Enhanced Data Encryption Standard (DES) Algorithm based on Filtering and Striding Techniques

Data Encryption Standard (DES) is the most widely used symmetric-key algorithm for encryption algorithm. Different attacks like brute force and cryptanalysis attack can be used to break DES due to its small key size and simple and uniform distribution XOR operation. With the issues mentioned above, this paper proposes modification to enhance DES against these various attacks. The proposed enhancement used f-function by incorporating striding techniques instead of just performing the XOR operation between 56- bit sub key and the plaintext. The security against the known exhaustive attack and cryptanalysis attack was enhanced. The enhanced DES have been evaluated and compared against original DES using avalanche effect. Enhanced DES resulted to an average of avalanche effect of 55% due to one-bit vibration in plaintext.

[1]  Mukta Sharma,et al.  DES: The oldest symmetric block key encryption algorithm , 2016, 2016 International Conference System Modeling & Advancement in Research Trends (SMART).

[2]  Peter Jorgensen,et al.  Applied cryptography: Protocols, algorithm, and source code in C: By Bruce Schneier. New York: John Wiley, 1993. 618 p. $44.95 (paper). ISBN 0-471-59756-2 , 1996 .

[3]  Archana K. Rajan,et al.  DES security enhancement with dynamic permutation , 2015, 2015 International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT).

[4]  Priyadarshini Patila,et al.  A Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish , 2016 .

[5]  Rimpi Debnath,et al.  DES, AES AND TRIPLE DES: SYMMETRIC KEY CRYPTOGRAPHY ALGORITHM , 2014 .

[6]  Fatih Özkaynak,et al.  Alternative substitutional box structures for DES , 2018, 2018 6th International Symposium on Digital Forensic and Security (ISDFS).

[7]  Qifu Tyler Sun,et al.  A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense , 2018, IEEE Access.

[8]  Sunita Prasad,et al.  Security Enhancement in Data Encryption Standard , 2009, ICISTM.

[9]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[10]  B. B. Zaidan,et al.  New Comparative Study Between DES, 3DES and AES within Nine Factors , 2010, ArXiv.

[11]  Yung-Cheol Byun,et al.  Implementation of Improved DES Algorithm in Securing Smart Card Data , 2012, ICONS 2012.

[12]  Pankaj Rohatgi,et al.  Introduction to differential power analysis , 2011, Journal of Cryptographic Engineering.

[13]  Luigi Lo Iacono Understanding Cryptography , 2018, CCNA® Security Study Guide.

[14]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[15]  Priyadarshini Patil,et al.  A Comprehensive Evaluation of Cryptographic Algorithms , 2016 .

[16]  Salwa Elramly,et al.  DES algorithm security fortification using Elliptic Curve Cryptography , 2015, 2015 Tenth International Conference on Computer Engineering & Systems (ICCES).

[17]  Andrey Bogdanov,et al.  Biclique Cryptanalysis of the Full AES , 2011, ASIACRYPT.

[18]  Shadi Aljawarneh,et al.  Comprehensive study of symmetric key and asymmetric key encryption algorithms , 2017, 2017 International Conference on Engineering and Technology (ICET).

[19]  Ali Chehab,et al.  S-DES: An efficient & secure DES variant , 2018, 2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).