Improved Design of DES Algorithm Based On Symmetric Encryption Algorithm
Improved Design of DES Algorithm Based On Symmetric Encryption Algorithm
Abstract—To address issues in security & the threat posed using key encryption. It is based on a symmetric algorithm
to the DES algorithm by brute force cracking, as well as the using 56-bit keys. DES is a typical representative of block
low efficiency of the 3DES algorithm, I propose extending the ciphers. Because the key length of the DES algorithm is too
length of the DES algorithm's key. First, change the block short, the DES algorithm is no longer secure, and currently
length of the DES algorithm from 64 bits to 128 bits and DES has been replaced by AES[2].
expand the key length of the DES algorithm to double length;
secondly, iterative encryption is performed according to the Based on research above, this article will provide an
new plaintext grouping and the expanded key length. The two effective solution for brute force cracking on DES: Both keys
groups are iteratively encrypted, and after every single are used to encrypt two pieces of plain text, and some data
iteration the two sets of R part data obtained from this round where in the two encryption processes are controlled during
of encryption are exchanged, and then the next round of the encryption process. Based on the encryption results
iteration; finally, the improved DES algorithm is compared during the iteration of the encryption algorithm, the DES key
with the DES algorithm and the 3DES algorithm by length has been extended. The security of DES has been
experiment. The results showing that the operating efficiency enhanced and compared with the improved algorithm 3DES
of the improved DES algorithm is better than 3DES algorithm. algorithm of DES, the efficiency will be higher than 3DES,
Therefore, the improved algorithm is proposed here greatly and the security will not be inferior to 3DES.
improves the security of the algorithm under the premise of
ensuring operating efficiency and has good application value.
II. RELATED TECHNICAL ANALYSIS
Keywords— DES, key expansion, iterative algorithm
A. Symmetric encryption algorithm
I. INTRODUCTION Symmetric encryption algorithm is an earlier encryption
algorithm and the technology is relatively mature. In the
With the rapidly development of computer information
algorithm, the sender needs to perform the special
technology, human society has entered the era of
encryption algorithm to process the plaintext and the key to
informatization, users are paying more and more attention to
make it unrecognizable ciphertext and transmit it. After
the security of information while using the network, which
received the ciphertext, the receivers have to use the same
promotes the development of encrypted information. DES is
key and the inverse operation of the encryption algorithm to
a typical representative of block ciphers and the first standard
process the ciphertext to obtain the corresponding plaintext.
algorithm being published. At present, because the key
In a symmetric encryption algorithm, both parties of the
length of the DES algorithm is too short, the DES algorithm
communication are use the same key for encryption and
is no longer secure and is gradually being replaced by AES.
decryption operations. The characteristics of the symmetric
However, in order to make DES, which is an excellent
encryption algorithm are algorithm disclosure, small amount
encryption algorithm, continue to play its role, scholars have
of calculation, fast encryption speed, and high encryption
made endless improvements to DES.
efficiency, but the disadvantage is that both parties of the
DES (Data Encryption Algorithm, DEA) encryption communication have to keep the key that only they know ,
algorithm is the most widely used data encryption system. It which make the key management difficulty, especially in
was established by the National Bureau of Standards (NBS) the environment of multi-person communication, the
in 1977, which is now the National Institute of Standards and number of keys increases sharply, giving the key
Technology (National Institute of Standards and Technology, management a huge burden.
NIST) adopted as the Federal Information Processing
Symmetric encryption algorithms are mainly includes
Standard46. What we pointed by DES actually refers to Data
the following contents:
Encryption Algorithm[1].
DES algorithm, 3DES algorithm, TDEA algorithm,
Symmetric encryption algorithm is an earlier type of data
Blowfish algorithm, RC5 algorithm, IDEA algorithm[3].
encryption algorithm, which has advantages of fast
encryption speed and high encryption efficiency. The data
encryption standard is a symmetric encryption algorithm
Authorized licensed use limited to: NYSS'S Yeshwantrao Chavan College of Engineering. Downloaded on November 23,2022 at 16:45:05 UTC from IEEE Xplore. Restrictions apply.
B. Principle of DES encryption algorithm discarded.
DES is a symmetric encryption algorithm. It has two Step2 After discarding the check digit, the sub-key has 56
inputs, plain texts and keys. The length of the plaintext and bits in total and the 56-bit sub-key is replaced by selection 1,
the keys are both 64 bits, and 56 of them are valid keys, and the result obtained is still 56 bits.
the remaining 8 bits are the parity bit[4]. The following figure
is flow of the schematic diagram of the DES algorithm. Step3 Divide the obtained 56-bits sub-keys into two
groups with 28 bits of each and move the two groups of sub-
keys to the left circular manner.
