0% found this document useful (0 votes)
4 views3 pages

IJTRD22009

The document analyzes the AES and DES cryptographic algorithms, highlighting their importance in securing digital data. It compares their performance based on parameters like avalanche effect and bit independence, concluding that AES is more secure than DES. The study emphasizes the role of cryptography in ensuring data confidentiality, integrity, and authentication.

Uploaded by

arthi004j
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views3 pages

IJTRD22009

The document analyzes the AES and DES cryptographic algorithms, highlighting their importance in securing digital data. It compares their performance based on parameters like avalanche effect and bit independence, concluding that AES is more secure than DES. The study emphasizes the role of cryptography in ensuring data confidentiality, integrity, and authentication.

Uploaded by

arthi004j
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

International Journal of Trend in Research and Development, Volume 7(2), ISSN: 2394-9333

www.ijtrd.com
Analysis of AES and DES Algorithm
1
Yash Shah, 2Riddhi Rane, 3Siddhesh Kharade and 4Rutuja Patil,
1
Assistant Professor, 2,3,4Student,
1,2,3,4
Department of Information technology, Vidyalankar Institute of Technology, Mumbai, Maharashtra, India

Abstract—These days there is increased amount of digital data authorized user's information on a local operating
exchanged in every field, information security is becoming a system or within an authentication server.
crucial aspect of data transmission and storage. When we  Privacy/Confidentiality: Ensuring that no one can read
transfer multimedia data such as images, audio, video etc over the message except the intended receiver.
the network the security of the data is provided by  Integrity: Assuring the receiver that the received
cryptography. Cryptography is the process in which the sender message has not been altered in any way from the
encodes the data and sends it in such a way that only the original.
intended recipient could decode it and read it, for this process  Non-repudiation: A mechanism to prove that the sender
we use various cryptographic algorithms.AES and DES are the really sent this message.
types of cryptographic algorithm which are more frequently
been used because of their popularity. In this paper we had a Cryptography is science and art of creating secrete code and
brief study of different set of algorithms and its cryptanalysis is art of breaking those codes. AES is the best and
implementations and we did examine it on some parameters strongest cryptographic algorithm, because of three areas:
which is time consumed, bit independence criteria and Security, Cost and Implementation.
avalanche effect. There are two types of cryptographic algorithms
Keywords-AES, DES, Avalanche effect, Cryptography. developed are as follows:

I. INTRODUCTION  Symmetric cryptography: It uses the same


cryptographic key for both encryption of plain text and
Although electronics documents have been greatly decryption of cipher text. If the same keys are used for
improved in the transferring speed and processing speed it encryption or decryption, we call it symmetric cipher.
would also result the electronic documents information is
disclosed, counterfeited, tampered repudiated and so on. o Ek(M) = C
Therefore due to the rapid usages of data communication, o Dk(M) = M
security is becoming a more crucial issue. The fundamental Those functions have the property that,
requirements for security include authentication, confidentiality,
integrity and non-repudiation..In order to achieve this security o Dk(Ek(M)) = M
cryptography is needed. Cryptography is the process of securing
information by converting it into and format which is not
readable. In order to prevent some unwanted user or people to
get access to the data cryptography is needed. Cryptography is a
method to secure file by writing the hidden code to cover the
original file. Therefore, if the people do not involve in
cryptography, they cannot decrypt the hidden code to read. The
most system uses two major classes of cryptographic algorithm
namely private-key and public-key algorithms. In private key
algorithm same key is used for both encryption and decryption.
They usually operate at relatively high speed and are suitable
for bulk encryption of messages. Public-key algorithm based on
the idea of separating the key used to encrypt a message from
the one used to decrypt it. They are relatively slow and
therefore unsuitable for encryption of large bulky messages. Figure-1 Symmetric key
II. SECURITY PARADIGM  Asymmetric cryptography: Asymmetric cryptography or
public key cryptography is cryptography in which a pair of
As the internet and other forms of electronic communication keys (k1,k2) is used to encrypt and decrypt a message so
became more prevalent, electronic security is becoming that it arrives securely. In case of asymmetric cipher we
increasingly important. The art or science encompassing the have a key pair ( k1,k2), k1 being public and k2 private,
principles and methods of transforming an intelligent message then
back to its original form, to keep message secure is
cryptography. Cryptography is used to protect email, messages, o Ek1(M) = C
credit card information and corporate data within the context of o Dk2 (C) = M
any application-to-application communication, there are some Those functions have the property that,
security requirements, including:
o Dk2(Ek1(M)) = M
 Authentication: The process of proving one's identity .
Authentication is a process in which credential
provided are compared to those on file in a database of

