Parallel DES with Modified Mode of Operation

  • Kinjal Chaudhari
  • Payal PrajapatiEmail author
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 989)


In this paper, we tried to model parallel version of Data Encryption Standard (DES) by means of the modified mode of operation. Block size specifications followed by DES have been adopted too. Design configuration has shown serialized intermediate key generation and parallelized operations on plaintext blocks, which indicate faster encryption as compared to the standard one. We have performed various statistical tests suggested in the literature for conforming security of the proposed model. Also, case studies on potential vulnerabilities have been shown. Comparative analysis with the standard DES has revealed that the proposed parallel DES is more secure due to inter-block data dependency of keys and serialized decryption besides faster encryption. We have concluded our work with future directives.


DES CBC Cryptography Parallel encryption 


  1. 1.
    Alabaichi, A., Ahmad, F., Mahmod, R.: Security analysis of blowfish algorithm. In: 2013 Second International Conference on Informatics and Applications (ICIA), pp. 12–18. IEEE (2013)Google Scholar
  2. 2.
    Beletskyy, V., Burak, D.: Parallelization of the data encryption standard (DES) algorithm. In: Enhanced Methods in Computer Security, Biometric and Artificial Intelligence Systems, pp. 23–33 (2005)Google Scholar
  3. 3.
    Bielecki, W., Burak, D.: Parallelization of standard modes of operation for symmetric key block ciphers. In: Biometrics, Computer Security Systems and Artificial Intelligence Applications, pp. 101–110. Springer (2006)Google Scholar
  4. 4.
    Biham, E., Shamir, A.: Differential Cryptanalysis of the Data Encryption Standard. Springer Science & Business Media (2012)Google Scholar
  5. 5.
    Chandrasekaran, J., Subramanyan, B., Raman, G.: Ensemble of blowfish with chaos based s box design for text and image encryption. Int. J. Netw. Secur. Its Appl. 3(4), 165–173 (2011)Google Scholar
  6. 6.
    Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev. 38(3), 243–250 (1994)CrossRefGoogle Scholar
  7. 7.
    Courtois, N.T., Bard, G.V.: Algebraic cryptanalysis of the data encryption standard. In: Proceedings of the 11th IMA International Conference on Cryptography and Coding, pp. 152–169. Springer-Verlag (2007)Google Scholar
  8. 8.
    Daemen, J., Rijmen, V.: The design of Rijndael: AES-the Advanced Encryption Standard. Springer Science & Business Media (2013)Google Scholar
  9. 9.
    Doganaksoy, A., Ege, B., Koçak, O., Sulak, F.: Cryptographic randomness testing of block ciphers and hash functions. IACR Cryptol. ePrint Arch. 2010, 564 (2010)zbMATHGoogle Scholar
  10. 10.
    Dworkin, M.J.: Recommendation for block cipher modes of operation: Galois/counter mode (GCM) and GMAC. Technical report (2007)Google Scholar
  11. 11.
    Ichikawa, T., Kasuya, T., Matsui, M.: Hardware evaluation of the aes finalists. AES Candidate Conf. 2000, 279–285 (2000)Google Scholar
  12. 12.
    Jose, J.J.R., Raj, D.E.G.D.P.: PACMA—An adaptive symmetric cryptographic algorithm for parallel computing environments. In: The Proceedings of the Fifth International Conference on Advances in Recent Technologies in Communication and Computing, Bangalore, India (2013)Google Scholar
  13. 13.
    Juremi, J., Mahmod, R., Sulaiman, S.: A proposal for improving AES S-box with rotation and key-dependent. In: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), pp. 38–42. IEEE (2012)Google Scholar
  14. 14.
    Kim, H.W., Lee, S.: Design and implementation of a private and public key crypto processor and its application to a security system. IEEE Trans. Consum. Electron. 50(1), 214–224 (2004)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Annual International Cryptology Conference, pp. 17–25. Springer (1994)Google Scholar
