Performance Comparison of Cryptanalysis Techniques over DES

Abstract

The primary requirement of a good encryption technique is that it is either impossible or difficult to deduce the plaintext out of a ciphertext without the knowledge of key. Cryptanalysis is the technique that violates this requirement. It focuses on either determining the plaintext out of a ciphertext or guessing the key without trying all the possible combinations of key. Since the development of DES (Data Encryption Standard) in 1977 many cryptanalysis methods have been developed and improved to test security provided by it. Two of the widely used techniques are Linear and Differential cryptanalysis. This paper is aimed at comparing the efficiency of these cryptanalysis methods over Brute Force approach based on experimental results carried out on S-DES. The performances of these methods are compared based on time required for guessing the actual key.

Authors and Affiliations

Anupam Kumar, Aman Kumar, Sahil Jain, P Kiranmai

Keywords

Related Articles

Stock Market Price Trend Forecasting using Machine Learning

support vector machine is a machine learning technique used in to forecast stock prices. Stock market price forecasting is the process of determining the future value of a company’s stock. This study uses daily closing...

Cloud Computing Challenges and Its Models

The cloud computing is the fastest growing concept in research and industry. The ‘Cloud’ represents the internet and it related to several technologies and the convergence of various technologies has emerged to be call...

Automatic Power Factor Correction using Microcontroller

The main aim of this project is to enhance the power quality by constantly monitoring the load p.f. , when the load p.f. drops below a definite value it results in the rise of line current resulting in more line loss an...

Wireless Induction Charging Of an Electric Propulsion System

The ultimate aim of this project is to develop an induction charging system for a quad copter which enables it to charge the batteries wirelessly. It does not involve any man power thus making the UAV fully autonomous....

Site Locating and Insite Exploring Smart Crawers For Deep Web Interfaces

Mobile Android applications typically have access to sensitive knowledge and resources on the user device. Misuse of this knowledge by malicious applications could result in privacy breaches and sensitive data outpourin...

Download PDF file
  • EP ID EP22077
  • DOI -
  • Views 291
  • Downloads 5

How To Cite

Anupam Kumar, Aman Kumar, Sahil Jain, P Kiranmai (2016). Performance Comparison of Cryptanalysis Techniques over DES. International Journal for Research in Applied Science and Engineering Technology (IJRASET), 4(5), -. https://europub.co.uk/articles/-A-22077