500 0.955932 0.955932 0.081535 0.082189
2000 0.961995 0.961995 0.089604 0.090311
5000 0.976799 0.976799 0.102679 0.103218
10000 0.982129 0.982129 0.097445 0.100812
TABLE 1 represents the five different sizes of files and corresponding encryption and decryption execution time taken by DES
and LOKI91 algorithms in seconds. By analyzing the TABLE 1, we conclude that the encryption and decryption time taken by
LOKI91 is slightly small as compare to DES. These comparisons are shown in Fig.4.
TABLE 2 represents the five different sizes of files and corresponding IndexofCoincidence(IC)byDESandLOKI91 algorithms.
By analyzing the table 2, we conclude that the IC for ciphertext by LOKI91 is large as compare to DES. These comparisons are
shown in Fig.5.
(a) (b)
Fig. 4 Execution Time for (a) Encryption (b) Decryption
Fig. 5 Index of Coincidence (IC) for Ciphertext
5. International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1443
E. CONCLUSIONS
This paper presents the performance evaluation of
cryptographic algorithms for various types of files. we have
studied that the encryption and decryption execution time
consumed by DES algorithm is not quite different for some
sort of message compared to LOKI91 algorithm. Index of
Coincidence (IC) for the ciphertext byDESis smallerthan the
LOKI91. Thus, the performance of DES is very good as
compared to LOKI91.
References
[1] Rishabh Arora Sandeep Sharma, PhD, “Performance
Analysis of Cryptography Algorithms”, International
Journal of Computer Applications (0975 – 8887)
Volume 48– No.21, June 2012.
[2] Sombir Singh1 , Sunil K Maakar 2 and Dr. Sudesh
Kumar3, “A Performance Analysis of DES and RSA
Cryptography”, International Journal of Emerging
Trends & Technology in Computer Science (IJETTCS),
Volume 2, Issue 3, May – June 2013.
[3] Abdullah Al Hasib, Abul Ahsan Md. Mahmudul Haque,"
A Comparative Study of the Performance and Security
Issues of AES and RSA Cryptography", Third
International Conference on Convergence and Hybrid
Information Technology,2008.
[4] William Stallings, “CryptographyandNetwork Security
Principles and Practices.” Prentice Hall, November 16,
2005.
[5] A. Nadeem, "A performance comparison of data
encryption algorithms", IEEE information and
communication technologies, pp.84-89, 2006.Bn
[6] Gaurav Shrivastava, “Analysis ImprovedCryptosystem
Using DES with RSA.” VSRDIJCSIT, Vol. 1 (7), 465-470,
2011.
[7] Charels Connell, “An Analysis of New DES: A Modified
Version of DES”, Locust Street Burlington, USA, Boston
MA 02215 USA.