IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES

Authors

DOI:

https://doi.org/10.28925/2663-4023.2021.14.118130

Keywords:

algorithm DES; utility; encryption; decryption; algorithm execution time

Abstract

This research dedicated to the review, implementation and analysis of the symmetric encryption algorithm, namely - DES (Data Encryption Standard) that encrypts and decrypts text information. For this algorithm represented not only a verbal description, but also schemes of its execution and examples of implementation. Intermediate results and the results of information encryption / decryption in the implemented algorithm were verified using examples, so we can assume that the algorithm implemented correctly. Comparison of the execution time for the DES algorithm proposed implementation made for two utilities. One of them is OpenSSL, developed using assembler and the capabilities of the C programming language. The other utility developed using programming language Java. The comparison was made according to three criteria: full time from the utility execution start to its completion; the time spent by the process to execute the utility (downtime and time when the processor perform other tasks not accounted); the time taken by the operating system to run a utility, such as reading  or writing the file. The analysis showed that the total execution time is not equal to the total amount of time spent by both the processor and the operating system to execute the utilities. This is due to the following: the total execution time is the real time spent on the execution of the utility; it can measure with a stopwatch. Whereas the time spent by the processor to execute the utility is measured somewhat differently: if two cores execute the same utility for 1 second, the total execution time will be 2 seconds, although in fact one second of time has passed. From the comparison follows the next conclusion: the time spent on encryption is less than the time spent on decryption. The execution time for different utilities is different: the time for OpenSSL utility turned out to be the best, because such an implementation is most adapted to the hardware. The utility in Java turned out to be the worst in terms of execution time. We propose the implementation of the DES algorithm of the nearest execution time to the fastest of the considered. Because a number of hacking possibilities have been found for the symmetric encryption standard DES, in particular due to the small number of possible keys, there is a risk of overriding them. Therefore, to increase crypto currency, other versions of this algorithm have been developed: double DES (2DES), triple DES (3DES), DESX, G-DES. In the future, it is planned to develop a utility based on our proposed implementation of the DES algorithm and to demonstrate the operation of its modifications.

Downloads

Download data is not yet available.

References

Hlynchuk, L., Yatsiuk, C., Kuzmych, O., Bahniuk, N., & Cherniashchuk, N. (2020). Analiz vymoh ta metodolohiia pidboru tem dlia vyvchennia osnov kryptohrafichnoho zakhystu informatsii. COMPUTER-INTEGRATED TECHNOLOGIES: EDUCATION, SCIENCE, PRODUCTION, (41), 16–22. https://doi.org/10.36910/6775-2524-0560-2020-41-03

Hoobi, M. M. (2017). Strong triple data encryption standard algorithm using nth degree truncated polynomial ring unit. Iraqi Journal of Science, 58(3C). https://doi.org/10.24996/ijs.2017.58.3c.19.

Kuznetsov, O. O. ta in. (2014). Obhruntuvannia vymoh, pobuduvannia ta analiz perspektyvnykh symetrychnykh kryptoperetvoren na osnovi blochnykh shyfriv . Visnyk Natsionalnoho universytetu "Lvivska politekhnika", 806, 124–142.

Charbathia, S., Sharma, S. (2014). A comparative study of rivest cipher algorithms. International journal of information & computation technology, 4(17), 1831–1838.

Imamoto, K., & Sakurai, K. (2005). Design and Analysis of Diffie-Hellman-Based Key Exchange Using One-time ID by SVO Logic. Electronic Notes in Theoretical Computer Science, 135(1), 79–94. https://doi.org/10.1016/j.entcs.2005.06.003

Masaaky, M., Synъyty, S. (2019). Zanymatelnaia ynformatyka. Kryptohrafyia. Manha. Moskva : DMK Press.

Babyniuk, O. I., Nahirna, A. M., Nahorna, O. V. (2019). Alhorytm shyfruvannia Lucifer ta yoho kryptoanaliz. Modeliuvannia ta informatsiini systemy v ekonomitsi : zb. nauk. Pr, 98, 13–24.

Cryptology - the data encryption standard and the advanced encryption standard. Encyclopedia Britannica. https://www.britannica.com/topic/cryptology/The-Data-Encryption-Standard-and-the-Advanced-Encryption-Standard#ref794749

Zhang, X., Zhou, Z., & Niu, Y. (2018). An Image Encryption Method Based on the Feistel Network and Dynamic DNA Encoding. IEEE Photonics Journal, 10(4), 1–14. https://doi.org/10.1109/jphot.2018.2859257

Kiernan & Mueller. (2021). Standardizing Security: Surveillance, Human Rights, and the Battle Over Tls 1.3. Journal of Information Policy, 11, 1-25. https://doi.org/10.5325/jinfopoli.11.2021.0001

Babar, P. K., Bhope, V. P. (2016). Design and implement dynamic key generation to enhance DES algorithm. Nternational journal for research in applied science & engineering technology, 4, 465–468.

OpenSSL Quick Reference Guide | DigiCert.com. SSL Digital Certificate Authority - Encryption & Authentication. https://www.digicert.com/kb/ssl-support/openssl-quick-reference-guide.htm.

GitHub - deadlytea/DES: Java implementation of DES for university cryptography course. GitHub. https://github.com/deadlytea/DES.

Smekal, D., Hajny, J., & Martinasek, Z. (2018). Comparative Analysis of Different Implementations of Encryption Algorithms on FPGA Network Cards. IFAC-PapersOnLine, 51(6), 312–317. https://doi.org/10.1016/j.ifacol.2018.07.172

Downloads


Abstract views: 404

Published

2021-12-30

How to Cite

Hlynchuk, L., Hryshanovych, T. ., & Stupin, A. (2021). IMPLEMENTATION OF THE SYMMETRICAL ENCRYPTION STANDARD DES USING C PROGRAMMING LANGUAGE AND COMPARISON ITS EXECUTION TIME WITH OTHER UTILITIES. Electronic Professional Scientific Journal «Cybersecurity: Education, Science, Technique», 2(14), 118–130. https://doi.org/10.28925/2663-4023.2021.14.118130