2dix-The Student Choice
Log in Register now

Research paper on The improved Data Encryption Standard (DES) Algorithm

I . Introduction
11. Design of the Improved-DES
JII. Cryptographic Analysis
1v. Conclusion
v. Reference

I . Introduction
                           Information security is an important issue in our information society, When we transmit valuable information, it is frequently protected physically through the use of shielded cable, and the like, Such measures do not securely protect information, and they are very expensive and uneconomical. More efficient techniques should be employed[l]. Under the existing circumstances cryptography is evolving as the natural solution to such problems . The DES, one of the most commonly used encryption algorithms, has been considered many problems since its publication in NBSL21.
Because many researchers have been dubious for the lack of disclosure which was due to some trapdoors and hidden weaknesses in the DES, IBA4
published [31 after discussions with the National Security Agency (NSA). According to E31, the differential cryptanalysis was well known to the IBM team that designed the DES in 1974, and the design of the DES considered the cryptanalytic techniques of the differential cryptanalysis which were not revealed in the published report[41. A differential cryptanalysis attack against the DES requires 1015 chosen plaintext messages, an enormous amount[51. But as the process time of cryptanalysis gets shorter because hardware technique has developed rapidly, in the future the DES may be attacked by various kinds of cryptanalysis using parallel process[ll[61~71. Dawson and TavaresL81 published that all of the XOR distribution of S-boxes should be equal, except when the input XOR is zero, in order to the DES is strengthen against the differential cryptanalysis. But Pieprzyk[91 showed that S-boxes with uniform XOR distribution are weaker than multiform XOR distribution against the differential cryptmalysis. We can consider carefully that the DES algorithm should be improved against the differential cryptanalysis. In order ta strengthen the cryptographic security of the DES, this paper offers the following some suggestions:

Read Complete below----->

comments (0)