Abstract
In this paper differential attack on S-DES is carried out. S-DES is the reduced version of DES algorithm. This algorithm operates on 8-bit message block with 10-bit key and DES operates on 64-bit message block with 56-bit key. This paper analyzed the differential attack on S-DES. Differential attack is used to break a cipher by trying each possible key.
Highlights
Security is the main concerns of the organizations participating in the information revolution
It has similar properties to DES but deals with a much smaller block and key size. It was designed as a test block cipher for learning about modern cryptanalytic techniques such as differential cryptanalysis
Differential cryptanalysis involves the analysis of the effect of the plaintext pair difference on the resulting ciphertext difference.[4]Consider the following basic linear cipher function: C=P K
Summary
Security is the main concerns of the organizations participating in the information revolution. It has similar properties to DES but deals with a much smaller block and key size (operates on 8-bit message blocks with a 10-bit key). It was designed as a test block cipher for learning about modern cryptanalytic techniques such as differential cryptanalysis. It is a variant of Simplified DES. The same key is used for encryption and decryption. The schedules of addressing the key bits are altered so that the decryption is the reverse of encryption. It is applied to a permutation which is the inverse of the initial permutation. [2]
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: INTERNATIONAL JOURNAL OF MANAGEMENT & INFORMATION TECHNOLOGY
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.