Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
60 views7 pages

Icaet 036

The document discusses the Data Encryption Standard (DES) algorithm for secure data transmission. DES is a 64-bit block cipher that encrypts data in 64-bit blocks using a 56-bit key. The key generation process and encryption/decryption processes using DES are described.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views7 pages

Icaet 036

The document discusses the Data Encryption Standard (DES) algorithm for secure data transmission. DES is a 64-bit block cipher that encrypts data in 64-bit blocks using a 56-bit key. The key generation process and encryption/decryption processes using DES are described.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

International Journal of Computer Applications (0975 – 8887)

International Conference on Advances in Emerging Technology (ICAET 2016)

Data Encryption Standard Algorithm (DES) for Secure


Data Transmission
Nirmaljeet Kaur Sukhman Sodhi
Research scholar Assistant Professor
BGIET,Sangrur,India BGIET,Sangrur,India

ABSTRACT information could be accessed by the unauthorized user for


Cryptography is a technique for secure data communication. malicious purpose. For the security purpose there is a concept
Encryption is the process of encoding messages in such a way of cryptography. Cryptography provides the security to the
that only authorized parties can read it. Decryption is the data by hiding the data from unauthorized user. It provides a
process of transforming data that has been rendered security by giving a concept of encryption and decryption.
unreadable through encryption back to its unencrypted form. The process of encoding the plaintext into cipher text is called
DES algorithm is a 64 bit block cipher with key of 56 bits. In Encryption and reverse of decoding cipher text to plaintext is
this paper we will discuss the DES technique for secure data called Decryption. This can be done by two techniques i.e by
transmission while maintaining the authenticity and integrity symmetric-key cryptography and asymmetric key
of the message. In this, message is encrypted before the data cryptography. Symmetric key cryptography uses the same key
transmission process starts. The encryption and decryption of for encryption and decryption. But the Asymmetric key
data is done by using the data encryption standard algorithm cryptography uses one key for encryption and another,
[1]. different key for decryption. Secret key cryptography includes
DES, AES, 3DES, IDEA, Blowfish algorithms etc. and public
General Terms key cryptography includes RSA, Digital Signature etc[4].
Your general terms must be any term which can be used for
general classification of the submitted material such as Pattern 2. DATA ENCRIPTION STANDARD
Recognition, Security, Algorithms et. al. ALGORITHM
DES is a block cipher; it encrypts the data in a block of 64
Keywords bits. The key length is 56 bits, initially the key consists of 64
Cryptography, symmetric key, asymmetric key, DES bits. The bit positions 8, 16, 24, 32,40,48,56, 64 are discarded
algorithm from the key length [1].

1. INTRODUCTION
Data Security is the main aspect of secure data transmission
over unreliable network. The conventional methods of
encryption can only maintain the data security. The

Fig 1: Working of DES


DES is based on two fundamental attributes of cryptography: 2. The Initial permutation is performed on the plain text.
Substitution (confusion) and transposition (Diffusion). DES
consists of 16 steps, each of which is called as a Round 3. The initial permutation produce two halves of permuted
Algorithm:- block: Left Plain text (LPT) and Right Plain Text (RPT).

1. In the first step, the initial 64-bit plain text block is 4. Now, each of LPT and RPT goes through 16 rounds of
handed over to the Initial Permutation (IP) function. encryption process, each with its own key:

31
International Journal of Computer Applications (0975 – 8887)
International Conference on Advances in Emerging Technology (ICAET 2016)

a. From the 56-bit key, a different 48-bit Sub-key is f. The output of P-Box is XORed with the LPT which
generated using Key Transformation. is of 32 bits.
b. Using the Expansion Permutation, the RPT is g. The result of the XORed (32 bits) becomes the RPT
expended from 32 bits to 48 bits. and old RPT become the LPT.This process is called
as Swapping.
c. Now, the 48-bit key is XORed with 48-bit RPT and
resulting output is given to the next step. 2.1 Double DES
d. Using the S-box substitution 32-bits are produced Two DES is same as DES but in this some processes are
from 48-bits. repeated two times using two keys i.e. K1 and K2.First the K1
key is applied on the plain text and it is converted into the
e. These 32 bits are permuted using P-Box cipher text and then K2 key is applied to produce the resultant
Permutation. cipher text.

Fig 2: Encryption process using two keys K1 and K2

2.2 Triple DES key K2, and finally with third key K3, where K1, K2 and K3
Triple DES is DES three times, In 3 DES the plain text block are different from each other.
P is first encrypted with a key K1, then encrypted with second

Fig 3: Encryption process in Triple DES with three keys K1 , K2 and K3.

