International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2 Issue. 8Single Round of DES AlgorithmDES Modes of OperationThe DES algorithm turns a 64-bit message block M into a 64-bit cipher block C. If each 64-bit block is encryptedindividually, then the mode of encryption is calledElectronic Code Book (ECB) mode. There are two other modes of DESencryption, namely Chain Block Coding (CBC) and Cipher Feedback (CFB), which make each cipher block dependent on allthe previous messages blocks through an initial X-NOR operation. Single Round of DES Algorithm is as:Cracking DESBefore DES was adopted as a national standard, during the period NBS was soliciting comments on the proposedalgorithm, the creators of public key cryptography, Martin Hellman and Whitfield Diffie, registered some objections to the us eof DES as an encryption algorithm. Hellman wrote: "Whit Diffie and I have become concerned that the proposed dataencryption standard, while probably secure against commercial assault, may be extremely vulnerable to attack by anintelligence organization" (letter to NBS, October 22, 1975).Diffie and Hellman then outlined a "brute force" attack on DES. (By "brute force" is meant that you try as many ofthe 2^56 possible keys as you have to before decrypting the ciphertext into a sensible plaintext message.) They proposed aspecial purpose "parallel computer using one million chips to try one million keys each" per second, and estimated the cost ofsuch a machine at $20 million.Fast forward to 1998. Under the direction of John Gilmore of the EFF, a team spent $220,000 and built a machinethat can go through the entire 56-bit DES key space in an average of 4.5 days. On July 17, 1998, they announced they hadcracked a 56-bit key in 56 hours. The computer, called Deep Crack, uses 27 boards each containing 64 chips, and is capable oftesting 90 billion keys a second.Despite this, as recently as June 8, 1998, Robert Litt, principal associate deputy attorney general at the Department ofJustice, denied it was possible for the FBI to crack DES: "Let me put the technical problem in context: It took 14,000 Pentiu mcomputers working for four months to decrypt a single message . . . . We are not just talking FBI and NSA [needing massivecomputing power], we are talking about every police department."Responded cryptograpy expert Bruce Schneier: " . . . the FBI is either incompetent or lying, or b oth." Schneier wenton to say: "The only solution here is to pick an algorithm with a longer key; there isn't enough silicon in the galaxy or eno ughtime before the sun burns out to brute- force triple-DES" (Crypto-Gram, Counterpane Systems, August 15, 1998).Conclusion and Future WorksIn this paper, for the cryptanalysis of Data Encryption Standard is presented. It shows that it is an effective approachfor cryptanalysis of four-rounded DES using X-Nor. The cost function used in this paper is generic and can be used for thecryptanalysis of other block ciphers In the future, it also performed under different operands and even by altering t hem.||Issn <strong>2250</strong>-<strong>3005</strong>(online)|| ||December||2012|| Page 199
International Journal Of Computational Engineering Research (<strong>ijcer</strong>online.com) Vol. 2 Issue. 8References[1]. "Cryptographic Algorithms for Protection of Computer Data During Transmission and Dormant Storage," FederalRegister 38, No. 93 (May 15, 1973).[2]. Data Encryption Standard, Federal Information Processing Standard (FIPS) Publication 46, National Bureau ofStandards, U.S. Department of Commerce, Washington D.C. (January 1977).[3]. Carl H. Meyer and Stephen M. Matyas, Cryptography: A New Dimension in Computer Data Security, John Wiley &Sons, New York, 1982.[4]. Dorthy Elizabeth Robling Denning, Cryptography and Data Security, Addison-Wesley Publishing Company,Reading, Massachusetts, 1982.[5]. D.W. Davies and W.L. Price, Security for Computer Networks: An Introduction to Data Security in Teleprocessingand Electronics Funds Transfer, Second Edition, John Wiley & Sons, New York, 1984, 1989.[6]. Miles E. Smid and Dennis K. Branstad, "The Data Encryption Standard: Past and Future," in Gustavus J. Simmons,ed., Contemporary Cryptography: The Science of Information Integrity, IEEE Press, 1992.