Performance Analysis of Data Encryption Standard DES
Performance Analysis of Data Encryption Standard DES
Volume 3 Issue 5, August 2019 Available Online: www.ijtsrd.com e-ISSN: 2456 – 6470
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1439
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
The algorithms steps are as follow: were designed to "mix" the outputs of the S-boxes as quickly
1. In the first step, the initial 64-bit
bit plain text block is as possible, promoting the avalanche and completeness
handed over to initial permutation (IP) function. properties, essential for a good Feistel cipher. However
2. The initial permutation is performed on plain text. unlike their equivalents in the DES, they are intended to be
3. The initial permutation produces two halves of as clean and simple as possible, aiding the analysis of the
permuted block: Left plain text (L0) and Right pl
plain text design.
(R0).
4. Each of L0 and R0 goes through 16 rounds of the Following the publication of LOKI89,
LOKI89 information on the
encryption process, each with its own key. new differential cryptanalysis became available. This
resulted in the design being changed to become LOKI91.
The single round of DES is shown in Fig. 2. These steps are
A. From the 56-bit bit key, a different 4848-bit sub-key is
LOKI91
generated by using key transformation. n.
LOKI91 was designed in response to the attacks on LOKI89.
B. Using the expansion permutation, the R0 is expended
The changes included removing the initial and final key
from 32 bits to 48 bits.
whitening, a new S-box,
box, and small alterations to the key
C. Now, the 48-bitbit key is XORed with 4848-bit Ki and the
schedule.. More specifically, the S-boxes
S were changed to
resulting output is given in the next
minimize the probability of seeing different inputs resulting
D. step.
in the same output (a hook which Differential
E. Using the S-box
box substitution produce the 32
32-bit from 48-
cryptanalysis uses), thus improving LOKI91's immunity to
bit input.
this attack. The changes to the key schedule were designed
F. These 32 bits its are permuted using straight P P-box
to reduce the number of "equivalent" or "related" keys,
permutation.
which resulted inn the exhaustive search space for the cipher
G. The straight P-box
box output 32 bits are XORed with the
being reduced.
L032 bits.
H. The result of the XORed 32 bits becomes the R1 and old
Whilst the resulting cipher is clearly stronger and more
R0 become the L1. This process is called as swapping.
secure than LOKI89, there are a number of potential attacks.
Now the R1 again given to the next round and performed
Consequently these ciphers should be viewed as academic
the 15 more rounds.
efforts to advance the field of block cipher design, rather
5. After the completion of 16 rounds, the final permutation than algorithms for use. The number of citations and
is performed. published critiques suggests this aim has been achieved.
LOKI91 Algorithm
B. LOKI
In cryptography, LOKI89 and LOKI91 are symmetric
symmetric-
key block ciphers designed as possible replacement
replacements for Fig.3 Schematic LOKI91 algorithm
the Data Encryption Standard (DES). The ciphers were
developed based on a body of work analyzing DES, and are The mechanics of LOKI91 are similar to DES. The data block
very similar to DES in structure. The LOKI algorithms were then divided into a left half and right half and goes through
named for Loki. 16 rounds, much like DES. In each round, the right half is
first XORed with a piece of the key, then through an
LOKI89 expansion permutation.
The cipher uses a 64-bit block and a 64-bit key
key. Like DES, it is
The 48 bit output is divided into four 12-bit
12 blocks, and each
a 16-round Feistel cipher and has a similar general structure,
block is sent through an S-box
box substitution. Then, the four 8-
8
but differs in the choice of the particular S-boxes, the
bits output are recombined to form a single 32-bit
32 number
"straight P-permutation",
permutation", and the "Expansion permutation".
and sent through the permutation. Finally, the right half is
The S-Boxes use the non-linearity
linearity criteria developed by Josef
XORed with the left half to become the new right half, and
Pieprzyk, making them as "complex" and "unpredictable" as
the right half becomes the new left half. After 16 rounds, the
possible. Their effectiveness was compared against the
block is again XORed with the key to produce the ciphertext.
known design criteria for the DES S-boxes.. The permutations
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1441
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
D. Experimental and Simulation Analysis
We analyzed the two algorithms with English texts and these
texts are selected randomly. And then input file sizes are
Therefore, the index of coincidence is: used from small to large size. Different samples yield slightly
TABLE 1 represents the five different sizes of files and corresponding encryption and decryption execution time taken by DES
and LOKI91 algorithms in seconds. By analyzing the TABLE 1, we conclude that the encryption and decryption time taken by
LOKI91 is slightly small as compare to DES. These comparisons are shown in Fig.4.
TABLE 2 represents the five different sizes of files and corresponding Index of Coincidence (IC) by DES and LOKI91 algorithms.
By analyzing the table 2, we conclude that the IC for ciphertext by LOKI91 is large as compare to DES. These comparisons are
shown in Fig.5.
(a) (b)
Fig. 4 Execution Time for (a) Encryption (b) Decryption
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1442
International Journal of Trend in Scientific Research and Development (IJTSRD) @ www.ijtsrd.com eISSN: 2456-6470
E. CONCLUSIONS [3] Abdullah Al Hasib, Abul Ahsan Md. Mahmudul Haque,"
This paper presents the performance evaluation of A Comparative Study of the Performance and Security
cryptographic algorithms for various types of files. we have Issues of AES and RSA Cryptography", Third
studied that the encryption and decryption execution time International Conference on Convergence and Hybrid
consumed by DES algorithm is not quite different for some Information Technology,2008.
sort of message compared to LOKI91 algorithm. Index of
[4] William Stallings, “Cryptography and Network Security
Coincidence (IC) for the ciphertext by DES is smaller than the
Principles and Practices.” Prentice Hall, November 16,
LOKI91. Thus, the performance of DES is very good as
2005.
compared to LOKI91.
[5] A. Nadeem, "A performance comparison of data
References encryption algorithms", IEEE information and
[1] Rishabh Arora Sandeep Sharma, PhD, “Performance communication technologies, pp.84-89, 2006.Bn
Analysis of Cryptography Algorithms”, International
[6] Gaurav Shrivastava, “Analysis Improved Cryptosystem
Journal of Computer Applications (0975 – 8887)
Using DES with RSA.” VSRDIJCSIT, Vol. 1 (7), 465-470,
Volume 48– No.21, June 2012.
2011.
[2] Sombir Singh1 , Sunil K Maakar 2 and Dr. Sudesh
[7] Charels Connell, “An Analysis of New DES: A Modified
Kumar3, “A Performance Analysis of DES and RSA
Version of DES”, Locust Street Burlington, USA, Boston
Cryptography”, International Journal of Emerging
MA 02215 USA.
Trends & Technology in Computer Science (IJETTCS),
Volume 2, Issue 3, May – June 2013.
@ IJTSRD | Unique Paper ID – IJTSRD26650 | Volume – 3 | Issue – 5 | July - August 2019 Page 1443