You are on page 1of 7

Nagar Yuwak Shikshan Sanstha’s

Yeshwantrao Chavan College of Engineering


(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering

Academic Session 2022-2023


Semester VII

Name of Activity: Research Paper Based Case Study

Topic
DES Algorithm

Author : Wang Yihan, Li Yongzhen


Network Communication and Information Security Lab.Dept. Of
Computer Science & Technology Yanbian University Yanji, China

Name of student: Prachi Jichkar


Roll no: 221
Name of Course Teacher: Prof. Rashmi Keote
Course Name: Data Compression and Encryption
Date of submission: 23/11/22

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur
Nagar Yuwak Shikshan Sanstha’s
Yeshwantrao Chavan College of Engineering
(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering

Case Study

INTRODUCTION:

DES is a typical representative of block ciphers and the first standard


algorithm being published. At present, because the key length of the DES
algorithm is too short, the DES algorithm is no longer secure and is
gradually being replaced by AES. However, in order to make DES, which is
an excellent encryption algorithm, continue to play its role, scholars have
made endless improvements to DES. DES (Data Encryption Algorithm, DEA)
encryption algorithm is the most widely used data encryption system. It was
established by the National Bureau of Standards (NBS) in 1977, which is
now the National Institute of Standards and Technology (National Institute
of Standards and Technology, NIST) adopted as the Federal Information
Processing Standard46. What we pointed by DES actually refers to Data
Encryption Algorithm.

KEY ISSUE:

To address issues in security & the threat posed to the DES algorithm by
brute force cracking, as well as the low efficiency of the 3DES algorithm, I
propose extending the length of the DES algorithm's key. First, change the
block length of the DES algorithm from 64 bits to 128 bits and expand the
key length of the DES algorithm to double length; secondly, iterative
encryption is performed according to the new plaintext grouping and the
expanded key length. The two groups are iteratively encrypted, and after
every single iteration the two sets of R part data obtained from this round of
encryption are exchanged, and then the next round of iteration; finally, the
improved DES algorithm is compared with the DES algorithm and the 3DES
algorithm by experiment. The results showing that the operating efficiency of
the improved DES algorithm is better than 3DES algorithm. Therefore, the
improved algorithm is proposed here greatly improves the security of the
algorithm under the premise of ensuring operating efficiency and has good
application value.

ANALYSIS OF CASE:

A. Symmetric encryption algorithm

Symmetric encryption algorithm is an earlier encryption algorithm and the


technology is relatively mature. In the algorithm, the sender needs to
perform the special encryption algorithm to process the plaintext and the
key to make it unrecognizable ciphertext and transmit it. After received the

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur
Nagar Yuwak Shikshan Sanstha’s
Yeshwantrao Chavan College of Engineering
(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering
ciphertext, the receivers have to use the same key and the inverse operation
of the encryption algorithm to process the ciphertext to obtain the
corresponding plaintext. In a symmetric encryption algorithm, both parties
of the communication are use the same key for encryption and decryption
operations. The characteristics of the symmetric encryption algorithm are
algorithm disclosure, small amount of calculation, fast encryption speed,
and high encryption efficiency, but the disadvantage is that both parties of
the communication have to keep the key that only they know , which make
the key management difficulty, especially in the environment of multi-
person communication, the number of keys increases sharply, giving the key
management a huge burden. Symmetric encryption algorithms are mainly
includes the following contents: DES algorithm, 3DES algorithm, TDEA
algorithm, Blowfish algorithm, RC5 algorithm, IDEA algorithm.

B. Principle of DES encryption algorithm

DES is a symmetric encryption algorithm. It has two inputs, plain texts and
keys. The length of the plaintext and the keys are both 64 bits, and 56 of
them are valid keys, and the remaining 8 bits are the parity bit[4]. The
following figure is flow of the schematic diagram of the DES algorithm.

The processing steps for plaintext are as follows :

Step1 Enter the plaintext into groups according to the 64bits packet length,
and then rearrange the 64bits data block P through the initial permutation
IP matrix.

Step2 Use the f function to perform 16 rounds of iterative transformation of


P after the initial permutation IP matrix transformation, and each round of
transformation needs to use a different subkey.

Step3 The 16th round output has 64bits, which is a function of the input
plaintext and the key. It produces a 64bits data block as the result of this

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur
Nagar Yuwak Shikshan Sanstha’s
Yeshwantrao Chavan College of Engineering
(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering
group of encryption through the inverse initial replacement IP-1 effect of the
initial replacement IP.

The formula for the i-th round of encryption above process can be expressed
as:

LEiREi-1

REiLEi-1ͰF(REˈK)

About the implementation details of the DES algorithm and the change of
the f function:

Step1: The R0 is extended by E box, and the length of R0 is changed from


32 bits to 48 bits.

