2020
DOI: 10.11591/ijece.v10i3.pp3125-3135
|View full text |Cite
|
Sign up to set email alerts
|

New modification on feistel DES algorithm based on multi-level keys

Abstract: The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it experiences many problems. For example, it uses only one function (XOR) in the encryption process, and the combination of data is finite because it occurs only twice and operates on bits. This paper presents a new modification of the DES to overcome these problems. This could be done through adding a new level of security by increasing the key space (using three keys) during the 16 rounds of the standard encryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 8 publications
(7 citation statements)
references
References 3 publications
0
7
0
Order By: Relevance
“…In 1972, IBM developed DES as the earliest symmetric encryption algorithm. The algorithm depends on Feistel structure that accepts 64-bit keys, where only 56-bits have already been used because the residual 8-bits were applied for error discovery purposes [12], [13]. The encryption process relies on a 56-bit secret key maps input block (64 bit) into a output block (64 bit).…”
Section: Methods 21 Des (Data Encryption Standard) Algorithmmentioning
confidence: 99%
“…In 1972, IBM developed DES as the earliest symmetric encryption algorithm. The algorithm depends on Feistel structure that accepts 64-bit keys, where only 56-bits have already been used because the residual 8-bits were applied for error discovery purposes [12], [13]. The encryption process relies on a 56-bit secret key maps input block (64 bit) into a output block (64 bit).…”
Section: Methods 21 Des (Data Encryption Standard) Algorithmmentioning
confidence: 99%
“…When the key space and the security are increased, so is making more double the encryption algorithms to intruders, the new manipulation bit process is added using the manipulated bit process variable truth table, which operates on four states {0, 1, 2, 3}, whereas the old traditional binary operation {XOR} works only on {0, 1} bits. The symbol (#) was used to indicate the performing of the operator, this operation using the 4-state truth tables as shown in Figure 2 [25,26].…”
Section: -States # Operation (Multi-level Keys)mentioning
confidence: 99%
“…The need for the devices currently in use prompted the change from relying on GF(P) to the use of polynomial numbers GF(2 8 ), as each Galois field will depend on the irreducible polynomial in its mathematical that used addition and multiplication [13]. Just as for each specific GF(2 Number ) there is a certain number of irreducible polynomials that can be used within that range, there are only 30 irreducible polynomials that can be used within GF (2 8 ) [14,17]. Before retrieving the original text, the work will be changed to a linear equation system and noting that the number of equations is equal to the number of unknowns to be solved.…”
Section: Previously Technologies and Advantagesmentioning
confidence: 99%
“…before solving the work by Gaussian elimination or anyway is chosen requires arranging the equations in such a way that the main diagonal does not contain the value zero, and the final result of the Gaussian elimination method will restore the plain text [15,18]. Cryptography is a science that uses mainly mathematics to encode and decode data by using algorithms with the help of a key [14].…”
Section: Previously Technologies and Advantagesmentioning
confidence: 99%
See 1 more Smart Citation