Step4: The shifted two sets of 28bits data are replaced by
selection 2, each group of 24bits data is filtered, and the two
screening sets of data are combined into 48bits as the subkey
of the i-th round.
221
Authorized licensed use limited to: NYSS'S Yeshwantrao Chavan College of Engineering. Downloaded on November 23,2022 at 16:45:05 UTC from IEEE Xplore. Restrictions apply.
Ek3 Ek2 (Ek1(P)) respectively encrypted with two different sets of keys Kl
and Kr.
An algorithm above obviously does not play any Step4 The two sets of data obtained after each iteration:
substantial role in enhancing the security of the DES the Ll part in the left packet L and the Lr part in the right
algorithm. packet R are exchanged, and the exchanged result is used as
Another idea is to select two keys to encrypt the odd and the input of the next iteration to continue encryption. By
even DES packets respectively. The specific implementation analogy, the results of each iteration are exchanged.
steps are as follows: Step5 Perform 16 rounds of iterative transformation
The DES algorithm divides every 64-bit plaintext into a according to process above and merge the transformation
group. We can select two sets of different keys for the odd results into a data block with a length of 128 bits as the
and even arrays in the plaintext group to encrypt the plaintext result of this group of encryptions.
group respectively. This method does improve the security of So DESnew is expressed in a general form. For the
the DES algorithm, but the difficulty of cracking is only encryption algorithm of round i:
doubled, and the safety research of DES has not made
breakthrough progress yet.
It being said that if we want to use two keys for Lri Lli
encryption to achieve the security of the DES algorithm, we
need to improve the encryption process of the DES algorithm.
In order to make the results of the two encryption processes Rli Lli-1ͰF(RlLˈK)
unpredictable, it is the best way to communicate the two
encryption processes. After two encryption processes are
communicated, the generated ciphertext becomes a whole, TABLE I. DES ALGORITHM AND DES IMPROVED ALGORITHM
and If they are not communicated, the resulting ciphertext COMPARISON TABLE
can distinguish which data blocks were encrypted by two Comparison of DES and DESnew
different keys, which make it difficult to achieve the desired parameter
DES DESnew
effect the security of the DES algorithm. Plain text packet 64 bits
128bits
length
B. Basic principles of improved algorithm Key required for
1 2
encryption
Each plaintext packet Each plaintext group is
is encrypted only encrypted with two sets
Encryption times
once by the DES of DES algorithm
algorithm simultaneously
222
Authorized licensed use limited to: NYSS'S Yeshwantrao Chavan College of Engineering. Downloaded on November 23,2022 at 16:45:05 UTC from IEEE Xplore. Restrictions apply.
the security of the algorithm from the three aspects of
After averaging the 5 data obtained, the following increasing the packet length, key length and the exchange of
statistical chart is obtained according to the table II grid. each round of iterative results. The algorithm efficiency is
much higher than the 3DES algorithm, and the security is
compared with the original DES. The algorithm is still better.
Therefore, the method proposed here has nice application
value. In the future research, further research will be
conducted on the efficiency of the algorithm to make a
better improve of algorithm.
REFERENCES
[1] Liu Haifeng, Cao Yumo, Liang Xingliang. Research on improved
DES based on stream cipher[J]. Computer Applications and Software,
2019, 36(09): 317-320.
[2] He Yongcheng. Hardware research and implementation of symmetric
cipher AES/3DES pass cipher[D]. Tsinghua University, 2018.
[3] Wang Ge. Research on network information encryption method based
Fig. 4. Histogram ofaverage algotithm efficiency on 3DES algorithm [J]. Information and Computer (Theoretical
Edition), 2020, 32(16): 56-57.
From the analysis results above, it being said that the [4] Yu Wei. Research on the key extension method and security of DES
improved algorithm is slightly inferior to the DES algorithm algorithm [D]. Central China Normal University, 2019.
in efficiency, but far higher than the 3DES algorithm. [5] Arash Moghadami, Behbood Moghadam Naghdi Shekardasht,
Regarding security, even the improved DES algorithm Mohammad Taghipour. Implementation of Software-Efficient DES
Algorithm. 2015, 3(3)
cannot be compared specifically with the 3DES algorithm, it
[6] Yu Wei. Research on the key extension method and security of DES
is undoubtedly higher than the original DES algorithm. algorithm [D]. Central China Normal University, 2019
[7] Shruti Kumari, Gautam Kumar. Comparison of AES and DES
V. CONCLUSION Algorithm. 2015, 6(1):144-146.
The improved DES algorithm proposed here increases
223
Authorized licensed use limited to: NYSS'S Yeshwantrao Chavan College of Engineering. Downloaded on November 23,2022 at 16:45:05 UTC from IEEE Xplore. Restrictions apply.