A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security | SpringerLink
Skip to main content

A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security

  • Conference paper
  • First Online:
Computational Science and Its Applications – ICCSA 2020 (ICCSA 2020)

Abstract

Cryptographic techniques have been widely employed to protect sensitive data from unauthorized access and manipulation. Among these cryptographic techniques, Data Encryption Standard (DES) has been widely employed, however, it suffers from key and differential attacks. To overcome these attacks, several DES modifications have been proposed in literatures. Most modifications have focused on enhancing DES encryption key; however, the strength of a cryptographic technique is determined by the encryption key used and the number of encryption rounds. It is a known fact that Advanced Encryption Standard (AES) cryptographic technique with 14 encryption rounds is stronger than AES with 12 rounds while AES with 12 rounds is stronger than AES with 10 rounds. Therefore, this study proposed a DES cryptographic technique whose number of rounds is dynamic. Users are expected to specify the number of encryption and decryption rounds to be employed at run time. Moreover, a predefined number of shifting operations which is left circular shift 2 was chosen for each encryption round. As, a trade-off in complexity, the number of Substitution box (S-box) was also reduced to 4, so that the input to the S-boxes would be arranged in four 12-bit blocks for the X-OR operation and not six 8-bit blocks as in the traditional DES. Finally, three keys were used to encrypt, decrypt and encrypt the plaintext ciphertext as in triple DES. The modified DES yielded a better avalanche effect for rounds greater than 16 though its encryption and decryption time were greater than that of the traditional DES.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
¥17,985 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
JPY 3498
Price includes VAT (Japan)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
JPY 11439
Price includes VAT (Japan)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
JPY 14299
Price includes VAT (Japan)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Internet Users Distribution in the World -2020 Q1. http://www.internetworldstats.com. Accessed 24 Mar 2020

  2. Data under Attack: 2018 Global Data Risk Report from the Varonis Data Lab. https://info.varonis.com/hubfs. Accessed 24 Mar 2020

  3. Cybercrime: number of breaches and records exposed 2005–2019. https://www.statista.com/statistics/273550/data-breaches-recorded-in-the-united-states-by-number-of-breaches-and-records-exposed/. Accessed 24 Mar 2020

  4. Biggest Data Breach Statistics. https://www.digitalinformationworld.com/2019/08/biggest-data-breach-statistics.html. Accessed 24 Mar 2020

  5. Cost of a Data Breach Report https://securityintelligence.com/posts/whats-new-in-the-2019-cost-of-a-data-breach-report/. Accessed 24 Mar 2020

  6. Abikoye, O.C., Adeshola, G.Q., Akande, N.O.: Implementation of textual information encryption using 128, 192 and 256 bits advanced encryption standard algorithm. Ann. Comput. Sci. Ser. 15(2), 153–159 (2017)

    Google Scholar 

  7. Abikoye, O.C., Haruna, A.D., Abubakar, A., Akande, O., Asani, E.O.: Modified advanced encryption standard algorithm for information security. Symmetry 11(1484), 1–17 (2019). https://doi.org/10.3390/sym11121484

  8. Akande, N.O., Abikoye, C.O., Adebiyi, M.O., Kayode, A.A., Adegun, A.A., Ogundokun, R.O.: Electronic medical information encryption using modified blowfish algorithm. In: Misra, S., et al. (eds.) ICCSA 2019. LNCS, vol. 11623, pp. 166–179. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-24308-1_14

    Chapter  Google Scholar 

  9. Amorado, R.V, Sison, A.M., Medina, R.: Enhanced data encryption standard (DES) algorithm based on filtering and striding techniques. In: 2nd International Conference on Information Science and Systems, pp. 252–256 (2019)

    Google Scholar 

  10. Gautam, A.: FPGA Implementation of dynamic key generation to enhance des algorithm securities 4(01), 673–677 (2015)

    Google Scholar 

  11. Kessler, G.C.: An overview of cryptography. http://Www.Garykessler.Net/Library/Crypto.Html. Accessed 20 Mar 2020

  12. Oukili, S., Bri, S.: High throughput FPGA implementation of data encryption standard with time variable sub-keys 6(1), 298–306 (2016)

    Google Scholar 

  13. Qasaimeh, M., Al-qassas, R.S.: Randomness analysis of DES ciphers produced with various dynamic arrangements. J. Comput. Sci. Original 13(12), 735–747 (2017). https://doi.org/10.3844/jcssp.2017.735.747

    Article  Google Scholar 

  14. Ratnadewi, B., Roy, P.A., Yonatan, H., Saleh, A., Setiawan, M.I.: Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). J. Phys: Conf. Ser. 954, 1–9 (2018)

    Google Scholar 

  15. Rosal, E.D., Kumar, S.: A fast FPGA implementation for triple DES encryption scheme. Circ. Syst. 8, 237–246 (2017). https://doi.org/10.4236/cs.2017.89016

    Article  Google Scholar 

  16. Sison, A.M., Tanguilig, B.T., Gerardo, B.D., Byun, Y.-C.: Implementation of Improved DES Algorithm in Securing Smart Card Data. In: Kim, T., Ramos, C., Kim, H.-K., Kiumi, A., Mohammed, S., Ślęzak, D. (eds.) ASEA 2012. CCIS, vol. 340, pp. 252–263. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-35267-6_33

    Chapter  Google Scholar 

  17. Sivakumar, T.K., Sheela, T., Kumar, R., Ganesan, K.: Enhanced secure data encryption standard (ES-DES) algorithm using extended substitution box (S-Box). Int. J. Appl. Eng. Res. 12(21), 11365–11373 (2017)

    Google Scholar 

  18. Zibideh, W.Y., Matalgah, M.M.: Modified data encryption standard encryption algorithm with improved error performance and enhanced security in wireless fading channels, pp. 565–573 (2015)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Oluwatobi Noah Akande .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Akande, O.N., Abikoye, O.C., Kayode, A.A., Aro, O.T., Ogundokun, O.R. (2020). A Dynamic Round Triple Data Encryption Standard Cryptographic Technique for Data Security. In: Gervasi, O., et al. Computational Science and Its Applications – ICCSA 2020. ICCSA 2020. Lecture Notes in Computer Science(), vol 12254. Springer, Cham. https://doi.org/10.1007/978-3-030-58817-5_36

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-58817-5_36

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-58816-8

  • Online ISBN: 978-3-030-58817-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics