You are on page 1of 12

Comparison Of AES

and DES
Cryptographic
Algorithm

CONTENTS
1.INTRODUCTION
2. AES ALGORITHM
3. DES ALGORITHM
4.HOW DES WORK IN ATM
5. HOW AES WORK IN ATM
6. COMPARISON OF AES AND DES

INTRODUCTION
Cryptography is used for protection
of information security.
There are various algorithm like
DES,RSA,HASH,MD5,AES,SHA-1
andHMAC.
DES algorithm is developed by IBM .
This algorithm used a 56 bit key to
encipher/decipher a 64 bit block of
data.
In this paper we have compared

Encryption is the process of encoding


the plaintext into cipher text and
Decryption is the process of decoding
cipher text to plaintext.
There are two types of encryption and
decryption technique symmetric key
cryptography and asymmetric key
cryptography .
In symmetric key cryptography sender
and receiver both use same key,But in
asymmetric key cryptography sender
and receiver both uses different key.

DES ALGORITHM

AES ALGORITHM

HOW DES WORK IN ATM

ATM uses secret key ,called the PIN key


,to derive the PIN from the account
number in terms of algorithm known as
DES.
The result is natural PIN ,an offset can
be added to it and then final PIN which
the customer enter
The offset has no cryptographic
function ,it just used for customer to
choose their own PIN.

HOW AES WORK IN ATM

Biometric authentication scheme for ATM


banking system using energy efficient AES
processor .
ATM using DES has been breached 24 hours.
Advanced encryption standard (AES) is recent
and new encryption algorithm.AES support
AES with CBC (cipher block chaining) mode to
IP security .
The AES is replaced by DES.
AES is already used widely because its

COMPARISON OF AES
AND DES
Factors
Developed
Key Size
Block Size
Ciphering
&
decipherin
g key
Scalability

AES
2000
128, 192,
256 bits
128 bits
Same

DES
1977
56 bits

Not
Scalable

It is
scalable
algorithm
due to
varying the

64 bits
Same

Factors
Algorithm

AES
Symmetric
Algorithm

DES
Symmetric
Algorithm

Encryption

Faster

Moderate

Decryption

Faster

Faster

Power
Consumpti
on
Security

Low

Low

Excellent
Secured
Needed

Not Secure
Enough
Needed

Deposit of
keys

Factors
Key Used

AES
Same key
used for
Encrypt
and
Decrypt

DES
Same key
used for
Encrypt
and
Decrypt

Rounds

10/12/14

16

Stimulation
Speed
Hardware
& Software
Implement
ation
Ciphering

Faster

Faster

Faster

Better in
hardware
than in
software
Different

Different

THANK YOU
Presented By:SHRUTI
KUMARI
GAUTAM

You might also like