New Approach of Data Encryption Standard Algorithm
Shah Kruti R.1, Bhavika Gambhava2
1Shah Kruti R.,Computer Engineerting Department, student of M.Tech(Computer Engineering) at Dharmsinh Desai University, Nadiad and Assistant Professor at Sardar Vallabhbhai Patel Institute of Technology, Vasad India.
1Bhavika Gambhava, Computer Engineerting Department, Dharmsinh Desai University, Nadiad, India.
Manuscript received on February 15, 2012. | Revised Manuscript received on February 20, 2012. | Manuscript published on March 05, 2012. | PP: 322-325 | Volume-2 Issue-1, March 2012. | Retrieval Number: A0444022112/2012©BEIESP
Open Access | Ethics and Policies | Cite
© The Authors. Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, there has been a vast increase in the accumulation and communication of digital computer data in both the private and public sectors. Much of this information has a significant value, either directly or indirectly, which requires protection. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form. Performance and security level is the main characteristics that differentiate one encryption algorithm from another. Here introduces a new method to enhance the performance of the Data Encryption Standard (DES) algorithm is introduced here. This is done by replacing the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation depends on using two keys, each key consists of a combination of 4 states (0, 1, 2, 3) instead of the ordinary 2 state key (0, 1). This replacement adds a new level of protection strength and more robustness against breaking methods.