[7]. Douglas R. Stinson, Cryptography: Theory and Practice, CRC Press, Boca Raton, 1995.[8]. Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, New York, 1996.[9]. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press,Boca Raton, 1997.[10]. Ruth M. Davis, ―The Data Encryption Standard‖ Proceedings of Conference on Comp uter Security and the DataEncryption Standard, National Bureau of Standards, Gaithersburg, MD, Feb. 15, 1977, NBS Special Publication500-27, pp. 5-9.[11]. WhitfleldDiffie, ―Cryptographic Technology: Fifteen Year Forecast‖ Reprinted by permission AAAS, 1982 fromSecure Communications and Asymmetric Crypto Systems. AAAS Selecte8 Symposia. Editor: C.J. Simmons. Vol.69, Westview Press, Boulder, Colorado, pp. 38-57.[12]. C. Boyd. ―Modern Data Encryption,‖ Electronics & Communication Engineering Jou rnal, October 1993, pp. 271-278.[13]. Seung-Jo Han, ―The Improved Data Encryption Standard (DES) Algorithm‖ 1996, pp. 1310 -1314.[14]. A.Kh. AI Jabri, ―Secure progressive transmission of compressed images‖ IEEE Transactions on ConsumerElectronics, Vol. 42, No. 3, AUGUST 1996, pp. 504-512 .[15]. K. Wong, ―A single-chip FPGA implementation of the data encryption standard (des) algorithm‖ IEEE 1998 pp. 827-832 .[16]. Subbarao V. Wunnava, ―Data Encryption Performance and Evaluation Schemes‖ Proceedings IEEE Southeastcon2002, pp. 234-238[17]. Xun Yi,‖ Identity-Based Fault-Tolerant Conference Key Agreement‖ IEEE transactions on dependable and securecomputing, vol. 1, no. 3, July-September 2004, pp. 170-178 .[18]. M. Backes, ―Relating Symbolic and Cryptographic Secrecy‖ IEEE transactions on dependable and secu re computing,vol. 2, no. 2, April-June 2005, pp. 109-123 .[19]. ElisaBertino, ―An Efficient Time -Bound Hierarchical Key Management Scheme for Secure Broadcasting‖ IEEEtransactions on dependable and secure computing, vol. 5, no. 2, April-June 2008, pp. 65-70.[20]. Clark, A.,‖Modern Optimization Algorithms for Cryptanalysis‖.Proceedings of Second IEEE Australian andNew Zealand Conference on Intelligent Information Systems, pp.258-262, 1994.[21]. Laskari, E. C., Meletiou, G. C., Stamation, Y. C., and Vrahatis, M. N.,‖Evolutionary Computation based Cryptanalysis:A first study‖. Nonlinear Analysis, vol. 63, no.(5- 7), pp. 823-830, 2005.[22]. R, Vimalathithan, and Valarmathi, M. L.,‖Cryptanalysis of S-DES using Genetic Algorithm‖. International Journalof Recent Trends in Engineering, vol. 2, no. 4, pp.76-79, Nov.2009.[23]. Shahzad, W., Siddiqui, A. B., and Khan, F. A., ‖Cryptanalysis of Four-Round DES using Binary Particle SwarmOptimization‖. Genetic and Evolutionary Computation Conference, pp. 1757-1758, July 8-12, 2009.[24]. Song, J., Zhang, H., Meng, Q., and Wang, Z.,‖Cryptanalysis of Four-Round DES Based on Genetic Algorithm‖.International Conference on Wireless Communications Networking and Mobile Computing, Issue 21-25, pp. 2326-2329, Sept. 2007.[25]. Spillman, R., Janssen, M., Nelson, B., and Kepner, M.,‖Use of A Genetic Algorithm in the Cryptanalysis ofSimple Substitution Ciphers‖. Cryptologia, vol.17, no.1, pp.||Issn <strong>2250</strong>-<strong>3005</strong>(online)|| ||December||2012|| Page 200
- Page 1 and 2:
ISSN: 2250-3005VOLUME 2 December 20
- Page 3 and 4:
Meisam MahdaviQualification: Phd El
- Page 5 and 6:
16. Implementation Of Serial Commun
- Page 7 and 8:
45 Performance Evaluation Of Energy
- Page 9 and 10:
International Journal Of Computatio
- Page 11 and 12:
International Journal Of Computatio
- Page 13 and 14:
International Journal Of Computatio
- Page 15 and 16:
International Journal Of Computatio
- Page 17 and 18:
International Journal Of Computatio
- Page 19 and 20:
International Journal Of Computatio
- Page 21 and 22:
01 .048International Journal Of Com
- Page 23 and 24:
International Journal Of Computatio
- Page 25 and 26:
International Journal Of Computatio
- Page 27 and 28:
International Journal Of Computatio
- Page 29 and 30:
International Journal Of Computatio
- Page 31 and 32:
International Journal Of Computatio
- Page 33 and 34:
International Journal Of Computatio
- Page 35 and 36:
International Journal Of Computatio
- Page 37 and 38:
International Journal Of Computatio
