DES- Data Encryption Standard

Page 1

International Research Journal of Engineering and Technology (IRJET) Volume: 04 Issue: 03 | Mar -2017

www.irjet.net

e-ISSN: 2395 -0056 p-ISSN: 2395-0072

DES- Data Encryption Standard Indumathi Saikumar Post Graduate Student, Electronic and Communication Engineering, CMR College of Engineering and Technology, Telangana, India ---------------------------------------------------------------------***--------------------------------------------------------------------2. CRYPTOGRAPHY Abstract - The data encryption standard is also known as DES.DES has been the most extensively used encryption algorithm standard in recent times. Encryption and decryption comprise of cryptography. Cryptography terminology is used in the data encryption standard along with standard algorithm to hide the original text. DES applies the cipher algorithm to each data block. Data encryption is being used to hide the true meaning of data so that it is very hard to attack or crack. This paper deals with the simulation and synthesis results of implemented DES algorithm. Analysis of implementation is shown in step by step process. A test case is analyzed step by step to check the results at each step of the algorithm.

Cryptography is derived from Greek language kryptos means hidden and grafos meaning write or speak which means study of hiding information. It is the science of securing data. Cryptography is a science of using mathematics to encrypt and decrypt data. Cryptography enables to store important data or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient. Cryptography examples include the security of the ATM cards, computer passwords and electronic commerce which all depend upon cryptography.

Key Words: DES, Cryptography, Encryption, Decryption

2.1 Purpose of cryptography

1. INTRODUCTION

Cryptography is necessary when communicating over any medium such as internet. Mostly used for communicating over un-trusted medium. To send information over an untrusted medium there are some specific requirements such as

Data which can be read and understood without any special measures is called as plaintext. Disguising plaintext in such a way to hide its true meaning is called encryption. Encrypting plaintext results in unreadable gibberish form called cipher text. Encryption is done to hide the data from anyone for whom it is not intended. Reverting the cipher text to its original plaintext is called as decryption. DES method is used to store sensitive information or transmit information across insecure networks so that it cannot be read by anyone except the intended recipient.

Authentication: Authentication is a process of identifying an individual, such as based on username and password. Privacy: Privacy is ensuring the sender that the message can be read by the intended receiver and no one else. Integrity: Assuring the receiver that the received message has to been altered in any way from the original. Non-repudiation: It is a method of guaranteeing message transmission between two parties. Successful completion of message sent and received.

3. METHODS OF ENCRYPTION Fig -1: Encryption and decryption Data encryption standard uses cryptographic algorithm that can be used to protect electronic data. There are three methods of encryption standard they are symmetric cryptography, asymmetric cryptography and hash function. DES algorithm makes use of symmetric cryptograph. Block cipher algorithm is used for encryption and decryption purpose and the message is divided into blocks of bits. DES processes the input data (Original message) of block size 64bits and a secret key of 64-bits to provide a 64-bit cipher text.

Š 2017, IRJET

|

Impact Factor value: 5.181

There are several blocks in an encryption method, the two main blocks are the algorithms and the key. Algorithms are the complex mathematical formulas that dictate the rules of how the plaintext will be converted into cipher text. Key is a set of random bits that will be inserted into the algorithm. Two users can communicate via encryption, they must use the same algorithm and the same key. In some encryption cases, the receiver and sender use the same key and in other encryption cases they must use different keys for encryption and decryption process. There are three different methods of encryption namely symmetric asymmetric and hash function method for encryption and decryption.

|

ISO 9001:2008 Certified Journal

|

Page 1777


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.