Advertisement

Study of Symmetric-Key Cryptosystems and Implementing a Secure Cryptosystem with DES

  • H. Santhi
  • P. Gayathri
  • Sanskar Katiyar
  • G. Gopichand
  • Sagarika Shreevastava
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 862)

Abstract

The advancements in communication networks and computation over the years have led to a massive volume of data flowing from one place to another. A lot of cryptosystems have been proposed and implemented to keep the channel of communication secure. But with increasingly powerful computers rolling out every day, more and more complicated systems are being built with moderate data overheads to ensure maximum security over the channel. So, in this paper, we briefly discuss the strengths and weaknesses of the three most popular symmetric-key cryptosystems: AES, DES, and 3DES. It has been supported by the various organizations that it with the computers of today, DES can be broken using brute-force attacks in a reasonable amount of time. Given its simple nature of implementation and small key size, we propose a modified implementation of DES to enhance its security with a minimum computational trade-off.

Keywords

Cryptography Transposition Symmetric key 

References

  1. 1.
    R. Tripathi, S. Agrawal, Comparative study of symmetric and asymmetric cryptography techniques. Int. J. Adv. Found. Res. Comput. 1(6), 68–76 (2014)Google Scholar
  2. 2.
    V.R. Pancholi, B.P. Patel, Cryptography: comparative studies of different symmetric algorithms. Int. J. Technol. Sci. VI(I), 4–7 (2015)Google Scholar
  3. 3.
    D.S. Gordon et al., Complete fairness in secure two-party computation, in Proceedings of the Fourtieth Annual ACM Symposium on Theory of Computing—STOC 08 (2008), p. 413Google Scholar
  4. 4.
    G.B. Agnew et al., An implementation for a fast public-key cryptosystem. J. Cryptol. 3(2), 63–79 (1991)MathSciNetCrossRefGoogle Scholar
  5. 5.
    J. Warjri, KED—a symmetric key algorithm for secured information exchange using modulo 69. Int. J. Comput. Netw. Inf. Secur. 10(August), 37–43 (2013)Google Scholar
  6. 6.
    N. Aleisa, A comparison of the 3DES and AES encryption standards. Int. J. Secur. Appl. 9(7), 241–246 (2015)Google Scholar
  7. 7.
    M. Mathur, A. Kesarwani, Comparison between DES, 3DES, in Proceedings of the National Conference on Horizons IT-NCNHIT (2013), pp. 143–148Google Scholar
  8. 8.
    Z.S. Stanisavljevic, Data encryption standard visual representation, in 2015 23rd Telecommunication Forum Telfor (TELFOR), vol. 7 (2015), pp. 946–953Google Scholar
  9. 9.
    Y.K. Apoorva, Comparative study of different symmetric key cryptography algorithms. Int. J. Appl. Innov. Eng. Manag. 2(7), 204–206 (2013)Google Scholar
  10. 10.
    R. Bala, N.P. Gopalan, Security enhancement using a modified AES algorithm, in Proceedings of the International Conference on Informatics and Analysis (2016), p. 4Google Scholar
  11. 11.
    S. Banerjee, D. Mukhopadhyay, Symmetric key based authenticated querying in wireless sensor networks, in Proceedings of the First International Conference Integrated Internet Ad Hoc and Sensor Networks (2006), pp. 6–9Google Scholar
  12. 12.
    A. Gupta, M. Hussain, Secure session key sharing using public key (2015), pp. 573–576Google Scholar
  13. 13.
    P. Mohit et al., Modification of symmetric-key DES into efficient asymmetric-key DES using RSA (2016), pp. 1–5Google Scholar
  14. 14.
    G.R. Tsouri, J. Wilczewski, Reliable symmetric key generation for body area networks using wireless physical layer security in the presence of an on-body eavesdropper, in Proceedings of the 4th International Symposium on Applied Sciences in Biomedical and Communication Technologies ISABEL’11 (2011), pp. 1–6Google Scholar
  15. 15.
    F. Opritoiu et al., A high-speed AES architecture implementation, in Proceedings of the 7th ACM International Conference Computer and Front Matter (2010), pp. 95–96Google Scholar
  16. 16.
    W.A. Ghnaim, Known-ciphertext cryptanalysis approach for, in International Conference on Computer Information Systems and Industrial Applications (2010), pp. 600–603Google Scholar

Copyright information

© Springer Nature Singapore Pte Ltd. 2019

Authors and Affiliations

  • H. Santhi
    • 1
  • P. Gayathri
    • 1
  • Sanskar Katiyar
    • 1
  • G. Gopichand
    • 1
  • Sagarika Shreevastava
    • 1
  1. 1.School of Computer Science and EngineeringVellore Institute of TechnologyVelloreIndia

Personalised recommendations