International audienceIn this paper, we propose an efficient and secure variant of DES (S-DES), which strikes a good balance between performance and security level when compared to 3DES. S- DES is based on the same round function of DES, however, we introduce different modifications to overcome the weaknesses of the original DES such as the extended Feistel Network (FN) instead of the FN. The main advantage of the proposed scheme is that it benefits from the cryptographic characteristics of DES substitution and diffusion primitives. However, the size of the secret key is extended to 112 bits and the data block is set to 128 bits, which provides better resistance against the attacks that plagued DES. Moreover, the proposed internal scheme of...
The FastDES algorithm is based on Data Encryption Standard (DES). In FastDES, the one round function...
Immunity against differential cryptanalysis is an important measure in designing symmetric ciphers. ...
DES and triple-DES are two well-known and popular encryption algorithms, but they both have the same...
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Abstract. In this paper we propose a new block cipher, DESL (DES Lightweight), which is based on the...
We are having various Conventional Encryption/Decryption techniques for encrypting the data to prote...
Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposa...
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Differential, linear and improved Davies' attacks are capable of breaking DES faster than exhau...
Differential, linear and improved Davies' attacks are capable of breaking DES faster than exhau...
Abstract: In this paper, a new method for key generation using Data Encryption Standard (DES) is pro...
Abstract — The principal goal to design any encryption algorithm must be secure against unauthorized...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The FastDES algorithm is based on Data Encryption Standard (DES). In FastDES, the one round function...
Immunity against differential cryptanalysis is an important measure in designing symmetric ciphers. ...
DES and triple-DES are two well-known and popular encryption algorithms, but they both have the same...
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Abstract. In this paper we propose a new block cipher, DESL (DES Lightweight), which is based on the...
We are having various Conventional Encryption/Decryption techniques for encrypting the data to prote...
Many attempts have been made to strengthen Feistel based block ciphers. Among the successful proposa...
The data encryption standard (DES) is one of the most common symmetric encryption algorithms, but it...
Differential, linear and improved Davies' attacks are capable of breaking DES faster than exhau...
Differential, linear and improved Davies' attacks are capable of breaking DES faster than exhau...
Abstract: In this paper, a new method for key generation using Data Encryption Standard (DES) is pro...
Abstract — The principal goal to design any encryption algorithm must be secure against unauthorized...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The Data Encryption Standard (DES) is a block cipher standard published by the National Institute of...
The FastDES algorithm is based on Data Encryption Standard (DES). In FastDES, the one round function...
Immunity against differential cryptanalysis is an important measure in designing symmetric ciphers. ...
DES and triple-DES are two well-known and popular encryption algorithms, but they both have the same...