CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Performance Analysis of DES and Triple DES

by O. Srinivasa Rao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 14
Year of Publication: 2015
Authors: O. Srinivasa Rao
10.5120/ijca2015907190

O. Srinivasa Rao . Performance Analysis of DES and Triple DES. International Journal of Computer Applications. 130, 14 ( November 2015), 30-34. DOI=10.5120/ijca2015907190

@article{ 10.5120/ijca2015907190,
author = { O. Srinivasa Rao },
title = { Performance Analysis of DES and Triple DES },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 14 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 30-34 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number14/23279-2015907190/ },
doi = { 10.5120/ijca2015907190 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:25:34.726499+05:30
%A O. Srinivasa Rao
%T Performance Analysis of DES and Triple DES
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 14
%P 30-34
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the fast progression of digital data exchange in electronic way, information security is becoming much more important in data storage and transmission. Cryptography has come up as a solution which plays a vital role in information security system against malicious attacks. The cryptography is most important aspect of communications security and becoming an important building block for computer security. This security mechanism uses some algorithms to scramble data into unreadable text which can be only being decoded or decrypted by party those possesses the associated key. These algorithms consume a significant amount of computing resources such as CPU time, memory and computation time. This paper analyses the performance of DES & 3DES which are widely used symmetric encryption algorithms i.e. Data Encryption Standard (DES) and triple Data Encryption Standard (3DES) in terms of time computation of encryption and decryption as well as avalanche effect of the both algorithms

References
  1. William Stallings, “Cryptography and network Security: Principles and Practice”, Pearson Education/Prentice Hall, 5 th Edition.
  2. ISO/IEC 15946-3, Information Technology–Security Techniques–Cryptographic Techniques.
  3. Atul Kahate, “Cryptography and Network Security”, McGrawHill, Second Edition.
  4. Behrouz A Forouzan, “Data Communications and Networking”, Tata McGraw Hill, Fourth Edition
  5. Deepak Kumar Dakate and Pawan Dubey, “Performance comparison of Symmetric Data Encryption Techniques”, International Journal of Advanced Research in Computer Engineering and Technology, Volume 3, No. 8, August 2012, pp. 163-166
  6. Biham, E. and A. Shamir, 1993 Differential Cryptanalysis of the Data Encryption Standard. Springer Verlag Publishing.
  7. Yan Wang and Ming Hu ”Timing evaluation of the known cryptographic algorithms” IEEE International Conference on Computational Intelligence and Security 2009.
  8. National Bureau of Standards - 3-Data Encryption Standard ,FIPS Publication 46, 1977.
  9. A.Nadeem, "A performance comparison of data encryption algorithms", IEEE information and communication technologies, pp.84-89, 2006.Bn
  10. D. Coppersmith, The Data Encryption Standard (DES) and Its strength Against attacks, IBM J. RES. Develop. VOL.38 NO.3 MAY 1994.
  11. Shasi Mehlrotra seth, Rajan Mishra “ Comparative Analysis of Encryption Algorithms For Data Communication”, IJCST Vol. 2, Issue 2, June 2011.
  12. Sriram Ramanujam,Marimutha Karuppiah ”Designing an algorithm with high avalanche effect” International Journal of Computer Science and Network Security, VOL.11 No.1, January 2011
  13. Abdel-Karim Al Tamimi, “Performance Analysis of Data Encryption Algorithms”
  14. Aamer Nadeem, “A Performance Comparison of Data Encryption Algorithm,” IEEE 2005.
  15. Abdul kader, Diaasalama and Mohiv Hadhoud, “Studying the Effect of Most Common Encryption Algorithms,” International Arab Journal of e-technology, Vol.2. No.1.
  16. Data Encryption Standard (DES), FIPS PUB 46-3 - 1999.
  17. Feistel, Cryptography and Computer Privacy, Scientific American, Volume: 28, No.5, 1973.
  18. Grabbe J, Data Encryption Standard: The Triple DES algorithm illustrated Laissez faire city time, Volume: 2, No. 28, and 2003.
  19. Triple Data Encryption Algorithm Modes of Operation, ANSI X9.52 - 1998.
  20. NIST: Advanced Encryption Standard (AES) The Federal Information Processing Standards Publication 197. NIST, November 26, 2001. http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf (20.9.2006)
  21. NIST: Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher. NIST, May 2004. http://csrc.nist.gov/publications/nistpubs/800-67/SP800- 67.pdf (19.9.2006)
  22. NIST: Data Encryption Standard (DES) The Federal Information Processing Standards Publication 46-3. NIST, October 1999. http://www.cerberussystems. com/INFOSEC/stds/fip46-3.htm (19.9.2006)
  23. Network security (second edition) by Kaufman-PerlmanSpeciner
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography DES Triple DES Avalanche effect