- Page 39 and 40:
International Journal Of Computatio
- Page 41 and 42:
International Journal Of Computatio
- Page 43 and 44:
International Journal Of Computatio
- Page 45 and 46:
International Journal Of Computatio
- Page 48 and 49:
International Journal Of Computatio
- Page 50 and 51:
International Journal Of Computatio
- Page 52 and 53:
International Journal Of Computatio
- Page 54 and 55:
International Journal Of Computatio
- Page 56 and 57:
International Journal Of Computatio
- Page 58 and 59:
International Journal Of Computatio
- Page 60 and 61:
International Journal Of Computatio
- Page 62 and 63:
International Journal Of Computatio
- Page 64 and 65:
International Journal Of Computatio
- Page 66 and 67:
International Journal Of Computatio
- Page 68 and 69:
International Journal Of Computatio
- Page 70 and 71:
International Journal Of Computatio
- Page 72 and 73:
International Journal Of Computatio
- Page 74 and 75:
International Journal Of Computatio
- Page 76 and 77:
International Journal Of Computatio
- Page 78 and 79:
International Journal Of Computatio
- Page 80 and 81:
International Journal Of Computatio
- Page 82 and 83:
International Journal Of Computatio
- Page 84 and 85:
International Journal Of Computatio
- Page 86 and 87:
International Journal Of Computatio
- Page 88 and 89:
International Journal Of Computatio
- Page 90 and 91:
International Journal Of Computatio
- Page 92 and 93:
International Journal Of Computatio
- Page 94 and 95:
International Journal Of Computatio
- Page 96 and 97:
International Journal Of Computatio
- Page 98 and 99:
International Journal Of Computatio
- Page 100 and 101:
International Journal Of Computatio
- Page 102 and 103:
International Journal Of Computatio
- Page 104 and 105:
International Journal Of Computatio
- Page 106 and 107:
International Journal Of Computatio
- Page 108 and 109:
INTERNATIONAL JOURNAL OF COMPUTATIO
- Page 110 and 111:
INTERNATIONAL JOURNAL OF COMPUTATIO
- Page 112 and 113:
INTERNATIONAL JOURNAL OF COMPUTATIO
- Page 114 and 115:
International Journal Of Computatio
- Page 116 and 117:
International Journal Of Computatio
- Page 118 and 119:
International Journal Of Computatio
- Page 120 and 121:
International Journal Of Computatio
- Page 122 and 123:
International Journal Of Computatio
- Page 124 and 125:
International Journal Of Computatio
- Page 126 and 127:
International Journal Of Computatio
- Page 128 and 129:
International Journal Of Computatio
- Page 130 and 131:
International Journal Of Computatio
- Page 132 and 133:
International Journal Of Computatio
- Page 134 and 135:
International Journal Of Computatio
- Page 136 and 137:
International Journal Of Computatio
- Page 138 and 139:
International Journal Of Computatio
- Page 140 and 141:
International Journal Of Computatio
- Page 142 and 143:
International Journal Of Computatio
- Page 144 and 145:
International Journal Of Computatio
- Page 146 and 147:
International Journal Of Computatio
- Page 148 and 149:
International Journal Of Computatio
- Page 150 and 151:
International Journal Of Computatio
- Page 152 and 153:
International Journal Of Computatio
- Page 154 and 155:
International Journal Of Computatio
- Page 156 and 157: International Journal Of Computatio
- Page 158 and 159: International Journal Of Computatio
- Page 160 and 161: International Journal Of Computatio
- Page 162 and 163: International Journal Of Computatio
- Page 164 and 165: International Journal Of Computatio
- Page 166 and 167: International Journal Of Computatio
- Page 168 and 169: International Journal Of Computatio
- Page 170 and 171: International Journal Of Computatio
- Page 172 and 173: International Journal Of Computatio
- Page 174 and 175: International Journal Of Computatio
- Page 176 and 177: International Journal Of Computatio
- Page 178 and 179: International Journal Of Computatio
- Page 180 and 181: International Journal Of Computatio
- Page 182 and 183: International Journal Of Computatio
- Page 184 and 185: International Journal Of Computatio
- Page 186 and 187: Body Acceleration (m/Sec2)Dynamic T
- Page 188 and 189: International Journal Of Computatio
- Page 190 and 191: International Journal Of Computatio
