Skip to main content

Parallel DES with Modified Mode of Operation

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 989))

Abstract

In this paper, we tried to model parallel version of Data Encryption Standard (DES) by means of the modified mode of operation. Block size specifications followed by DES have been adopted too. Design configuration has shown serialized intermediate key generation and parallelized operations on plaintext blocks, which indicate faster encryption as compared to the standard one. We have performed various statistical tests suggested in the literature for conforming security of the proposed model. Also, case studies on potential vulnerabilities have been shown. Comparative analysis with the standard DES has revealed that the proposed parallel DES is more secure due to inter-block data dependency of keys and serialized decryption besides faster encryption. We have concluded our work with future directives.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Alabaichi, A., Ahmad, F., Mahmod, R.: Security analysis of blowfish algorithm. In: 2013 Second International Conference on Informatics and Applications (ICIA), pp. 12–18. IEEE (2013)

    Google Scholar 

  2. Beletskyy, V., Burak, D.: Parallelization of the data encryption standard (DES) algorithm. In: Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, pp. 23–33 (2005)

    Google Scholar 

  3. Bielecki, W., Burak, D.: Parallelization of standard modes of operation for symmetric key block ciphers. In: Biometrics, Computer Security Systems and Artificial Intelligence Applications, pp. 101–110. Springer (2006)

    Google Scholar 

  4. Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer Science & Business Media (2012)

    Google Scholar 

  5. Chandrasekaran, J., Subramanyan, B., Raman, G.: Ensemble of blowfish with chaos based s box design for text and image encryption. Int. J. Netw. Secur. Its Appl. 3(4), 165–173 (2011)

    Google Scholar 

  6. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)

    Article  Google Scholar 

  7. Courtois, N.T., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Proceedings of the 11th IMA International Conference on Cryptography and Coding, pp. 152–169. Springer-Verlag (2007)

    Google Scholar 

  8. Daemen, J., Rijmen, V.: The design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013)

    Google Scholar 

  9. Doganaksoy, A., Ege, B., Koçak, O., Sulak, F.: Cryptographic randomness testing of block ciphers and hash functions. IACR Cryptol. ePrint Arch. 2010, 564 (2010)

    MATH  Google Scholar 

  10. Dworkin, M.J.: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. Technical report (2007)

    Google Scholar 

  11. Ichikawa, T., Kasuya, T., Matsui, M.: Hardware evaluation of the aes finalists. AES Candidate Conf. 2000, 279–285 (2000)

    Google Scholar 

  12. Jose, J.J.R., Raj, D.E.G.D.P.: PACMA—An adaptive symmetric cryptographic algorithm for parallel computing environments. In: The Proceedings of the Fifth International Conference on Advances in Recent Technologies in Communication and Computing, Bangalore, India (2013)

    Google Scholar 

  13. Juremi, J., Mahmod, R., Sulaiman, S.: A proposal for improving AES S-box with rotation and key-dependent. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 38–42. IEEE (2012)

    Google Scholar 

  14. Kim, H.W., Lee, S.: Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Trans. Consum. Electron. 50(1), 214–224 (2004)

    Article  MathSciNet  Google Scholar 

  15. Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Annual International Cryptology Conference, pp. 17–25. Springer (1994)

    Google Scholar 

  16. Mahmoud, E.M., Abd, A., Hafez, E., Elgarf, T.A., et al.: Dynamic AES-128 with key-dependent S-box (2013)

    Google Scholar 

  17. Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: ICSPC 2007. IEEE International Conference on Signal Processing and Communications, 2007, pp. 65–68. IEEE (2007)

    Google Scholar 

  18. Matsui, M.: Linear cryptanalysis method for des cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 386–397. Springer (1993)

    Google Scholar 

  19. Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Annual International Cryptology Conference, pp. 1–11. Springer (1994)

    Google Scholar 

  20. Maximov, A.: Some words on cryptanalysis of stream ciphers. Lund Univeristy, Department of Information Technology (2006)

    Google Scholar 

  21. Menezes, A.J., Van Oorschot, P.C., Vanstone, S.: Chapter 9: Hash functions and data integrity, pp. 321–383. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1997)

    MATH  Google Scholar 

  22. Merkle, R.C., Hellman, M.E.: On the security of multiple encryption. Commun. ACM 24(7), 465–467 (1981)

    Article  MathSciNet  Google Scholar 

  23. Mohammad, F.Y., Rohiem, A.E., Elbayoumy, A.D.: A novel s-box of AES algorithm using variable mapping technique. In: Proceedings of the 13th International Conference on Aerospace Sciences and Aviation Technology, pp. 1–10 (2009)

    Article  Google Scholar 

  24. Mukherjee, S., Sahoo, B.: A survey on hardware implementation of idea cryptosystem. Inf. Secur. J.: Glob. Perspect. 20(4–5), 210–218 (2011)

    Google Scholar 

  25. Pionteck, T., Staake, T., Stiefmeier, T., Kabulepa, L.D., Glesner, M.: Design of a reconfigurable AES encryption/decryption engine for mobile terminals. In: ISCAS’04. Proceedings of the 2004 International Symposium on Circuits and Systems, 2004, vol. 2, pp. II–545. IEEE (2004)

    Google Scholar 

  26. PUB, N.F.: 81-des modes of operation (1980)

    Google Scholar 

  27. Rapeti, S.A.: Nlfs: a new non-linear feedback stream cipher. Indian Institute of Technology (2008)

    Google Scholar 

  28. Schaefer, E.F.: A simplified data encryption standard algorithm. Cryptologia 20(1), 77–84 (1996)

    Article  Google Scholar 

  29. Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)

    Article  MathSciNet  Google Scholar 

  30. Shannon, C.E.: Communication theory of secrecy systems. MD Comput. 15(1), 57–64 (1998)

    Google Scholar 

  31. Smid, M.E., Branstad, D.K.: Data encryption standard: past and future. Proc. IEEE 76(5), 550–559 (1988)

    Article  Google Scholar 

  32. Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)

    Google Scholar 

  33. Stamp, M.: Information Security: Principles and Practice. Wiley, New York (2011)

    Book  Google Scholar 

  34. Standard, D.E., et al.: Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce (1977)

    Google Scholar 

  35. Van Oorschot, P.C., Wiener, M.J.: A known-plaintext attack on two-key triple encryption. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 318–325. Springer (1990)

    Google Scholar 

  36. Voydock, V.L., Kent, S.T.: Security mechanisms in high-level network protocols. ACM Comput. Surv. (CSUR) 15(2), 135–171 (1983)

    Article  MathSciNet  Google Scholar 

  37. Weeks, B., Bean, M., Rozylowicz, T., Ficke, C.: Hardware performance simulations of round 2 advanced encryption standard algorithms. In: AES Candidate Conference, pp. 286–304 (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Payal Prajapati .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Chaudhari, K., Prajapati, P. (2020). Parallel DES with Modified Mode of Operation. In: Choudhury, S., Mishra, R., Mishra, R., Kumar, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 989. Springer, Singapore. https://doi.org/10.1007/978-981-13-8618-3_84

Download citation

Publish with us

Policies and ethics