3DES
3DES
3DES
www.ijser.in
ISSN (Online): 2347-3878
Volume 2 Issue 11, November 2014
Abstract: This paper contains a technique for secret communication using cryptography. It is a technique which is used to protect the
important data. The secret message is encrypted by a block cipher based on two cryptographic algorithms, the Data Encryption Standard
(DES) and the Triple Data Encryption Algorithm (TDEA) which may be used by Federal organizations to protect sensitive data. This
algorithm uniquely defines the mathematical steps required to transform data into a cryptographic cipher and also to transforms the
cipher back to the original form with block length of 128 bits and key length of 256 bits. This paper provides a performance comparison
between the most common encryption algorithms: DES, 3DES, AES and Blowfish.
1.2.3 Disadvantages
i. The 56 bit key size is the biggest defect of DES and the
Figure 1.3: Encryption and decryption with DES
chips to perform one million of DES encrypt or decrypt
operations a second are available (in 1993).
ii. Hardware implementations of DES are very fast. 2. Overview of Encryption and Decryption
iii. DES was not designed for software and hence runs
relatively slowly. Encryption is a process of coding information which could
iv. In a new technology it is improving a lot of possibility to either be a file or mail message into cipher text a form
break the encrypted code, so AES is preferred than DES. unreadable without a decoding key in order to prevent anyone
except the intended recipient from reading that data.
1.2.4 Objectives Decryption is the reverse process of converting encoded data
i. Provide functionality to store a file in an encrypted format to its original un-encoded form, plaintext. A key in
which can only be accessed by providing the correct cryptography is a long sequence of bits used by encryption /
password. decryption algorithms. The following example to represents a
ii. Modify the system to make the directories password hypothetical 40-bit key:
protected.
iii. To review a short history of DES and define the basic 1010 1001 10011110 00011100 01010101
structures.
iv. To describe the building block elements of DES 2.1 Types of Encryption
v. To describe the round keys generation process and to Depending on the type of encryption, information can be
analyze data encryption standard. displayed as various numbers, letters, or symbols. Those who
work in cryptography fields make it their job, to encrypt
1.2.5 Motivation information or to break codes to receive encrypted
information.
(a) Security
Secures data from being accessed by any malicious user.
Encryption:
c = E3 (D2 (E1 (m)))
Decryption:
m = D1 (E2 (D3(c)))
Figure 3.3: Working of Triple DES Figure 3.4: Block Diagrams: 3DES Encryption
(i) Algorithm:
Run DES three times:
ECB mode:
If K2 = K3, this is DES
Backwards compatibility
Known not to be just DES with K4
4.1 Related Work and Comparative Results Figure 4.3: Comparative Execution time in Encryption
To give more prospective about the performance of the Algorithm System 1
compared algorithms, this section discusses the results
obtained from other resources. The below Table 4.1 contains
the speed benchmarks for some of the most commonly used
cryptographic algorithms. These results are good to have an
indication about what the presented comparison results. It is
shown that Blowfish and AES have the best performance
among others. And both of them are known to have better
encryption (i.e. stronger against data attacks) than the other
two.
The above experiments for comparing the performance of the 5.1.1 Simulation Procedure
different encryption algorithms implemented inside .NET Consider the different sizes of data blocks (0.5MB to 20MB)
framework. Their results are close to the ones shown in the algorithms were evaluated in terms of the time required to
Figure 4.3. encrypt and decrypt the data block. All the implementations
were exact to make sure the accurate results The Simulation
program accepts three inputs:
a. Algorithm,
b. Cipher Mode and
c. Data block size.
Author Profile