EST

Call for paper
April Edition 2017

International Journal of Applied Information Systems solicits high quality original research papers for the
March 15, 2017
April 2017 Edition of the journal.
The last date of research paper submission is
March 15, 2017
SUBMIT YOUR PAPER

Number 1

Formal method for Cryptography using DES – Tables

journal image
 Download
1074
  • Saad Abdual Azize Al-ani and Bilal Sadiq Obaid Al-kubaysi 2012. Formal method for Cryptography using DES – Tables. International Journal of Applied Information Systems. 3, 1 (July 2012), 17-20. DOI=http://dx.doi.org/10.5120/ijais450431
  • @article{10.5120/ijais2017451568,
    author = {Saad Abdual Azize Al-ani and Bilal Sadiq Obaid Al-kubaysi},
    title = {Formal method for Cryptography using DES – Tables},
    journal = {International Journal of Applied Information Systems},
    issue_date = {July 2012},
    volume = {3},
    number = {},
    month = {July},
    year = {2012},
    issn = {},
    pages = {17-20},
    numpages = {},
    url = {/archives/volume3/number1/195-0431},
    doi = { http:/ijais12-450431},
    publisher = { xA9 2010 by IJAIS Journal},
    address = {}
    }
    
  • %1 450431
    %A Saad Abdual Azize Al-ani
    %A Bilal Sadiq Obaid Al-kubaysi
    %T Formal method for Cryptography using DES – Tables
    %J International Journal of Applied Information Systems
    %@ 
    %V 3
    %N 
    %P 17-20
    %D 2012
    %I  xA9 2010 by IJAIS Journal
    

Abstract

In this paper, a new approach is presented to develop the DES algorithm. Where DES is un-linear complex encryption system able to encrypt the information in high speed once applied onto entities that manipulate it. DES – Table is the new schema that uses two tables to encrypt the input as 64 bits and the out is 56 bits of cipher, and then use two inverse tables to decrypt the cipher to return the input from 56 bits of cipher to 64 bit of plaintext. By this schema we achieve emboldening results with maximum possible of confusion, non-obviousness and complexity of ciphering. [1]

References

  1. William Stallings. "Cryptography and Network Security", 2006. Person Education, New Jersey.
  2. WadeTrappe, Lawrence C. Washington. "Cryptography with Coding Theory". 2002, Preafice-Hall, New Jersey.
  3. Sean Simmons. "Algebraic Crypto Analysis of Simplified AES ", 2004, 33, 4. Proquest Science Journals.
  4. D. R. Stinson, "Cryptography Theory and Practice" CRC Press, Inc. , 2002.
  5. T. Sheldon and B. Sur, "Cryptography", Pan American and International, 2001. http:// www. Linktionary. com/cryptography. htm
  6. F. Piper and S. Murphy, "Cryptography: A very short introduction", Oxford university press, 2002. http:// www. Books24xD77. com/Refrenceware for professionals. htm

Keywords

Cryptography, Des - Table, Encryption, Decryption, Network Security, Computer Security, Ip Table, Ip-1 Table, Exp, Exp-1, Cipher, Plaintext, Key, Ascii, Decimal, Xor

Index Terms

Computer Science
Information Sciences