A Comprehensive Evaluation of DES and AES Encryption Security

Verified

Added on  2022/09/15

|6
|1091
|8
Discussion Board Post
AI Summary
This discussion post evaluates the security of Data Encryption Standard (DES) and Advanced Encryption Standard (AES) encryption schemes. It begins by introducing encryption and signature systems as key cryptographic instruments, highlighting the importance of confidentiality and authenticity. The discussion covers DES, explaining its operation as an obsolete symmetric key information encryption technique using 64-bit blocks and permutation/replacement with a secret key. Potential attacks on DES, such as brute-force and differential cryptanalysis, are analyzed. The post then transitions to AES, noting its superiority in speed and security compared to DES, and addresses reported weaknesses and attacks on AES. It concludes that DES is no longer considered secure due to its small key size, while AES remains secure due to its use of Galois field theory and rapid operational speed. The document emphasizes the importance of selecting appropriate encryption methods based on security needs and available resources. Desklib provides this and other solved assignments for students.
tabler-icon-diamond-filled.svg

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: EVALUATION OF AES AND DES
EVALUATION OF AES AND DES
Name of the Student
Name of the University
Author note
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
EVALUATION OF AES AND DES
Table of Contents
Introduction: 2
Discussion: 2
Data Encryption Standard (DES): 2
Potential attacks on DES: 3
AES encryption schemes: 3
DES is not secured:4
AES is secured: 4
References: 5
Document Page
EVALUATION OF AES AND DES
Introduction:
Encryption and signature systems are key cryptographic instruments in public key
settings to provide confidentiality and authenticity. Until recently, the construction blocks of
different cryptographic systems have been considered significant, but different, and have
been designed and analysed individually. The distinction between the activities can be seen as
natural because encryption is designed to provide confidentiality, while signatures are used to
authenticate the operation.
The most fundamental one is probably in safe e-mailing, where each message should
be authenticated and encrypted. The following configurations are necessary. The recognized
solutions of both component parts could be a simple solution to offer confidentiality and
authenticity simultaneously. But, since both safety objectives are so prevalent and indeed an
essential task, it is reasonable that a tailored solution should be provided for the mixture.
Discussion:
Data Encryption Standard (DES):
It is an obsolete symmetric key information encryption technique, which is Data
Encryption Standard (DES). DES works using the same key, so the recipient and the recipient
both need to know using the same encryption key to encrypt and decrypt the message. DES is
replaced with the safer Advanced Encryption Standard (AES) algorithm after the go-to,
symmetric key-algorithm for electronic data encryption (Bhanot and Hans 2015).
The Block Cipher Data Encryption Standard, meaning that a cryptographic key and
algorithm are simultaneously used instead of one bit at a time for a block of data. DES
organizes the signal in 64-bit blocks to encrypt the plaintext signal. Each block is enciphered
by permutation and replacement using the secret key to a 64-bit cipher-text. The method
Document Page
EVALUATION OF AES AND DES
consists of 16 rounds and can be used in four distinct modes, encrypted blocks or made
dependent on all prior blocks for each cipher block.
Potential attacks on DES:
Brute-force Attack: The primary concept is to check all possible keys systematically
until the proper key is discovered. In the worst case, the whole search space would be
covered. They will always discover a way forward.
Differential cryptanalysis: Differential encryption analysis is a plaintext attack
selected to analyze the difference between the respective ciphertexts in two plaintext texts
(Miroshnik and Kovalenko 2013). The linear attack is comparable. The major differential in
comparing the x-or two inputs to the x-or two outputs is the differential cryptanalysis.
AES encryption schemes:
The Advanced Encryptive Standard (AES) is the most common and common
symmetric encryption algorithm that can now be found. At least six times quicker than three
DES. It is discovered. It was necessary to replace DES because its main size was too tiny. It
was regarded vulnerable against a comprehensive search attack by enhancing computing
capacity. Triple DES was conceived to overcome the inconvenience, but slowly.
AES's algebraic structure is relatively easy. In 2002, Nicolas Courtois, and Josef
Pieprzyk, reportedly reported a weakness in AES, partly as a result of their small complexity
of nonlinear parts, a theoretical attack called the "XSL attack." In 2002, the attack was
reported. Other documents have demonstrated since that time that the attack, as initially
shown, is unworkable; see XSL attack on ciphers block (Daemen and Rijmen 2013).
In 2009, a fresh attack, which took advantage of the simplicity of the main program
for AES and had a complexity of 2119 was found. It was updated to 299.5 in December 2009.
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
EVALUATION OF AES AND DES
This is a follow-up to an assault by Alex Biryukov, Dmitry Khovratovich and Ivica Nikolić,
found previously in 2009 with a complexity of 296 keys per 235 keys.
DES is not secured:
DES can no longer be regarded safe, the Data Encryption Standard. Although no
significant failures are recognized in its innermost parts, the 56-bit key is essentially
unknown. It is susceptible to searching for the whole main room by brutally-focused
computers or by dedicated hardware even more rapidly. This refers naturally to any other
cipher with just a 56-bit key. The only reason that anyone could use a 56-bit or 64-bit key is
because they comply with different export legislation that guarantees the use of broken
ciphers.
AES is secured:
The Galois field theory is widely used by the AES, A field from Galois is a field with
a set of finite elements. A field is a set on which addition, multiplication, subtraction and
division activities comply with some regulations. As they come in useful, we'll mention these
rules – don't worry about it too much (Singh 2013).
AES works very rapidly, in relation to its strength. The MixColumns can replace
SubBytes and the propagation with a 256 bytes lookup table. Its simplicity makes operations
very quick and easy on hardware to carry out. The reasons are all why Rijndael has been
selected as an AES by NIST.
Document Page
EVALUATION OF AES AND DES
References:
Bhanot, R. and Hans, R., 2015. A review and comparative analysis of various encryption
algorithms. International Journal of Security and Its Applications, 9(4), pp.289-306.
Daemen, J. and Rijmen, V., 2013. The design of Rijndael: AES-the advanced encryption
standard. Springer Science & Business Media.
Miroshnik, M.A. and Kovalenko, M.A., 2013. Uses of programmable logic integrated circuits
for implementations of data encryption standard and its experimental linear
cryptanalysis. Iнформацiйно-керуючi системи на залiзничному транспортi, (6), pp.36-
44.
Singh, G., 2013. A study of encryption algorithms (RSA, DES, 3DES and AES) for
information security. International Journal of Computer Applications, 67(19).
chevron_up_icon
1 out of 6
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]