DES Algorithm Security Fortification Using Elliptic Curve Cryptography

被引:0
|
作者
Eldeen, Mohamed A. Seif [1 ]
Elkouny, Abdellatif A. [2 ]
Elramly, Salwa [1 ]
机构
[1] Ain Shams Univ, Elect & Commun Dept, Cairo, Egypt
[2] Ahram Canadian Univ, Dept Comp Sci, Cairo, Egypt
关键词
DES; elliptic curve cryptography; block cipher; brute-force attack; statistical attacks; image encryption; security;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The Data Encryption Standard (DES) was a widespread symmetric key block cipher algorithm. It was the most popular used cryptographic scheme. DES's security was a highly contentious and controversial aspect until it became an insecure algorithm in 1999. In this paper, a modification that overcomes the security issue of the DES algorithm is introduced. The enhancement is depending on the art of the Elliptic Curve Cryptography (ECC). The ECC approach is also used to achieve the required key generation and distribution to establish a communication session. Our new ECC-based DES algorithm can be applied to any file format, in this paper it is employed to encrypt and decrypt an image file. Experimental results are carried out with detailed analyses, the results demonstrate that the proposed scheme possesses a very large key space to resist the brute-force attack and it is very immune to statistical attacks. The obtained results show that the ECC-based DES algorithm could be used as a highly secure algorithm.
引用
收藏
页码:335 / 340
页数:6
相关论文
共 50 条
  • [1] Security Protocol Function Using Quantum Elliptic Curve Cryptography Algorithm
    Sudharson, K.
    Arun, S.
    [J]. INTELLIGENT AUTOMATION AND SOFT COMPUTING, 2022, 34 (03): : 1769 - 1784
  • [2] DES Security Reinforcement Using Chaotic Logistic Map and Elliptic Curve Cryptography
    Eldeen, Mohamed A. Seif
    Elkouny, Abdellatif A.
    Elramly, Salwah
    [J]. 2015 2ND INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND SECURITY (ICISS), 2015, : 54 - 57
  • [3] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Qazi, Rosheen
    Qureshi, Kashif Naseer
    Bashir, Faisal
    Islam, Najam Ul
    Iqbal, Saleem
    Arshad, Arsalan
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 12 (01) : 547 - 566
  • [4] Security protocol using elliptic curve cryptography algorithm for wireless sensor networks
    Rosheen Qazi
    Kashif Naseer Qureshi
    Faisal Bashir
    Najam Ul Islam
    Saleem Iqbal
    Arsalan Arshad
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2021, 12 : 547 - 566
  • [5] Security Improvement in Elliptic Curve Cryptography
    Abdullah, Kawther Esaa
    Ali, Nada Hussein M.
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (05) : 122 - 131
  • [6] Improoved MANET security using Elliptic Curve Cryptography and EAACK
    Nikam, Pranjali Deepak
    Raut, Vanita
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMMUNICATION NETWORKS (CICN), 2015, : 1125 - 1129
  • [7] The advantages of elliptic curve cryptography for wireless security
    Lauter, K
    [J]. IEEE WIRELESS COMMUNICATIONS, 2004, 11 (01): : 62 - 67
  • [8] Mobile Communication Security using Galios field in Elliptic Curve Cryptography
    Tejashwini, N.
    Shashikumar, D. R.
    Reddy, Satyanarayan K.
    [J]. 2015 INTERNATIONAL CONFERENCE ON EMERGING RESEARCH IN ELECTRONICS, COMPUTER SCIENCE AND TECHNOLOGY (ICERECT), 2015, : 251 - 256
  • [9] Improvement of existing security system by using Elliptic Curve and Biometric Cryptography
    Rathi, Anu
    Rathi, Divya
    Astya, Rani
    Nand, Parma
    [J]. 2015 INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION & AUTOMATION (ICCCA), 2015, : 994 - 998
  • [10] Augmented security for healthcare data using obfuscation and elliptic curve cryptography algorithm in health cloud environment
    Hema, Sri Vigna V.
    Ramesh, K.
    [J]. CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (26):