Comparative Study of AES and DES: Algorithms and Applications

Verified

Added on  2024/06/04

|18
|4565
|208
Report
AI Summary
This report offers a comprehensive comparison between the Advanced Encryption Standard (AES) and the Data Encryption Standard (DES), two significant symmetric block ciphers. It begins with an introduction to AES, highlighting its byte-oriented operation and superior performance compared to Triple DES. The report then reviews the literature on cryptography, emphasizing its role in ensuring security and safety in the digital age, particularly for e-commerce and electronic setups. The analysis delves into DES, its history, and its eventual replacement by AES due to vulnerabilities. The strengths and weaknesses of AES are examined, including its robust security protocol, key size options, and complex counter mode. The report concludes with a discussion on the future direction of cryptography, referencing the National Institute of Standards and Technology (NIST) and the ongoing evolution of cryptographic techniques. The document emphasizes AES's advantages in securing file transfer protocols and its broad applicability in financial transactions and e-business.
Document Page
ADVANCED ENCRYPTION STANDARD AND DATA
ENCRYPTION STANDARD
1
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Table of Contents
INTRODUCTION................................................................................................................................4
LITERATURE REVIEW........................................................................................................................5
DATA ENCRYPTION STANDARD...................................................................................................6
DES ANALYSIS...............................................................................................................................6
AVALANCHE EFFECT-...............................................................................................................7
COMPLETENESS-......................................................................................................................7
Solution............................................................................................................................................8
ADVANCED ENCRYPTION STANDARD..........................................................................................8
AES FEATURES..............................................................................................................................8
Experimental Result.......................................................................................................................10
WORKING OF AES......................................................................................................................10
AES WORKING FOR SECURING FILES.........................................................................................10
ADVANTAGES OF AES................................................................................................................11
DISADVANTAGES OF AES...........................................................................................................11
ANAYSIS OF ADVANCED ENCRYPTION STANDARD................................................................11
DIFFERENCE BETWEEN AES AND DES........................................................................................12
DIFFERENCES-............................................................................................................................12
DATA ENCRUPTION STANDARD-...........................................................................................12
ADVANCED ENCRYPTION STANDARD-...................................................................................12
FUTURE Direction..........................................................................................................................14
NATIONAL INSTITUTE OF STANDARD AND TECHNOLOGY (NIST)..............................................14
CRYPTOGRAPHY.........................................................................................................................14
CURRENT STATE OF CRYPTOGRAPHY........................................................................................15
2
Document Page
CONCLUSION.............................................................................................................................16
REFERENCE.....................................................................................................................................17
3
Document Page
INTRODUCTION
AES is opted nowadays for the better working of the working condition and it is better
performing than the triple DES. The preformation of AES is better as it deals in byte instead of
bits with the upcoming generation of the future technologies. Working of 128 bits in AES is 16
bytes.
The DES is operating with 64-bit performance. The publishment of DES is under symmetric
block cipher with the operational length of 56 bits. The pattern of DES is to secure simply and
sensitivity working of government information. The Federation of government originally
provides the cryptographic security and systems with the easy working of the standard facility.
The original requirement of the National Institute of Standard and Technology (NIST) are
efficiently working with the pattern of software and hardware connectivity of the algorithm and
practical working. The main and original designers of DES had great performances regarding the
working of the pattern followed but the AES working is way better as well as faster in the
criteria of the algorithm of cryptography.
4
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
LITERATURE REVIEW
This literature review seems to be facing the reality of the cryptography being for the security
and safety purpose to deal with the people globally and for their use as the public benefit. The
trend that has been set in this generation is to ensure the usage of the cryptography data for its
beneficial way and the demand to be fulfilled needs to be variant with the security and safety
purpose that completes the barrier between the sender and receiver. The dealing with the
modern age of computing technology, networking, and Web-based e-commerce not only
carries out the pattern being followed but also did a lot in the field of cryptography and its way
of using it with the flow of trend been followed (Dinur, 2015).
The cryptography not only provides with the base of using it but also gives a strong
future security for the sake of e-commerce use and also electronic setups that have been
widely used. This set up not only carrying the fix rules and regulations but also provides the
electronic gadgets to work along the beneficial way of managing the things all along.
Today’s cryptography is vastly more complex than its predecessor. The usage of
cryptography not only creates a profitable and budget-friendly setup but also clears the pattern
and helps the regularity and working of the task be performed for the upliftment of the users
thinking and mindset up. Their use in the vital and crucial form allows too wide spreading your
thinking in the placing of working stuff for the challenging competitions in the market for the
upcoming generations. Cryptography is not only focused on the money and data like things but
also it leads to the managing the medical (Dinur, 2015), financial and mental conditions like
things which focus on the people’s day to day life structure on regular basis for the plan been
set. In the late 70 ’s, the pattern of cryptography was newly set for finding a new way to clear
out the maintenance of the safety and security like stuff for hiding the data and information for
the good usage of things by the people for their own sake.
5
Document Page
DATA ENCRYPTION STANDARD
The data encryption standard or DES is a kind of symmetric block cipher launched by the
National Institute of Standard and Technology (NIST) in the early 1970s for the security of the
cryptographic algorithms. They were focused on the unclassified data and information for any
individual and also the governmental secured data.
These algorithms were weakened by the attacks of many associations regarding the
cryptographic structure of processing globally. The National Security Agency commonly known
as NSA proved that this system is weak on the basis of dealing with the attacks of many
associations globally with their widespread adoption of high-end patterns of working. Finally,
the DES was declared secure as it was working on the 56 bits size that was too small in January
1999. It took 22 hours 15 minutes by the Electronic Frontier Foundation to confirm this
insecurity and value of DES was declared null and then AES was born with many new changes
with its dealing into bytes instead of bits. And at last the NIST suppressed the DES values and
issues and withdrawn the standard of it's to AES (Dinur, 2015).
AES was new and better but it was the modern version of DES only with many changes for the
formation of algorithms and techniques to weigh more secured and highly safer. The
development of DES was in such a way to provide the system high and secured pattern of
information and data for the certified usage of it worldwide.
DES ANALYSIS
The dealing of DES was in such a way that it satisfies both the properties been required by the
block cipher. These properties make the cipher strong and hence allowed to perform in the real
world when it was used (Ji, 2015).
AVALANCHE EFFECT-
The changes that were made had changed a lot of the working pattern in ciphertext. These
changes were made in the plain text and were very small and took a high amount of change
6
Document Page
COMPLETENESS-
All the bits in which the working was done in the ciphertext were totally dependent on the bits
of plain text. The plain text was the basic version and the ciphertext was at last too dependent
on the plain text (Rihan, 2015).
7
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
Solution
ADVANCED ENCRYPTION STANDARD
The advanced encryption standard or AES is a kind of block symmetric cipher which is opted by
the US government for the protection of their classified and important data as well as
information that is implanted under software and hardware basis which is much important due
to the sensitivity of the information being classified.
The National Institute of Standard and Technology (NIST) launched their new algorithm of AES
uplifting the DES algorithm in many new criteria’s and working as AES took charge in 1997
officially and leads to a great success for the sensitive information that was under sake of
security. The new technology was highly unclassified and has the capacity of securing the data
and information of different governments till the next 100 years of generation. The NIFT
ensured the safety to a great extent and it conveys the security of new technologies like smart
card and new variant licenses to be safe and data will be secured under a government with high
defensive power from any future attacks and issues. The NIFT was able to set an environment
of high security and attack free pattern of high and safe techniques of working in the new
generation (Wong, 2018).
AES FEATURES
The selective process of this new algorithm and technique is public committees and ensuring
the designs to be formed with high transparency. This high-level technology has many criteria
including –
SECURITY-
The algorithms and techniques that were formed were highly focusing on the ability to secure
the information from attacks and resisting them. The competition was also the main factor to
be focused on the market for the strength purpose of the algorithms being formed.
COST-
8
Document Page
These algorithms are mainly launched for the non-royal and global cause people so they were
focusing on the easy and better working and also the consumption of memory with the ease of
efficiency of the technologies. The costs of these were fixed in such a way that globally people
can afford them for their easy working in securing their information and data (Güler, 2017).
IMPLEMENTATION-
The algorithm should mainly be focusing on the flexibility of their working and their
characteristics implementation for the people using it worldwide for their own sake. The
relative performance is suitably followed the overall evaluation of the work.
OTHERS-
The algorithms and techniques have been formed are formed for the easy working with
focusing on the securities the information and data globally with the overall evaluation of
money and efforts been used on them (Rihan, 2015).
9
Document Page
Experimental Result
WORKING OF AES
AES was designed by two Belgian cryptographers- Joan Daemen and Vincent Rijmen and was
named as Rijndael.