3. KEY GENERATION PHASE 3) Find the value of K1 where K1= C1 || D1. The pipes (||)
The system requires input key (64 bits). This will be indicate concatenation.
converted to binary value and then 56 bit key is produced. 1 4) Concatenate C1 and D1 to achieve 56 bit block and use
bit is placed at every even place and 0 is placed at every odd this as input to the next round to obtain C2 and D2, C3
place of 56 bit block [11]. and D3 and so on .
1) Divide the result into two halves (28 bit each) (C0 and 5) In the 56 bit block, every even bit is substituted with 1
D0) and every odd position is substituted with 0 bit
2) To obtain C1 and D1, perform left shift to the previous
results.

32
International Journal of Computer Applications (0975 – 8887)
International Conference on Advances in Emerging Technology (ICAET 2016)

Fig 4: Key generation process

4. DATA ENCRYPTION two halves, L0, (left) and R0 (right). Each half is of 32 bits in
In data encryption phase first the initial permutation of the length [5].
plain text is generated .The result of permutation is spited into

33
International Journal of Computer Applications (0975 – 8887)
International Conference on Advances in Emerging Technology (ICAET 2016)

Fig 5: DES Encryption

5. DES DECRYPTION
During the first round of the decryption process, the cipher
text is divided into two halves, L2, (left) and R2 (right) .

34
International Journal of Computer Applications (0975 – 8887)
International Conference on Advances in Emerging Technology (ICAET 2016)

Fig 6: DES Decryption

6. RESULTS data is being encrypted/ decrypted. The figure shows that the
system requires input key (64 bits). This will be converted to
6.1 Key generation binary value and then 56 bit key is produce.
Key generation is a process of generating keys for
cryptography. A key is used to encrypt and decrypt whatever

35
International Journal of Computer Applications (0975 – 8887)
International Conference on Advances in Emerging Technology (ICAET 2016)

Fig 7: Key generation


L(left) and R(right) blocks. Each half is 32 bits in length.
6.2 Encryption Final encrypted text is of 64 bits.
The figure shows that Initial permutation of the plain text is
generated .The result of permutation is split into two halves,

Fig 8: Encryption Process

6.3 Decryption
The figure shows that during the first round of the decryption
process, the cipher text is divided into two halves, L(left) and
R(right) blocks. Finally the original text is achieved.

36
International Journal of Computer Applications (0975 – 8887)
International Conference on Advances in Emerging Technology (ICAET 2016)

Fig 9: Decryption Process

7. CONCLUSION AND FUTURE SCOPE [6] Kumar aman, Jakhar Sudesh & Makkar Sunil, (2012),
As we are moving towards the society where automated “Comparative Analysis between DES and RSA
information resources are very much in use , it is very Algorithm’s” International Journal of Advanced Re-
important to provide a secure mechanism for data search in Computer Science and Software Engineering
transmission. DES is now considered to be an insecure ISSN: 2277 128X, vol 2.
technique of encryption for some applications like banking [7] A.Nath, S.Ghosh, M.A.Mallik, (2010), “Symmetric key
system. There are some analytical results which demonstrate cryptography using random key generator” Proceedings
theoretical weaknesses in the cipher. So it becomes very of International conference, Vol-2, P-239-244.
important to augment this algorithm by adding new level of
security to it. In future we can modify this algorithm by [8] P.Saveetha & S.Arumugam, (2012), “Study On
modifying the function implementation ,S- box design and Improvement In RSA Algorithm And Its
replacing the old XOR by new operation . Implementation”, International Journal of Computer &
Communication Technology ISSN (PRINT): 0975 -
8. REFERENCES 7449, Volume-3.
[1] W. Stallings, Cryptography and Network Security:
[9] Shasi Mehlrotra Seth, Rajan Mishra, (2011),
Principles and Practices, 5th ed., Prentice Hall, 1999.
“Comparative Analysis of Encryption Algorithms for
[2] Dr. Mohammed M. Alani ― “Improved DES Security”‖, Data-Communication”, IJCST Vol. 2.
International Multi-Conference On System, Signals and
[10] Diaasalama, Abdul kader, MohiyHadhoud, (2011),
Devices, 2010.
“Studying the Effect of Most Common Encryption
[3] Dhanraj, C.Nandini, and Mohd Tajuddin ― “An Algorithms”, International Arab Journal of e-technology,
Enhanced Approch for Secret Key Algorithm based on vol 2, no.1.
Data Encryption Standard” ,International Journal of
[11] K. Rabah(2005), “Theory and implementation of data
Research And Review in Computer Science,August 2011
encryption standard: A review”, Information Technology
[4] Behrouz A. Forouzan.” Cryptography and Network Journal, 4: 307-325.
Security”. Tata McGraw-Hill, 2007.
[5] Goyal Shivangi, (2012), “A Survey on the Applications
of Cryptography” International Journal of Science and
Technology Volume 1 No. 3.

IJCATM : www.ijcaonline.org
37

You might also like