IJTRD | Mar – Apr 2020


Available Online@www.ijtrd.com 34
International Journal of Trend in Research and Development, Volume 7(2), ISSN: 2394-9333
www.ijtrd.com
Table 1

PARAMETER DES AES


Developed 1977 2000
Key length 56 bits 128,192 or 256 bits
Block size 64 bits 128,192 or256 bits
Possible keys 256 2128, 2192 and 2256
Based on
Based on feistel substitution
Structure
network permutation
network
Symmetric block Symmetric block
Structure
cipher cipher
Security Proven inadequate Considered secure
Figure-1 Asymmetric key Brute force, Linear No crypt-analytical
Attack
analysis against AES
III. CRYPTOGHAPHIC ALGORITHM
IV. METHODOLOGY
A. DES Algorithm
This project introduces hybrid approaches by combining two
The Data Encryption Standard(DES) is a block cipher most important algorithms AES algorithm and DES algorithm.
algorithm which is designed to encrypt and decrypt data of 64- This hybrid encryption algorithm provides more security as
bit block size with a 64-bit key. In Encryption the data is being compare to other security algorithm. The parameter on which
converted into cryptographic form which is not readable by the this algorithm is analyzed was Avalanche effect, Bit
user this form is also called as cipher and in decryption the Independence criteria and time consumed. In order to ensure
cipher text which is generated is converted back into its more security the key which is given to this algorithm by the
original form which is known as the plain text. Both the user in the beginning is given to a random function which
encryption and the decryption process are performed using a generates more complex key which is then given to this hybrid
key which is a binary number. The authorized user must have algorithm. This provides more security.
the same key to decrypt the text which is been used to encipher
the text. The DES algorithm makes used of 64-bit out of which The user needs to select a file which he wants to be encrypted
only 56-bit are directly used by the algorithm and the then he needs to press the encrypt button and enter the key.
remaining 8-bits are been used for error detection.DES Then the decrypt button is to be pressed and the same key
performs 16 rounds series of substitution and permutation. In which was entered before is to pressed which decrypts the file
every round, data and key bit are shifted, permuted, XORed which is uploaded.
and then send through 8 s-boxes, a set of lookup tables that are  Avalanche Analysis
mandatory for the DES algorithm. Unauthorized users cannot
access the data even if they know the algorithm without the The avalanche effect property is very important for encryption
key. algorithm. This property can be seen when changing one bit in
plaintext and then watching the change in the outcome of at
B. AES Algorithm least half of the bits in the cipher text. One purpose for the
The Advanced Encryption Standard (AES) was developed by avalanche effect is that by changing only one bit there is large
the National Institute of Standard and Technology(NIST) with change then it is harder to perform an analysis of cipher text,
an intension to overcome the drawbacks of DES algorithm as it when trying to come up with an attack.
gets crack by Brute force attack.It is a symmetric block cipher Number of flipped bits in ciphered text
cryptographic algorithm. It is one of the most popular Avalanche Effect =
Number of bits in ciphered text
algorithm which is been used to secure the data all over the
world. AES has 128 bit block size which handles three  Bit Independence Criteria
different key sizes such as 128,192 and 256 bit. On the basis of A second property which would seem desirable for any
the key size the execution round is 10,12 and 14 respectively. cryptographic transformation is that, for given set of avalanche
It has its own process for both encryption and decryption. AES vectors generated by the complementing of single plaintext bit,
algorithm performs a number of transformation on the data all the avalanche variable should be pair wise independent. In
which is stored in array. The first step of the cipher is that data order to measure the degree of independence between a pair of
is stored into an array, after that cipher transformation are avalanche variable, we calculate their correlation coefficient, if
performed repeatedly in the number of encryption rounds. The its zero it mean that the variable are independent, if its 1 that
first transformation in the AES algorithm is substitution using mean stronger positive correlation and -1 is stronger negative
the substitution table, the second transformation performs correlation.
shifting of data row and the third mixes the column. The last
transformation performs operation in each column using a V. RESULT AND ANALYSIS
different part of the encryption key. It is very difficult to crack The comparison of AES and DES algorithm are shown
data encrypted using AES algorithm. below in the table no - using parameters such as avalanche
C. Comparison between AES and DES Algorithm effect and bit-independence criteria.

