Skip to main content

Redesigned and Reinforced Low-Power Data Encryption Standard Using Hash Codes for High-Speed and High-Secure Applications

  • Conference paper
  • First Online:
  • 925 Accesses

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 7))

Abstract

Data Encryption Standard was the first block cipher which was widely used for 25 years. In this paper, we propose to build a new and strong 128-bit block cipher based on DES which can be safely used wherever DES was used without compromising security. Reinforcing of DES weak areas such as key generation and Static S-boxes and also redesigning with the help of hash codes are proposed to make DES-128 strong enough to competitors. Detailed cryptanalysis is also provided on the new cipher along with other results. Xilinx XC3S500 device of Spartan family is used for hardware.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Data Encryption Standard, FIPS PUB 46, 1977 Jan 15. Available from NTIS; Springfield, VA 22151 USA

    Google Scholar 

  2. Fu L, Pan M (2009) A simplified FPGA implementation based on an improved DES algorithm. In: 3rd International conference on IEEE genetic and evolutionary computing, 2009, WGEC’09, pp 227–230

    Google Scholar 

  3. Wang K (2009) An encrypt and decrypt algorithm implementation on FPGA’s. In: Fifth international conference on IEEE semantics, knowledge and grid, 2009, KG 2009, pp 298–301

    Google Scholar 

  4. Sison AM, Tanguilig BT, Gerardo BD, Byun Y-C (2011) An improved data encryption standard to secure data using smart cards. In: 2011 9th international conference on software engineering research, management and applications (SERA). doi:10.1109/SERA.2011.27

  5. Patterson C (2000) High performance DES encryption in Virtex FPGA’s using JBits. In: 2000 IEEE symposium on field-programmable custom computing machines, pp 113–121

    Google Scholar 

  6. Chueng TP, Yusoff ZM, Sha’ameri AZ (2000) Implementation of pipelined data encryption standard (DES) using Ultera CPLD. In: Proceedings of IEEE TENCON 2000, vol 3, pp 17–21

    Google Scholar 

  7. Pasham V, Trimberger S (2001) High-speed DES and triple DES encryptor/decryptor

    Google Scholar 

  8. Rouvroy G, Standaert F-X, Quisquater J-J, Legat J (2003) Efficient uses of FPGAs for implementations of DES and its experimental linear cryptanalysis. IEEE Trans Comput 52(4):473–482

    Google Scholar 

  9. http://en.wikipedia.org/wiki/Data_Encryption_Standard

  10. FIPS 180-1 (1996) Secure hash standard, US Department of Commerce, Washington D.C. Springer, New York

    Google Scholar 

  11. FIPS 180-2 (2002) Secure hash standard, US Department of Commerce, Washington D.C. Springer, New York

    Google Scholar 

  12. Wang X, Yin YL, Yu H (2005) Finding collisions in the full SHAI. In: Proceedings of Crypto’2005, volume 3621 of Lecture Notes in Computer Science. Springer, Berlin, pp 17–36

    Google Scholar 

  13. Coppersmith D (1994) The Data Encryption Standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243. doi:10.1147/rd.383.0243

    Article  MATH  Google Scholar 

  14. http://en.wikipedia.org/wiki/Differential_cryptanalysis

  15. Biham E, Shamir A (1993) Differential cryptanalysis of the full 16-round DES. In: Lecture notes in computer science: advances in cryptology—proceedings of CRYPTO ‘92, Springer, Berlin, pp 487–496. See also Biham E, Shamir A (1993) Differential cryptanalysis of the data encryption standard. Springer, Berlin

    Google Scholar 

  16. http://en.wikipedia.org/wiki/Linear_cryptanalysis

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Thrived Dharbhashayanam .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dharbhashayanam, T., Manjunatha Chari, K., Dharbhashayanam, P. (2018). Redesigned and Reinforced Low-Power Data Encryption Standard Using Hash Codes for High-Speed and High-Secure Applications. In: Saini, H., Singh, R., Reddy, K. (eds) Innovations in Electronics and Communication Engineering . Lecture Notes in Networks and Systems, vol 7. Springer, Singapore. https://doi.org/10.1007/978-981-10-3812-9_1

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-3812-9_1

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-3811-2

  • Online ISBN: 978-981-10-3812-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics