CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

Formal method for Cryptography using DES � Tables

by Saad Abdual Azize Al-ani, Bilal Sadiq Obaid Al-kubaysi
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 3 - Number 1
Year of Publication: 2012
Authors: Saad Abdual Azize Al-ani, Bilal Sadiq Obaid Al-kubaysi
http:/ijais12-450431

Saad Abdual Azize Al-ani, Bilal Sadiq Obaid Al-kubaysi . Formal method for Cryptography using DES � Tables. International Journal of Applied Information Systems. 3, 1 ( July 2012), 17-20. DOI=http:/ijais12-450431

@article{ http:/ijais12-450431,
author = { Saad Abdual Azize Al-ani, Bilal Sadiq Obaid Al-kubaysi },
title = { Formal method for Cryptography using DES � Tables },
journal = { International Journal of Applied Information Systems },
issue_date = { July 2012 },
volume = { 3 },
number = { 1 },
month = { July },
year = { 2012 },
issn = { 2249-0868 },
pages = { 17-20 },
numpages = {9},
url = { https://www.ijais.org/archives/volume3/number1/195-0431/ },
doi = { http:/ijais12-450431 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T10:45:15.650092+05:30
%A Saad Abdual Azize Al-ani
%A Bilal Sadiq Obaid Al-kubaysi
%T Formal method for Cryptography using DES � Tables
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 3
%N 1
%P 17-20
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, a new approach is presented to develop the DES algorithm. Where DES is un-linear complex encryption system able to encrypt the information in high speed once applied onto entities that manipulate it. DES – Table is the new schema that uses two tables to encrypt the input as 64 bits and the out is 56 bits of cipher, and then use two inverse tables to decrypt the cipher to return the input from 56 bits of cipher to 64 bit of plaintext. By this schema we achieve emboldening results with maximum possible of confusion, non-obviousness and complexity of ciphering. [1]

References
  1. William Stallings. "Cryptography and Network Security", 2006. Person Education, New Jersey.
  2. WadeTrappe, Lawrence C. Washington. "Cryptography with Coding Theory". 2002, Preafice-Hall, New Jersey.
  3. Sean Simmons. "Algebraic Crypto Analysis of Simplified AES ", 2004, 33, 4. Proquest Science Journals.
  4. D. R. Stinson, "Cryptography Theory and Practice" CRC Press, Inc. , 2002.
  5. T. Sheldon and B. Sur, "Cryptography", Pan American and International, 2001. http:// www. Linktionary. com/cryptography. htm
  6. F. Piper and S. Murphy, "Cryptography: A very short introduction", Oxford university press, 2002. http:// www. Books24×7. com/Refrenceware for professionals. htm
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Des - Table Encryption Decryption Network Security Computer Security Ip Table Ip-1 Table Exp Exp-1 Cipher Plaintext Key Ascii Decimal Xor