This algorithm or technique is operating with 4*4 order matrices of bytes with larger block size
and efficiently working for the software and hardware system. The calculation for the finite
basis in AES is performing well. The key size used for AES has the specification of a number of
repetition and transformation of rounds that includes the whole input in the plain text to
conclude for the final output that is known as ciphertext. The number of cycles of AES is as
follows –
1. 10 rounds repetition for 128-bit keys
2. 12 rounds repetition for 192-bit keys
3. 14 rounds repetition for 256-bit keys
All rounds are consisting of many steps of the process which includes the dependency of
encryption key itself. There are many reverse keys also which are applied to the transformation
of ciphertext back into the original plaintext (Preneel, 2014).
AES WORKING FOR SECURING FILES
AES includes the working and implementation of securing file transfer protocols like FTPS,
HTTPS, SFTP, AS2, WEB DAVS and OFTP. Because of the two types of AES – symmetric and
asymmetric encryption algorithm consist of their own strength and securing file transfer
protocol using the combination of the two. Asymmetric encryption key cipher that is public key
encryption algorithm are used providing the benefit of key distribution which encrypts the
session key for the other type of encryption – symmetric encryption. The symmetric key cipher
which is a type of AES is more suitable for the easy working with the encryption of actual data
as it requires less resourcing of data and is much faster than that of the speed of asymmetric
encryption key ciphers.
10
tabler-icon-diamond-filled.svg

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
ADVANTAGES OF AES
1. It is the most robust security protocol which includes both hardware and software
system with great functioning.
2. It uses key sizes of bigger length that is 128,192,256 bits for the encryption process,
which helps it forming a wall against hacking as well as different attacks.
3. Your personal information and data are safe under its security.
4. It provides a wide era of global use for individuals using the system under their personal
choice.
5. It also provides with the security protocol which allows applications like financial
transactions e-commerce, e-business, and many more (Prajapati, 2014).
DISADVANTAGES OF AES
1. It is very hard to implement the software system.
2. All the blocks in individual basis are always encrypted in the same way.
3. It is great to use with better performance but it is too simple as it contains algebraic
structure.
4. Its security and performance are good but has a complex counter mode (Khanezaei,
2014).
ANALYSIS OF ADVANCED ENCRYPTION STANDARD
Advanced Encryption Standard is a type of key which deals with encryption and decryption of
the algorithms of cryptographic pattern in the way of encryption and decryption structure
followed. It was used by the US government for the replacement of the DES in way of using it in
the structure for its upliftment. The National Institute of Standard and Technology (NIST)
performed the technological launch for the better performance of the algorithms and wanted
to make it publically usable for the people’s requirement increasing day by day on a higher
basis. The NIST also wanted the algos to be secured and sensitive for its better functioning and
user friendly with increasing the time for the longest to be used. They also wanted the algo to
be installed easily and should contain easy reach for the public. They provide a base for
128,192,256 bits working which also includes the byte way performance (Pancholi, 2016).
11
Document Page
DIFFERENCE BETWEEN AES AND DES
AES DES
DEVELOPED 1977 2000
CIPHER TYPE symmetric block cipher symmetric block cipher
KEY LENGTH 56 bits 128,192,256 bits
SECURITY proven inadequate considered secure
BLOCK SIZE 64 bits 128 bits (Karthikeyan, 2017)
DIFFERENCES-
DATA ENCRYPTION STANDARD-
1. DES is basically working on Feistel cipher structure.
2. In DES, there are two halves and it is divided into two parts only.
3. The DES comprises 64 bits of plain text.
4. There are 16 rounds in DES.
5. The key size of DES is comparatively smaller than that of AES.
6. The different rounds in DES are Expansion permutation, XOR, S-box, P-box, and swap.
7. Due to the smaller size of the key in DSE, it is less secure.
8. It is smaller than AES in the name of working (Olaleye, 2017).
ADVANCED ENCRYPTION STANDARD-
1. The whole working and structure of AES comprise only one matrix that makes its
working better.
2. The principle of AES is different than DES and works on substitution and permutation
principle.
3. The AES comprises different plain text that is 128,192,256 bits.
4. The key size of AES is way larger and it makes it better in the terms of performance.
5. There are different rounds in the count of AES for the better performance –
- 10 rounds for 128-bit algo
- 12 rounds for 192-bit algo
- 14 rounds for 256-bit algo
6. The different rounds in the name of AES are sub bytes, shift rows, mix columns and add
round keys.
12
chevron_up_icon
1 out of 18
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]