  16. 16.
    Mahmoud, E.M., Abd, A., Hafez, E., Elgarf, T.A., et al.: Dynamic AES-128 with key-dependent S-box (2013)Google Scholar
  17. 17.
    Manavski, S.A.: CUDA compatible GPU as an efficient hardware accelerator for AES cryptography. In: ICSPC 2007. IEEE International Conference on Signal Processing and Communications, 2007, pp. 65–68. IEEE (2007)Google Scholar
  18. 18.
    Matsui, M.: Linear cryptanalysis method for des cipher. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 386–397. Springer (1993)Google Scholar
  19. 19.
    Matsui, M.: The first experimental cryptanalysis of the data encryption standard. In: Annual International Cryptology Conference, pp. 1–11. Springer (1994)Google Scholar
  20. 20.
    Maximov, A.: Some words on cryptanalysis of stream ciphers. Lund Univeristy, Department of Information Technology (2006)Google Scholar
  21. 21.
    Menezes, A.J., Van Oorschot, P.C., Vanstone, S.: Chapter 9: Hash functions and data integrity, pp. 321–383. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL (1997)zbMATHGoogle Scholar
  22. 22.
    Merkle, R.C., Hellman, M.E.: On the security of multiple encryption. Commun. ACM 24(7), 465–467 (1981)MathSciNetCrossRefGoogle Scholar
  23. 23.
    Mohammad, F.Y., Rohiem, A.E., Elbayoumy, A.D.: A novel s-box of AES algorithm using variable mapping technique. In: Proceedings of the 13th International Conference on Aerospace Sciences and Aviation Technology, pp. 1–10 (2009)CrossRefGoogle Scholar
  24. 24.
    Mukherjee, S., Sahoo, B.: A survey on hardware implementation of idea cryptosystem. Inf. Secur. J.: Glob. Perspect. 20(4–5), 210–218 (2011)Google Scholar
  25. 25.
    Pionteck, T., Staake, T., Stiefmeier, T., Kabulepa, L.D., Glesner, M.: Design of a reconfigurable AES encryption/decryption engine for mobile terminals. In: ISCAS’04. Proceedings of the 2004 International Symposium on Circuits and Systems, 2004, vol. 2, pp. II–545. IEEE (2004)Google Scholar
  26. 26.
    PUB, N.F.: 81-des modes of operation (1980)Google Scholar
  27. 27.
    Rapeti, S.A.: Nlfs: a new non-linear feedback stream cipher. Indian Institute of Technology (2008)Google Scholar
  28. 28.
    Schaefer, E.F.: A simplified data encryption standard algorithm. Cryptologia 20(1), 77–84 (1996)CrossRefGoogle Scholar
  29. 29.
    Shannon, C.E.: Communication theory of secrecy systems. Bell Labs Tech. J. 28(4), 656–715 (1949)MathSciNetCrossRefGoogle Scholar
  30. 30.
    Shannon, C.E.: Communication theory of secrecy systems. MD Comput. 15(1), 57–64 (1998)Google Scholar
  31. 31.
    Smid, M.E., Branstad, D.K.: Data encryption standard: past and future. Proc. IEEE 76(5), 550–559 (1988)CrossRefGoogle Scholar
  32. 32.
    Stallings, W.: Cryptography and Network Security: Principles and Practices. Pearson Education India (2006)Google Scholar
  33. 33.
    Stamp, M.: Information Security: Principles and Practice. Wiley, New York (2011)CrossRefGoogle Scholar
  34. 34.
    Standard, D.E., et al.: Federal information processing standards publication 46. National Bureau of Standards, US Department of Commerce (1977)Google Scholar
  35. 35.
    Van Oorschot, P.C., Wiener, M.J.: A known-plaintext attack on two-key triple encryption. In: Workshop on the Theory and Application of of Cryptographic Techniques, pp. 318–325. Springer (1990)Google Scholar
  36. 36.
    Voydock, V.L., Kent, S.T.: Security mechanisms in high-level network protocols. ACM Comput. Surv. (CSUR) 15(2), 135–171 (1983)MathSciNetCrossRefGoogle Scholar
  37. 37.
    Weeks, B., Bean, M., Rozylowicz, T., Ficke, C.: Hardware performance simulations of round 2 advanced encryption standard algorithms. In: AES Candidate Conference, pp. 286–304 (2000)Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2020

Authors and Affiliations

  1. 1.Institute of TechnologyNirma UniversityAhmedabadIndia

Personalised recommendations