Abstract
Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications. Several attacks were imposed on 3DES, and the biggest threat to 3DES is meet in the middle attack. Therefore for long term security, it is essential to enhance the security of such algorithms. This paper proposed a new cipher DeCrypt inspired by 3DES, an improved version of the 3DES algorithm, and secured against meet in the middle attack. As per the experiment performed, DeCrypt cipher is 61 per cent faster than 3DES, providing long-term and better security against sweet-32 attacks than other symmetric algorithms. The proposed algorithm is also faster than 3DES due to reduced encryption and decryption time.
Similar content being viewed by others
Data Availability
Data sharing not applicable to this article as no datasets were generated or analysed during the current study.
References
Ahmed Usman, Lin Jerry Chun-Wei, Srivastava Gautam (2021) Privacy-preserving deep reinforcement learning in vehicle adhoc networks. IEEE Consumer Electronics Magazine 1–1. https://doi.org/10.1109/MCE.2021.3088408
Amorado Ryndel V, Sison Ariel M, Medina Ruji P (2019) Enhanced data encryption standard (des) algorithm based on filtering and striding techniques. In: Proceedings of the 2019 2nd International Conference on Information Science and Systems, ICISS 2019, New York, NY, USA, pp 252–256. Association for Computing Machinery. ISBN 9781450361033. https://doi.org/10.1145/3322645.3322671
Biryukov A (2011) DES-X (or DESX). In: van Tilborg HCA, Jajodia S (eds) Encyclopedia of Cryptography and Security, 2nd edn. Springer, Berlin, p 331. https://doi.org/10.1007/978-1-4419-5906-5_570
De Cannière C (2005) Blowfish. In: van Tilborg HCA (ed) Encyclopedia of Cryptography and Security. Springer, Berlin. https://doi.org/10.1007/0-387-23483-7_34
Chong Bang Yuan, Salam Iftekhar (2021) Investigating deep learning approaches on the security analysis of cryptographic algorithms. Cryptography 5(4). https://doi.org/10.3390/cryptography5040030. ISSN 2410-387X
Chowdhury Deepraj, Dey Ajoy, Anand Harshit, Sengupta Sohang, Chakraborty Sourav (2021) An approach to avoid meet in the middle attack in 2 des. In: Interdisciplinary Research in Technology and Management. CRC Press, pp 602–608
Diffie W, Hellman ME (1977) Special feature exhaustive cryptanalysis of the NBS data encryption standard. Computer 10(6):74–84. https://doi.org/10.1109/C-M.1977.217750
Dwivedi AD (2020) Security analysis of lightweight iot cipher: Chaskey. Cryptogr. 4(3):22. https://doi.org/10.3390/cryptography4030022
Dwivedi AD (2021) BRISK: dynamic encryption based cipher for long term security. Sensors 21(17):5744. https://doi.org/10.3390/s21175744
Koo J, Qureshi NM (2020) Fine-grained data processing framework for heterogeneous iot devices in sub-aquatic edge computing environment. Wireless Pers Commun 116(2):1407–1422. https://doi.org/10.1007/s11277-020-07803-3
Koo J, Qureshi NMF (2021) Fine-grained data processing framework for heterogeneous iot devices in sub-aquatic edge computing environment. Wireless Pers Commun 116(2):1407–1422
Lin JC-W, Srivastava G, Zhang Y, Djenouri Y, Aloqaily M (2021) Privacy-preserving multiobjective sanitization model in 6g iot environments. IEEE Internet Things J 8(7):5340–5349. https://doi.org/10.1109/JIOT.2020.3032896
Lin C-W, Hong T-P, Hsu H-C (2014) Reducing side effects of hiding sensitive itemsets in privacy preserving data mining. Sci World J
Mehmood MS, Shahid MR, Jamil A, Ashraf R, Mahmood T, Mehmood A (2019) A comprehensive literature review of data encryption techniques in cloud computing and iot environment. In: 2019 8th International Conference on Information and Communication Technologies (ICICT), pp 54–59. https://doi.org/10.1109/ICICT47744.2019.9001945
Morris RH Sr., Sloane NJA, Wyner AD (1977) Assessment of the national bureau of standards proposed federal data encryption standard. Cryptologia 1(3):281–291. https://doi.org/10.1080/0161-117791833020
Patil P, Narayankar P, Narayan DC, Meena SM (2016) A comprehensive evaluation of cryptographic algorithms: Des, 3des, aes, rsa and blowfish. Procedia Computer Science 78:617–624. https://doi.org/10.1016/j.procs.2016.02.108 (1st International Conference on Information Security & Privacy 2015. ISSN 1877-0509)
Sanwar Hosen ASM, Sharma PK, Ra I-H, Cho GH (2022) SPTM-EC: A security and privacy-preserving task management in edge computing for iiot. IEEE Trans. Ind. Informatics 18(9):6330–6339. https://doi.org/10.1109/TII.2021.3123260
Semenov Alexander, Zaikin Oleg, Otpuschennikov Ilya, Kochemazov Stepan, Ignatiev Alexey (2018) On cryptographic attacks using backdoors for sat. In: Thirty-Second AAAI Conference on Artificial Intelligence
Siddiqui IF, Qureshi NMF, Chowdhry BS, Uqaili MA (2020) Pseudo-cache-based iot small files management framework in hdfs cluster. Wirel Pers Commun 113(3):1495–1522. https://doi.org/10.1007/s11277-020-07312-3 (. ISSN 0929-6212)
Siddiqui IF, Qureshi NMF, Chowdhry BS, Uqaili MA (2020) Pseudo-cache-based iot small files management framework in hdfs cluster. Wireless Pers Commun 113(3):1495–1522
Singh KN, Singh AK (2022) Towards integrating image encryption with compression: A survey. ACM Trans. Multim. Comput. Commun. Appl. 18(3):891–8921. https://doi.org/10.1145/3498342
Thakur S, Singh AK, Ghrera SP, Elhoseny M (2019) Multi-layer security of medical data through watermarking and chaotic encryption for tele-health applications. Multim. Tools Appl. 78(3):3457–3470. https://doi.org/10.1007/s11042-018-6263-3
Vuppala A, Roshan RS, Nawaz S, Ravindra JVR (2020) An efficient optimization and secured triple data encryption standard using enhanced key scheduling algorithm. Procedia Computer Science 171:1054–1063. https://doi.org/10.1016/j.procs.2020.04.113 (ISSN 1877-0509. Third International Conference on Computing and Network Communications (CoCoNet '19))
Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial internet of things. Comput Ind Eng 164:107903. https://doi.org/10.1016/j.cie.2021.107903
Funding
The work of Ashutosh Dhar Dwivedi is supported by the Independent Research Fund Denmark for Technology and Production under Grant 8022-00348A. Waleed Al-Numay acknowledges financial support from the Researchers Supporting Project number (RSP-2021/250), King Saud University, Riyadh, Saudi Arabia.
Author information
Authors and Affiliations
Corresponding author
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Springer Nature or its licensor holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Chowdhury, D., Dey, A., Garai, R. et al. DeCrypt: a 3DES inspired optimised cryptographic algorithm. J Ambient Intell Human Comput 14, 4745–4755 (2023). https://doi.org/10.1007/s12652-022-04379-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12652-022-04379-7