We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

The FastDES: A New Look of Data Encryption Standard

by Muhammad Nawaz Khan, Ishtiaq Wahid, Atual Aziz Ikram
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 39 - Number 11
Year of Publication: 2012
Authors: Muhammad Nawaz Khan, Ishtiaq Wahid, Atual Aziz Ikram
10.5120/4865-7249

Muhammad Nawaz Khan, Ishtiaq Wahid, Atual Aziz Ikram . The FastDES: A New Look of Data Encryption Standard. International Journal of Computer Applications. 39, 11 ( February 2012), 28-33. DOI=10.5120/4865-7249

@article{ 10.5120/4865-7249,
author = { Muhammad Nawaz Khan, Ishtiaq Wahid, Atual Aziz Ikram },
title = { The FastDES: A New Look of Data Encryption Standard },
journal = { International Journal of Computer Applications },
issue_date = { February 2012 },
volume = { 39 },
number = { 11 },
month = { February },
year = { 2012 },
issn = { 0975-8887 },
pages = { 28-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume39/number11/4865-7249/ },
doi = { 10.5120/4865-7249 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:26:11.063559+05:30
%A Muhammad Nawaz Khan
%A Ishtiaq Wahid
%A Atual Aziz Ikram
%T The FastDES: A New Look of Data Encryption Standard
%J International Journal of Computer Applications
%@ 0975-8887
%V 39
%N 11
%P 28-33
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The FastDES algorithm is based on Data Encryption Standard (DES). In FastDES, the one round function concept of DES are used in three different customs to produce a new fast and more efficient secure algorithm. The DES operates on half of the input data, 32-bit of chunk out of 64 bits, while FastDES take block of 32-bit and work on it simultaneously. The encryption start from 32-bit of data and 32-bit of key bits, which passes from three consecutive rounds and 32-bit of cipher is produce. This algorithm is fast, so it can be used in many further securities mechanisms like Hash functions (MD5, SHA series, HMAC) and modes of the operation like CBC, CFB etc. Because of its fast operations it is also recommended to use with other security applications. The DES round function provide a best confusion-diffusion structure of Substitution-Permutation Network (SPN). The FastDES based on same design criteria of S-boxes and permutation functions of DES. Like 3-DES with two keys and 3-DES with three keys, the FastDES can use 3-FastDES with 2 different keys and 3-FastDES with 3 different keys, which not only enhanced system security but also thwart the cryptanalysis for brute force and meet in meddle attacks.

References
  1. Feistel, H., Notz, W. and Smith j. “Some Cryptographic techniques for Machine to Machine Data Communication.” IEEE 1975
  2. A. Sorkin, (1984). LUCIFER: a cryptographic algorithm. Cryptologia, 8(1), 22--35, 1984
  3. Federal information processing standards publication (fips pub 46-3), u.s. department of commerce/National Institute of Standards and Technology, DES.
  4. 9. Whitman, Michael and Herbert Mattord. Principles of Information Security. Boston: Thomson Course Technology, 2005.
  5. http://www.ssh.com/support/cryptography/introduction/algorithms.html
  6. Katos, V.,” A Randomness Test for Block Ciphers. Applied Mathematics”. Elsevier Publications. (2005).
  7. Whitman, Michael and Herbert Mattord. “Principles of Information Security”.Boston: Thomson Course Technology, 2005.
  8. Campbell, Paul and Ben Calvert and Steven Boswell. “Security+ Guide to Network Security Fundamentals.” Boston: Thomson Course Technology, 2003.
  9. Federal Information Processing Standards Publication 197 Announcing the “ADVANCED ENCRYPTION STANDARD (AES)” November 26, 2001.
  10. Joan Daemen, Vincent Rijmen “AES Proposal: Rijndael” 3/9/1999.
  11. Portfolio of recommended cryptographic primitives NESSIE consortium? February 27, 2003.
  12. A book on “Cryptography and Network Security, Principles and practices” by William Stilling. 4th edition.
  13. “Simple and Effective key Scheduling for Symmetric Ciphers” by Adam, C. SAC 1994.
  14. . A book on “Cryptography and Network Security” by Behrouz A. Forouzan. Copyright © The McGraw-Hill Companies, Inc.
  15. “FOX : a New Family of Block Ciphers” by Pascal Junod and Serge Vaudenay. Ecole Polytechnique F ed erale de Lausanne (Switzerland)
Index Terms

Computer Science
Information Sciences

Keywords

Security Algorithm Communication Security Data Encryption Standard