Professional Documents
Culture Documents
A Study of Encryption Algorithms (RSA, DES, 3DES and AES) For Information Security
A Study of Encryption Algorithms (RSA, DES, 3DES and AES) For Information Security
33
International Journal of Computer Applications (0975 – 8887)
Volume 67– No.19, April 2013
Ciphers
Classical Modern
Secret-key Public-key
Symmetric- Asymmertic-
Substitution Transposition
key key
AES/
DES 3DES RC4 SEAL
Rijndael
34
International Journal of Computer Applications (0975 – 8887)
Volume 67– No.19, April 2013
35
International Journal of Computer Applications (0975 – 8887)
Volume 67– No.19, April 2013
64-bit ciphertext
Fig 3: General Depiction of DES
Option 1, the preferred option, employs three mutually
independent keys (K1 ≠ K2 ≠ K3 ≠ K1). It gives keyspace of
3 × 56 = 168 bits.
Option 2 employs two mutually independent keys and a third
key that is the same as the first key (K1 ≠ K2 and K3 = K1).
This gives keyspace of 2 × 56= 112 bits.
Option 3 is a key bundle of three identical keys (K1 = K2 =
K3). This option is equivalent to DES Algorithm.
In 3-DES the 3-times iteration is applied to increase the
encryption level and average time. It is a known fact that
3DES is slower than other block cipher methods [11, 18].
36
International Journal of Computer Applications (0975 – 8887)
Volume 67– No.19, April 2013
37
International Journal of Computer Applications (0975 – 8887)
Volume 67– No.19, April 2013
[15] Sriram Ramanujam and Marimuthu Karuppiah, [19] Mr. Gurjeevan Singh, Mr. Ashwani Singla and Mr. K S
"Designing an algorithm with high Avalanche Effect", Sandha, "Cryptography Algorithm Comparison for
IJCSNS International Journal of Computer Science and Security Enhancement in Wireless Intrusion Detection
Network Security, VOL.11 No.1, pp. 106-111, January System", International Journal of Multidisciplinary
2011. Research, Vol.1 Issue 4, pp. 143-151, August 2011.
[16] “DES”, http://www.tropsoft.com/strongenc/des.htm [20] Zilhaz Jalal Chowdhury, Davar Pishva and G. G. D.
Nishantha, “AES and Confidentiality from the Inside
[17] “3DES”, http://www.cryptosys.net/3des.html Out”, the 12th International Conference on Advanced
[18] “3DES”, http://en.wikipedia.org/wiki/Triple_DES Communication Technology (ICACT), pp. 1587-1591,
2010.
38