Skip to main content

Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES

  • Conference paper
  • First Online:
Smart Computing and Informatics

Part of the book series: Smart Innovation, Systems and Technologies ((SIST,volume 77))

  • 1249 Accesses

Abstract

Information security is the process of defending information from unauthorized access and loss. Nowadays in most of the organizations, information is accessed through online. So there is a need to safeguard the information from attackers and hackers. Cryptography is the method of storing and transmitting data in an unreadable form so that only indented user can read and process it. There are two categories of cryptography: symmetric key and asymmetric key encryption algorithms. Symmetric key algorithms use single key for both encryption and decryption. RC2, RC4, DES, Triple DES, IDEA etc. are some of eminent existing symmetric key algorithms. In this paper, we tried to enhance the security of DES, which is now considered to be insecure for many applications. We tried to provide double security by adding a random substitution technique before applying EDES algorithm where we modified the round function and increased the number of rounds from 16 to 32. The performance of the proposed technique is compared with traditional DES algorithm by means of avalanche effect and plaintext sensitivity.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. https://en.wikipedia.org/wiki/Network_security

  2. https://simple.wikipedia.org/wiki/Cryptography

  3. http://searchsoftwarequality.techtarget.com/definition/cryptography

  4. Ayushi : A symmetric key cryptographic algorithm. Int. J. Comput. Appl. 1(15), (0975–8887) (2010)

    Google Scholar 

  5. Rakeshkumar, SK.: Performance analysis of data encryption standard algorithm & proposed data encryption standard algorithm. Int. J. Eng. Res. Dev. 7(10), (July 2013)

    Google Scholar 

  6. https://en.wikipedia.org/wiki/Symmetric-key_algorithm

  7. National Bureau of Standards—Data Encryption Standard. Fips Publication 46, (1977)

    Google Scholar 

  8. https://en.wikipedia.org/wiki/Data_Encryption_Standard

  9. https://www.utdallas.edu/~edsha/OS2000/des-algorithm-details.txt

  10. Ren, W.: A hybrid encryption algorithm based on DES and RSA in bluetooth communication.: In: Second International Conference on Modeling Simulation and Visualization Methods (WMSVM) (2010)

    Google Scholar 

  11. http://engineeringfourum.blogspot.in/2014/04/data-encryption-standard-des.html

  12. Stallings, W.: Cryptography and Network Security: Principles and Practices, 5th edn. Prentice Hall, New York (1999)

    Google Scholar 

  13. Kapoor, P., Mohan, P., Kumar, M.: DES (Data Encryption Standard). http://priyaprakharmrigank.blogspot.in

  14. http://en.wikipedia.org/wiki/Avalanche_effect

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rayi Sailaja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sailaja, R., Rupa, C., Chakravarthy, A.S.N. (2018). Intensifying the Security of Information by the Fusion of Random Substitution Technique and Enhanced DES. In: Satapathy, S., Bhateja, V., Das, S. (eds) Smart Computing and Informatics . Smart Innovation, Systems and Technologies, vol 77. Springer, Singapore. https://doi.org/10.1007/978-981-10-5544-7_47

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-5544-7_47

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-5543-0

  • Online ISBN: 978-981-10-5544-7

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics