Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES

  • Rayi SailajaEmail author
  • Ch. Rupa
  • A. S. N. Chakravarthy
Conference paper
Part of the Smart Innovation, Systems and Technologies book series (SIST, volume 77)


Information security is the process of defending information from unauthorized access and loss. Nowadays in most of the organizations, information is accessed through online. So there is a need to safeguard the information from attackers and hackers. Cryptography is the method of storing and transmitting data in an unreadable form so that only indented user can read and process it. There are two categories of cryptography: symmetric key and asymmetric key encryption algorithms. Symmetric key algorithms use single key for both encryption and decryption. RC2, RC4, DES, Triple DES, IDEA etc. are some of eminent existing symmetric key algorithms. In this paper, we tried to enhance the security of DES, which is now considered to be insecure for many applications. We tried to provide double security by adding a random substitution technique before applying EDES algorithm where we modified the round function and increased the number of rounds from 16 to 32. The performance of the proposed technique is compared with traditional DES algorithm by means of avalanche effect and plaintext sensitivity.


Random substitution technique Symmetric encryption DES Round function Avalanche effect 


  1. 1.
  2. 2.
  3. 3.
  4. 4.
    Ayushi : A symmetric key cryptographic algorithm. Int. J. Comput. Appl. 1(15), (0975–8887) (2010)Google Scholar
  5. 5.
    Rakeshkumar, SK.: Performance analysis of data encryption standard algorithm & proposed data encryption standard algorithm. Int. J. Eng. Res. Dev. 7(10), (July 2013)Google Scholar
  6. 6.
  7. 7.
    National Bureau of Standards—Data Encryption Standard. Fips Publication 46, (1977)Google Scholar
  8. 8.
  9. 9.
  10. 10.
    Ren, W.: A hybrid encryption algorithm based on DES and RSA in bluetooth communication.: In: Second International Conference on Modeling Simulation and Visualization Methods (WMSVM) (2010)Google Scholar
  11. 11.
  12. 12.
    Stallings, W.: Cryptography and Network Security: Principles and Practices, 5th edn. Prentice Hall, New York (1999)Google Scholar
  13. 13.
    Kapoor, P., Mohan, P., Kumar, M.: DES (Data Encryption Standard).
  14. 14.

Copyright information

© Springer Nature Singapore Pte Ltd. 2018

Authors and Affiliations

  • Rayi Sailaja
    • 1
    Email author
  • Ch. Rupa
    • 2
  • A. S. N. Chakravarthy
    • 3
  1. 1.Aditya College of Engineering & TechnologySurampalemIndia
  2. 2.VR Siddhartha Engineering CollegeVijayawadaIndia
  3. 3.JNTUKKakinadaIndia

Personalised recommendations