A Novel Approach for Data Encryption Standard Algorithm
Prashanti.G1, Deepthi.S2, Sandhya Rani.K3
1Prashanti.G, Computer Science & Engineering Department, Vignan’s Lara Institute of Technology and Science, Vadlamudi, Guntur, India.
2Deepthi.S, Computer Science & Engineering Department, Vignan’s Lara Institute of Technology and Science, Vadlamudi, Guntur, India.
3Sandhyarani.K, Computer Science & Engineering Department, Vignan’s Lara Institute of Technology and Science, Vadlamudi, Guntur, India.
Manuscript received on May 22, 2013. | Revised Manuscript received on June 10, 2013. | Manuscript published on June 30, 2013. | PP: 264-267 | Volume-2, Issue-5, June 2013. | Retrieval Number: E1787062513/2013©BEIESP

Open Access | Ethics and Policies | Cite
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Now a day’s providing Security for data is complicated task we have so many security methods that are implemented and deployed but out of them few are using and serving the needs of society. And we can’t say that any algorithm is perfect and avoids threats. The main goal of any design of any encryption algorithm must be security against unauthorized attacks. Within the last decade, data in both the private and public sectors are increased which requires Availability, Authentication, Confidentiality, Integrity. In this paper we are considering The DES algorithm that defines the mathematical steps that transform original text (plain text) into a cipher text (secret code) and also transform the cipher text back to the original text. Here introduces a new method to enhance the performance of the Data Encryption Standard (DES) algorithm. This is done by replacing the 8/32 S-Box instead of 6/4 S-Box. The output of each S-Box undergoes AND and XOR operation before going to the permutation P. In this paper we also proposed a new operation Addition modulo instead predefined XOR operation applied during the 16 round of the standard algorithm.
Keywords: DES, Encryption, Decryption, asymmetric cryptography, symmetric cryptography.