- Page 192 and 193: International Journal Of Computatio
- Page 194 and 195: International Journal Of Computatio
- Page 196 and 197: International Journal Of Computatio
- Page 198 and 199: International Journal Of Computatio
- Page 200 and 201: International Journal Of Computatio
- Page 202 and 203: International Journal Of Computatio
- Page 204 and 205: International Journal Of Computatio
- Page 208 and 209: International Journal Of Computatio
- Page 210 and 211: International Journal Of Computatio
- Page 212 and 213: International Journal Of Computatio
- Page 214 and 215: International Journal Of Computatio
- Page 216 and 217: International Journal Of Computatio
- Page 218 and 219: International Journal Of Computatio
- Page 220 and 221: International Journal Of Computatio
- Page 222 and 223: International Journal Of Computatio
- Page 224 and 225: EigenvalueEigenvalueInternational J
- Page 226 and 227: International Journal Of Computatio
- Page 228 and 229: International Journal Of Computatio
- Page 230 and 231: International Journal Of Computatio
- Page 232 and 233: International Journal Of Computatio
- Page 234 and 235: International Journal Of Computatio
- Page 236 and 237: International Journal Of Computatio
- Page 238 and 239: International Journal Of Computatio
- Page 240 and 241: International Journal Of Computatio
- Page 242 and 243: International Journal Of Computatio
- Page 244 and 245: International Journal Of Computatio
- Page 246 and 247: International Journal Of Computatio
- Page 248 and 249: International Journal Of Computatio
- Page 250 and 251: International Journal Of Computatio
- Page 252 and 253: International Journal Of Computatio
- Page 254 and 255: International Journal Of Computatio
- Page 256 and 257:
International Journal Of Computatio
- Page 258 and 259:
International Journal Of Computatio
- Page 260 and 261:
International Journal Of Computatio
- Page 262 and 263:
International Journal Of Computatio
- Page 264 and 265:
International Journal Of Computatio
- Page 266 and 267:
International Journal Of Computatio
- Page 268 and 269:
International Journal Of Computatio
- Page 270 and 271:
International Journal Of Computatio
- Page 272 and 273:
International Journal Of Computatio
- Page 274 and 275:
International Journal Of Computatio
- Page 276 and 277:
International Journal Of Computatio
- Page 278 and 279:
International Journal Of Computatio
- Page 280 and 281:
International Journal Of Computatio
- Page 282 and 283:
International Journal Of Computatio
- Page 284 and 285:
International Journal Of Computatio
- Page 286 and 287:
International Journal Of Computatio
- Page 288 and 289:
International Journal Of Computatio
- Page 290 and 291:
International Journal Of Computatio
- Page 292 and 293:
International Journal Of Computatio
- Page 294 and 295:
International Journal Of Computatio
- Page 296 and 297:
International Journal Of Computatio
- Page 298 and 299:
International Journal Of Computatio
- Page 300 and 301:
International Journal Of Computatio
- Page 302 and 303:
International Journal Of Computatio
- Page 304 and 305:
International Journal Of Computatio
- Page 306 and 307:
International Journal Of Computatio
- Page 308 and 309:
International Journal Of Computatio
- Page 310 and 311:
International Journal Of Computatio
- Page 312 and 313:
International Journal Of Computatio
- Page 314 and 315:
International Journal Of Computatio
- Page 316 and 317:
International Journal Of Computatio
- Page 318 and 319:
International Journal Of Computatio
- Page 320 and 321:
International Journal Of Computatio
- Page 322 and 323:
International Journal Of Computatio
- Page 324 and 325:
International Journal Of Computatio
- Page 326 and 327:
International Journal Of Computatio
- Page 328 and 329:
International Journal Of Computatio
- Page 330 and 331:
International Journal Of Computatio
- Page 332 and 333:
International Journal Of Computatio
- Page 334 and 335:
Average JitterThroughputInternation
- Page 336 and 337:
Energy Consumed in Received ModeEne
- Page 338 and 339:
International Journal Of Computatio
- Page 340 and 341:
International Journal Of Computatio
- Page 342 and 343:
International Journal Of Computatio
- Page 344 and 345:
International Journal Of Computatio