Step2: XOR the R0 and the 48-bit subkey after the E-box expansion.

Step3: R0 after XOR operation with the sub items undergoes S-box
conversion. Step4: The R0 has undergone the S box transformation is
subjected to P box transformation.

The following figure shows sub-key generation process, the specific steps are
as follows :

Step1: The initial key of the DES algorithm has 64 bits, which is divided into
a matrix. Since the 8th bit of each row in the matrix is the check digit, the
8th bit of each row is discarded.

Step2 After discarding the check digit, the sub-key has 56 bits in total and
the 56-bit sub-key is replaced by selection 1, the result obtained is still 56
bits.

Step3 Divide the obtained 56-bits sub-keys into two groups with 28 bits of
each and move the two groups of subkeys to the left circular manner.

Step4: The shifted two sets of 28bits data are replaced by selection 2, each
group of 24bits data is filtered, and the two screening sets of data are
combined into 48bits as the subkey of the i-th round.

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur
Nagar Yuwak Shikshan Sanstha’s
Yeshwantrao Chavan College of Engineering
(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering

Basic principles of improved algorithm

Figure 3 shows the main encryption process of the improved DES algorithm.

Step1 The length of the plaintext packet is changed from the original 64bits
to 128bits.

Step2 Divide the data of each group of 128 bits into the left group L and the
right group R, each group is 64 bits.

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur
Nagar Yuwak Shikshan Sanstha’s
Yeshwantrao Chavan College of Engineering
(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering
Step3 The left group L and the right group R are respectively encrypted with
two different sets of keys Kl and Kr.

Step4 The two sets of data obtained after each iteration: the Ll part in the
left packet L and the Lr part in the right packet R are exchanged, and the
exchanged result is used as the input of the next iteration to continue
encryption. By analogy, the results of each iteration are exchanged.

Step5 Perform 16 rounds of iterative transformation according to process


above and merge the transformation results into a data block with a length
of 128 bits as the result of this group of encryptions.

ALGORITHM EFFICIENCY:

Algorithm efficiency refers to the execution time of the algorithm, and the
execution time of the algorithm needs to be measured by the time consumed
when the program compiled according to the algorithm runs on computers.
From the perspective of algorithm structure and theoretical analysis, the
execution efficiency of the improved DES algorithm proposed in this article
will be similar to DES algorithm itself. In the improved algorithm, although
the improved algorithm encryption requires two DES encryptions, the
improvement is the encryption algorithm reads a 128-bit data stream while
reading. Compared with DES reading a 64-bit data stream, the improved
encryption algorithm and the DES encryption algorithm are both perform
when encrypting the same block of plaintext. Encrypted once, so
theoretically, the improved encryption algorithm and the DES algorithm has
the same encryption efficiency.

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur
Nagar Yuwak Shikshan Sanstha’s
Yeshwantrao Chavan College of Engineering
(An Autonomous Institution affiliated to Rashtrasant Tukadoji Maharaj Nagpur University)
Hingna Road, Wanadongri, Nagpur - 441 110
Department of Electronics & Telecommunication Engineering

CONCLUSION

The improved DES algorithm proposed here increases the security of the
algorithm from the three aspects of increasing the packet length, key length
and the exchange of each round of iterative results. The algorithm efficiency
is much higher than the 3DES algorithm, and the security is compared with
the original DES. The algorithm is still better. Therefore, the method
proposed here has nice application value. In the future research, further
research will be conducted on the efficiency of the algorithm to make a
better improve of algorithm.

REFERENCES

[1] Liu Haifeng, Cao Yumo, Liang Xingliang. Research on improved DES
based on stream cipher[J]. Computer Applications and Software, 2019,
36(09): 317-320.

[2] He Yongcheng. Hardware research and implementation of symmetric


cipher AES/3DES pass cipher[D]. Tsinghua University, 2018.

[3] Wang Ge. Research on network information encryption method based on


3DES algorithm [J]. Information and Computer (Theoretical Edition), 2020,
32(16): 56-57.

[4] Yu Wei. Research on the key extension method and security of DES
algorithm [D]. Central China Normal University, 2019.

[5] Arash Moghadami, Behbood Moghadam Naghdi Shekardasht,


Mohammad Taghipour. Implementation of Software-Efficient DES Algorithm.
2015, 3(3)

[6] Yu Wei. Research on the key extension method and security of DES
algorithm [D]. Central China Normal University, 2019

[7] Shruti Kumari, Gautam Kumar. Comparison of AES and DES Algorithm.
2015, 6(1):144-146.

Department of Electronics & Telecommunication Engineering,


Yeshwantrao Chavan College of Engineering, Nagpur

You might also like