2005
DOI: 10.3923/itj.2005.307.325
|View full text |Cite
|
Sign up to set email alerts
|

Theory and Implementation of Data Encryption Standard: A Review

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0
1

Year Published

2012
2012
2023
2023

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 28 publications
(6 citation statements)
references
References 1 publication
0
5
0
1
Order By: Relevance
“…For these 20 years, it has held up against cryptanalysis remarkably well and is still secure against all but possibly the most powerful adversaries. Because of its prevalence throughout the encryption market, DES [4] is an excellent interoperability standard between different encryption equipment. The predominant weakness of DES is its 56-bit key which, more than sufficient for the time period which it was developed [5], has become insufficient to protect against brute-force attacks modern computers [6].…”
Section: Data Encryption Standardmentioning
confidence: 99%
See 1 more Smart Citation
“…For these 20 years, it has held up against cryptanalysis remarkably well and is still secure against all but possibly the most powerful adversaries. Because of its prevalence throughout the encryption market, DES [4] is an excellent interoperability standard between different encryption equipment. The predominant weakness of DES is its 56-bit key which, more than sufficient for the time period which it was developed [5], has become insufficient to protect against brute-force attacks modern computers [6].…”
Section: Data Encryption Standardmentioning
confidence: 99%
“…Let + denote XOR addition, (bit-by-bit addition modulo 2). Then for n going from 1 to 16 we calculate (3) and (4).…”
Section: Key Generationmentioning
confidence: 99%
“…Caesar cipher is one of the oldest ciphers, In Caesar cipher encryption [5], every letter is replaced by a letter that comes after the 'k' letters, in Caesar cipher decryption, every letter in the cipher text is replaced by a letter that comes 'k' letter before the cipher text letter. DES (Data Encryption Standard) [6], AES (Advanced Encryption Standard) [7], Blowfish [8], and RC4 [9] are a few examples of symmetric encryption algorithms.…”
Section: Literature Reviewmentioning
confidence: 99%
“…They also identified the need for changing the symmetric key frequently sothat the data privacy of cloud data can be extended further [12]. Kefa Rabah [13] has analyzed Data Encryption Standard (DES) algorithm and its sustabinability in securing data. He has compared the performance of DES with that of the other symmetric key cryptsystems.…”
Section: Review Of Literaturementioning
confidence: 99%
“…He has compared the performance of DES with that of the other symmetric key cryptsystems. He suggested that cryptographic algorithms must be carefully selected and implemented in order to have a strong cryptosystem that can maintain the secrecy of data in transit or at rest [13].…”
Section: Review Of Literaturementioning
confidence: 99%