Sie sind auf Seite 1von 5

Name

: Muhammad Raka Perbawa


NPM : 1606844826
Comparison between DES, 3DES & AES

1 DES (Data Encryption Standard)


1.1 Description
DES was developed by IBM with deep
technical consultations from NSA (National
Security Agency) in the late 60s. DES is a 64-bit
block cipher which means its encrypt 64-bit of
data at a time, but DES only use 56-bit for the
key because the other 8-bit is used for parity
checking. DES is based on a cipher known as
Feistel Block Cipher. It consists of a number of
rounds where each round contains bit-
shuffling, non-linear substitutions (S-boxes)
and exclusive OR operations. To encrypt a

plaintext message, DES groups it into 64-bit The DES general structure above can be

blocks. Each block is enciphered using the simply explained as this :

secret key into a 64-bit ciphertext by means of • Plaintext blocks is permutated using

permutation and substitution. Below is the initial permutation (IP) matrix

simple diagram describing DES encryption • The output from initial permutation is

process : then enchipering for 16 rounds. Each


round is using different 48-bit key
schedule (K1, K2, K3, ……, K16).
• Output from enchipering process is
then permutated with invers initial
permutation matrix (IP-1) to create 64-
bit ciphertext block.

From the diagram and simple about 6 hours that make DES is
explanation above, we can conclude that to vulnerable to brute-force attack.
specify DES, all we required are : • DES was designed for hardware
implementation. Thus, software
• Round function
implementation runs relatively slow.
• Key schedule
2 3DES (Triple Data Encryption Standard)
• Initial and final permutation
2.1 Description
1.2 Pros
The growing speed of exhaustive key
The followings are advantages of DES :
search attack to DES has caused discomfort for
• DES have desirable property called
DES users. However, users do not want to
avalanche effect, its mean any small
abandon DES completely, thus, one pragmatic
change in either plaintext or key
approach to change manner of how DES is
should produce significant changes in
used. The modified scheme of DES called 3DES
the ciphertext. This what made DES to
(Triple-DES) is later introduced. 3DES basically
be immune for cryptanalysis attack
a DES but with 3 different keys, so it is essential
since its pattern is very hard to read.
to avoid having same key for each encryption
• DES is an open standards, which
steps since the output will only be a slower
means anybody could use, develop or
version of DES.
modify for their own purposes.
3DES main enhancement is use of 168-
• DES has been around for quite long
time and become the basic foundation bit key rather than DES’s 64-bit key, it provide

for development of several stronger defense against brute-force attack


cryptography algorithms.
but 3 times slower than DES in
1.3 Cons
encryption/decryption process. Encryption
• 56-bit key size is considered weak
since in 1993 there has been a using 3DES is represented as C = E(K3,
machine around that can process 1
D(K2,E(K1,P))). Similarly, decryption is the
million encrypt or decrypt process per
same process backwards: P =
second. And also a DES cracking
machine called Deep Crack which can D(K1,E(K2,D(K3,C))). So for both algorithms,
search the entire key possibilities in
assume:
P= Plaintext • Finally, encrypt the output of step 2
using single DES with key K3.
C = cipher text
• The output of step 3 is the ciphertext.
D= decryption function.
• Decryption of a ciphertext is a reverse
E = encryption function process. User first decrypt using K3,
then encrypt with K2, and finally
Kx = key ordered by placement in operation
decrypt with K1.
Below is diagram that explain 3DES
2.2 Pros
general structure :
The followings are advantages of
3DES:
• proven reliability and a longer key
length that eliminates many of the
attacks that can be used to reduce the
amount of time it takes to break DES.
• 3DES is interoperable, most systems,
libraries, and protocols include
support for it.
• It is much faster than public key
cryptography methods like the RSA
method. This is one of the main
advantages of using a system like
3DES.
• It is easy to implement in both
The encryption-decryption process is as hardware and software compared to
follows − other algorithms.
• It is based on DES which is a very
• Encrypt the plaintext blocks using
trusted cipher. DES has been studied
single DES with key K1.
thoroughly for over 25 years now and
• Now decrypt the output of step 1
is proven to have sound basics though
using single DES with key K2.
the key length is too small now.
2.3 Cons This grouping is based on bit key
The followings are disadvantages of length as depicted in numbers behind word
3DES : AES. Beside the length, one thing that differ
• The transmission of the secret key these type of AES is number of rounds used.
between users is unsafe. This is where AES-128 using 10 rounds, AES-192 using 12
public key cryptography excels. Thus rounds and AES-256 using 14 rounds.
3DES is vulnerable for man-in-the- Diagram below show general scheme
middle attack. of AES :
• 3DES is very slow especially in
software implementations because
DES was designed for performance in
hardware.

3 AES (Advance Encryption Standard)


3.1 Description
Cryptography algorithm called Rijndael
designed by Vincent Rijmen and John Daemen
from Belgium win a contest to find substitute
to obsolete DES. This Rijndael algorithm used
in AES (Advance Encryption Standard). After
several standardization process by NIST ( Generally the process is as follows :
National Institute of Standards & Technology),
• AddRoundKey : XOR between first
Rijndael algorithm then adopted as official
state (ciphertext) with cipher key. This
cryptography standard in 22 May 2002.
process also called initial round
AES is a cipher block algorithm that
• Nr – 1 rounds, processes in each round
use permutation and substitution system (S-
are :
Box & P-Box) not using Feistel as in usual
§ SubBytes : substitute
cipher block. There are 3 types of AES :
bytes with S-Box
• AES-128
§ ShiftRows : shift each array
• AES-192 state column
• AES-256
§ MixColums : shuffle data in /2012/07/des-data-encryption-
each column standard.html
§ AddRoundKey : XOR the 3. Aleisa, N. (2015). A Comparison of the
present state with round key 3DES and AES Encryption Standards.
• Final round : final round in the Internation al Journal of Security and
process are Its Applications, 9(7), 243.
§ SubBytes 4. Stallings, W. (2014). Cryptography and
§ ShiftRows Network Security: Principles and
§ AddRoundKey Practice (6th Edition ed.). Pearson

3.2 Pros Education, Inc.

The followings are advantages of AES : 5. Triple Data Encryption Standard.

• AES is more secure than 3DES, not (n.d.). Retrieved October 5, 2016, from

vulnerable to cryptanalysis like DES. www.vocal.com:

• Faster in both software and hardware https://www.vocal.com/cryptography

implementation. /tdes/

• Has been adopted as standard in US.

3.3 Cons
• AES is considered to have too simple
algebraic structure

4 References
1. Data Encryption Standard. (n.d.).
Retrieved October 4, 2016, from
Tutorialspoint.com:
https://www.tutorialspoint.com/crypt
ography/data_encryption_standard.ht
m
2. Kurniawan, I. (2016, October 4). DES -
Data Encryption Standard -. Retrieved
from studyinformatics.blogspot.co.id:
http://studyinformatics.blogspot.co.id

Das könnte Ihnen auch gefallen