Abstract
In this paper, we tried to model parallel version of Data Encryption Standard (DES) by means of the modified mode of operation. Block size specifications followed by DES have been adopted too. Design configuration has shown serialized intermediate key generation and parallelized operations on plaintext blocks, which indicate faster encryption as compared to the standard one. We have performed various statistical tests suggested in the literature for conforming security of the proposed model. Also, case studies on potential vulnerabilities have been shown. Comparative analysis with the standard DES has revealed that the proposed parallel DES is more secure due to inter-block data dependency of keys and serialized decryption besides faster encryption. We have concluded our work with future directives.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Alabaichi, A., Ahmad, F., Mahmod, R.: Security analysis of blowfish algorithm. In: 2013 Second International Conference on Informatics and Applications (ICIA), pp. 12–18. IEEE (2013)
Beletskyy, V., Burak, D.: Parallelization of the data encryption standard (DES) algorithm. In: Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, pp. 23–33 (2005)
Bielecki, W., Burak, D.: Parallelization of standard modes of operation for symmetric key block ciphers. In: Biometrics, Computer Security Systems and Artificial Intelligence Applications, pp. 101–110. Springer (2006)
Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer Science & Business Media (2012)
Chandrasekaran, J., Subramanyan, B., Raman, G.: Ensemble of blowfish with chaos based s box design for text and image encryption. Int. J. Netw. Secur. Its Appl. 3(4), 165–173 (2011)
Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)
Courtois, N.T., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Proceedings of the 11th IMA International Conference on Cryptography and Coding, pp. 152–169. Springer-Verlag (2007)
Daemen, J., Rijmen, V.: The design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013)
Doganaksoy, A., Ege, B., Koçak, O., Sulak, F.: Cryptographic randomness testing of block ciphers and hash functions. IACR Cryptol. ePrint Arch. 2010, 564 (2010)
Dworkin, M.J.: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. Technical report (2007)
Ichikawa, T., Kasuya, T., Matsui, M.: Hardware evaluation of the aes finalists. AES Candidate Conf. 2000, 279–285 (2000)
Jose, J.J.R., Raj, D.E.G.D.P.: PACMA—An adaptive symmetric cryptographic algorithm for parallel computing environments. In: The Proceedings of the Fifth International Conference on Advances in Recent Technologies in Communication and Computing, Bangalore, India (2013)
Juremi, J., Mahmod, R., Sulaiman, S.: A proposal for improving AES S-box with rotation and key-dependent. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 38–42. IEEE (2012)
Kim, H.W., Lee, S.: Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Trans. Consum. Electron. 50(1), 214–224 (2004)
Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Annual International Cryptology Conference, pp. 17–25. Springer (1994)
Mahmoud, E.M., Abd, A., Hafez, E., Elgarf, T.A., et al.: Dynamic AES-128 with key-dependent S-box (2013)
Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: ICSPC 2007. IEEE International Conference on Signal Processing and Communications, 2007, pp. 65–68. IEEE (2007)
Matsui, M.: Linear cryptanalysis method for des cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 386–397. Springer (1993)
Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Annual International Cryptology Conference, pp. 1–11. Springer (1994)
Maximov, A.: Some words on cryptanalysis of stream ciphers. Lund Univeristy, Department of Information Technology (2006)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.: Chapter 9: Hash functions and data integrity, pp. 321–383. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1997)
Merkle, R.C., Hellman, M.E.: On the security of multiple encryption. Commun. ACM 24(7), 465–467 (1981)
Mohammad, F.Y., Rohiem, A.E., Elbayoumy, A.D.: A novel s-box of AES algorithm using variable mapping technique. In: Proceedings of the 13th International Conference on Aerospace Sciences and Aviation Technology, pp. 1–10 (2009)
Mukherjee, S., Sahoo, B.: A survey on hardware implementation of idea cryptosystem. Inf. Secur. J.: Glob. Perspect. 20(4–5), 210–218 (2011)
Pionteck, T., Staake, T., Stiefmeier, T., Kabulepa, L.D., Glesner, M.: Design of a reconfigurable AES encryption/decryption engine for mobile terminals. In: ISCAS’04. Proceedings of the 2004 International Symposium on Circuits and Systems, 2004, vol. 2, pp. II–545. IEEE (2004)
PUB, N.F.: 81-des modes of operation (1980)
Rapeti, S.A.: Nlfs: a new non-linear feedback stream cipher. Indian Institute of Technology (2008)
Schaefer, E.F.: A simplified data encryption standard algorithm. Cryptologia 20(1), 77–84 (1996)
Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)
Shannon, C.E.: Communication theory of secrecy systems. MD Comput. 15(1), 57–64 (1998)
Smid, M.E., Branstad, D.K.: Data encryption standard: past and future. Proc. IEEE 76(5), 550–559 (1988)
Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)
Stamp, M.: Information Security: Principles and Practice. Wiley, New York (2011)
Standard, D.E., et al.: Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce (1977)
Van Oorschot, P.C., Wiener, M.J.: A known-plaintext attack on two-key triple encryption. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 318–325. Springer (1990)
Voydock, V.L., Kent, S.T.: Security mechanisms in high-level network protocols. ACM Comput. Surv. (CSUR) 15(2), 135–171 (1983)
Weeks, B., Bean, M., Rozylowicz, T., Ficke, C.: Hardware performance simulations of round 2 advanced encryption standard algorithms. In: AES Candidate Conference, pp. 286–304 (2000)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Chaudhari, K., Prajapati, P. (2020). Parallel DES with Modified Mode of Operation. In: Choudhury, S., Mishra, R., Mishra, R., Kumar, A. (eds) Intelligent Communication, Control and Devices. Advances in Intelligent Systems and Computing, vol 989. Springer, Singapore. https://doi.org/10.1007/978-981-13-8618-3_84
Download citation
DOI: https://doi.org/10.1007/978-981-13-8618-3_84
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-8617-6
Online ISBN: 978-981-13-8618-3
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)