The table below specifies the comparison between AES and


DES on various parameters.

IJTRD | Mar – Apr 2020


Available Online@www.ijtrd.com 35
International Journal of Trend in Research and Development, Volume 7(2), ISSN: 2394-9333
www.ijtrd.com
References
TABLE- II [1] Mohamad Noura, "DES: An efficient and secure DES
Varient", 20188371019/
Bit Avalanche [2] Shady Mohameed Soliman,"Efficient implementation
Sr. No Plaintext
Change Effect of the AES algorithm for security applications", 2017.
1101000110010 [3] Bawna Bhat,"DES and AES performance evaluation",
11111001 2015.
1 (hey) 38 59.3% [4] Akash Kumar Mandal,"Analysis of Avalanche effect in
1101000110010 plaintext using binary codes",2013.
11111000 [5] Seung-Jo Han, "The improved Data Encryption
(hex) Standard algorithm(DES) ", 2012.
1100101110111 [6] B.Thiyagarajan, ”Data Integrity and Security in Cloud
0110001111100 Environment Using AES Algorithm”,ICICES 2014.
1011110011110 [7] Takanori Machida, “Modifications to AES Algorithm
0001110100 for Complex Encryption”, IEEE transactions 2015.
2 (encrypt) 32 57.14% [8] C. Giraud, “An Implementation of DES and
1100101110111 AES,Secure against Some Attacks”, c Springer-Verlag
0110001111100 Berlin Heidelberg.CHES, LNCS 2162, pp. 309–318,
1011110011110 2001.
0001110110 [9] Shraddha Soni, "Analysis and Comparision between
(encrypy) AES and DES Cryptographic Algorithm", December
1100110110100 2012.
1110110011001
01
3 (file) 28 43.7%
1100110111100
1110110011001
01
(fyle)
1100011110100
1111000011010
0011001011110
010
4 (cipher) 28 43.7%
1100011110100
1111000011011
0011001011110
010
(cipler)
1100110110100
1110111011000
5 01101100
(final) 36 56.25%
1100110110100
1111111011000
011101100
(fi~al)
AVERAGE 52.018%
According to the analysis performed the avalanche effect
calculated for AES algorithm is more than as compared to DES
algorithm
CONCLUSION
Cryptography plays an important role in the security to
maintain the confidentiality, integrity, availability,
authentication and non-repudiation of the data. In this paper we
have studied the cryptography algorithm such as AES and
DES. They have been examined in terms of avalanche effect
and bit change. The results are been stored in tabular form
above in TABLE-II. Avalanche effect i.e. one bit variation is
more in AES as compare to DES. Lastly, we concluded that
AES algorithm is more secure that DES algorithm.

IJTRD | Mar – Apr 2020


Available Online@www.ijtrd.com 36

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy