An Efficient Optimization and Secured Triple Data Encryption Standard Using Enhanced Key Scheduling Algorithm

As a result of advancement in technology, the transfer rate of digital data through cryptographic embedded devices such as smart cards is increasing rapidly and these devices are vulnerable to attacks. Cryptography provides various algorithms to secure the data. Triple Data Encryption Standard (Trip...

Full description

Saved in:
Bibliographic Details
Published in:Procedia computer science Vol. 171; pp. 1054 - 1063
Main Authors: Vuppala, Akshitha, Roshan, R Sai, Nawaz, Shaik, Ravindra, JVR
Format: Journal Article
Language:English
Published: Elsevier B.V 2020
Subjects:
ISSN:1877-0509, 1877-0509
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Abstract As a result of advancement in technology, the transfer rate of digital data through cryptographic embedded devices such as smart cards is increasing rapidly and these devices are vulnerable to attacks. Cryptography provides various algorithms to secure the data. Triple Data Encryption Standard (Triple-DES) algorithm [1] is one such and uses the Data Encryption Standard (DES) block thrice this reinforces the key size to 192 bits. The reliability of data can be made progressive by procuring the keys. In Triple-DES, the key generation does not undergo encryption, making the job of the cryptanalyst easy. A strategy must be followed to make the keys more reliable and avoid the glitches in the power traces to make it more strenuous for them. To satisfy the above requirement FORTIS algorithm has been proposed for generation of sub-keys and investigates the strength of the algorithm against side-channel power attacks using ChipWhisperer®-Lite and Artix FPGA as target board. The number of glitches that represent the leakage power are approximately reduced by 53.3% and from the power traces of key schedule algorithm it is seen that all the instructions being performed are similar, so it becomes difficult to identify which operation is being performed and the probability of guessing entropy has been reduced in 86.6% of the cases.
AbstractList As a result of advancement in technology, the transfer rate of digital data through cryptographic embedded devices such as smart cards is increasing rapidly and these devices are vulnerable to attacks. Cryptography provides various algorithms to secure the data. Triple Data Encryption Standard (Triple-DES) algorithm [1] is one such and uses the Data Encryption Standard (DES) block thrice this reinforces the key size to 192 bits. The reliability of data can be made progressive by procuring the keys. In Triple-DES, the key generation does not undergo encryption, making the job of the cryptanalyst easy. A strategy must be followed to make the keys more reliable and avoid the glitches in the power traces to make it more strenuous for them. To satisfy the above requirement FORTIS algorithm has been proposed for generation of sub-keys and investigates the strength of the algorithm against side-channel power attacks using ChipWhisperer®-Lite and Artix FPGA as target board. The number of glitches that represent the leakage power are approximately reduced by 53.3% and from the power traces of key schedule algorithm it is seen that all the instructions being performed are similar, so it becomes difficult to identify which operation is being performed and the probability of guessing entropy has been reduced in 86.6% of the cases.
Author Roshan, R Sai
Vuppala, Akshitha
Nawaz, Shaik
Ravindra, JVR
Author_xml – sequence: 1
  givenname: Akshitha
  surname: Vuppala
  fullname: Vuppala, Akshitha
  email: akshithavuppala98@gmail.com
– sequence: 2
  givenname: R Sai
  surname: Roshan
  fullname: Roshan, R Sai
  email: rangavajjalaroshankumar@gmail.com
– sequence: 3
  givenname: Shaik
  surname: Nawaz
  fullname: Nawaz, Shaik
  email: shaiknawaz787@gmail.com
– sequence: 4
  givenname: JVR
  surname: Ravindra
  fullname: Ravindra, JVR
  email: jayanthi@ieee.org
BookMark eNqFkMtOAjEUhhuDiYg8gZu-AGM791m4IIiXSMICWDflzCmUzHQmnWKCT28HXBgX2k2bc_7vT_rdkoFpDBJyz1nAGU8fDkFrG-iCkIUsYHHAeXRFhjzPsglLWDH48b4h4647MH-iPC94NiT11NC5Uho0GkeXrdO1_pRON4ZKU9IVwtFiSddWtxXSJ-kknRuwp_YcWTkfkrakm06bnd_spQEff8cTXcEey2PVz6fVrrHa7es7cq1k1eH4-x6RzfN8PXudLJYvb7PpYgJhGkWTrcIthzxMQwgjFkNaqJSpOIwBwjJLopgh4hagLBgqmSVZmaokiQueJ8DRV4xIdOkF23SdRSVaq2tpT4Iz0UsTB3GWJnppgsXCS_NU8YsC7c4unJW6-od9vLDov_Wh0YquV-plaIvgRNnoP_kvrUqM9w
CitedBy_id crossref_primary_10_1007_s11042_022_13165_8
crossref_primary_10_1371_journal_pone_0259956
crossref_primary_10_3390_bdcc6040101
crossref_primary_10_1016_j_matpr_2021_10_332
crossref_primary_10_1007_s00500_023_08188_8
crossref_primary_10_1007_s00500_021_06479_6
crossref_primary_10_1007_s11227_023_05115_4
crossref_primary_10_1007_s12652_022_04379_7
crossref_primary_10_1007_s10773_023_05376_y
crossref_primary_10_1007_s11036_021_01753_1
crossref_primary_10_1016_j_jvcir_2022_103691
crossref_primary_10_1088_1742_6596_1997_1_012031
Cites_doi 10.1109/AIAIM.2019.8632786
10.1049/ip-cds:20030574
10.1109/ISSCS.2017.8034875
10.1109/ICCECE.2017.8526233
10.1109/IWAIT.2018.8369682
10.1109/DCABES.2012.42
10.1109/MENACOMM.2018.8371019
10.1109/ICSESS.2014.6933619
10.1109/ICDMA.2012.29
10.1109/FPL.2006.311315
ContentType Journal Article
Copyright 2020
Copyright_xml – notice: 2020
DBID 6I.
AAFTH
AAYXX
CITATION
DOI 10.1016/j.procs.2020.04.113
DatabaseName ScienceDirect Open Access Titles
Elsevier:ScienceDirect:Open Access
CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1877-0509
EndPage 1063
ExternalDocumentID 10_1016_j_procs_2020_04_113
S1877050920310917
GroupedDBID --K
0R~
0SF
1B1
457
5VS
6I.
71M
AACTN
AAEDT
AAEDW
AAFTH
AAIKJ
AALRI
AAQFI
AAXUO
ABMAC
ACGFS
ADBBV
ADEZE
AEXQZ
AFTJW
AGHFR
AITUG
ALMA_UNASSIGNED_HOLDINGS
AMRAJ
E3Z
EBS
EJD
EP3
FDB
FNPLU
HZ~
IXB
KQ8
M41
M~E
NCXOZ
O-L
O9-
OK1
P2P
RIG
ROL
SES
SSZ
9DU
AAYWO
AAYXX
ABWVN
ACRPL
ACVFH
ADCNI
ADNMO
ADVLN
AEUPX
AFPUW
AIGII
AKBMS
AKRWK
AKYEP
CITATION
~HD
ID FETCH-LOGICAL-c2633-bfeb1c8262c2304c69f60f424cc2d75340eeebccd90efa757d6f5549185c1e263
ISSN 1877-0509
IngestDate Sat Nov 29 06:54:28 EST 2025
Tue Nov 18 22:22:53 EST 2025
Tue May 16 22:33:23 EDT 2023
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Keywords DES
VLSI
Hardware security
Encryption Standard
Language English
License This is an open access article under the CC BY-NC-ND license.
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c2633-bfeb1c8262c2304c69f60f424cc2d75340eeebccd90efa757d6f5549185c1e263
OpenAccessLink https://dx.doi.org/10.1016/j.procs.2020.04.113
PageCount 10
ParticipantIDs crossref_primary_10_1016_j_procs_2020_04_113
crossref_citationtrail_10_1016_j_procs_2020_04_113
elsevier_sciencedirect_doi_10_1016_j_procs_2020_04_113
PublicationCentury 2000
PublicationDate 2020
2020-00-00
PublicationDateYYYYMMDD 2020-01-01
PublicationDate_xml – year: 2020
  text: 2020
PublicationDecade 2020
PublicationTitle Procedia computer science
PublicationYear 2020
Publisher Elsevier B.V
Publisher_xml – name: Elsevier B.V
References Zhou Yingbing, Li Yongzhen (2014) "The design and implementation of a symmetric encryption algorithm based on DES," in IEEE international conference on software engineering and Service Science.
H. Rehman, S. Jamshed, Absar ul Haq (2002) "Why triple DES with 128-bit key and not Rijandel should be AES," in IEEE Students Conference.
Jian Zhang, Xuling Jin (2012) "Encryption System Design Based on DES and SHA-1," in International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
Mohamad Noura, Hassan N.Noura, Ali chehab, Mohammad M. Mansour, Raphel Couturier (2018) "S-DES: An efficient and secure DES variant." in Middle East and North Africa COMMunications Conference (MENACOMM).
Hsiu-Pang Yeh, Yue-Shan Chang, Chia-Feng Lin, Shyan-Ming Yuan (2011) "Accelerating 3-DES Performance Using GPU," in International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
Srivatava, Singh, Gupta, Raj (bib0008) 2016
M. Mc Loone, J.V. McCanny (2003) "High-performance FPGA implementation of DES using a novel method for implementing the Key schedule," in IEEE Proceedings – Circuits, Devices and Systems.
Harshali. D. Zodpe, Prakash W.Wani, Rakesh R. Mehta (2012) "Design and implementation of algorithm for DES cryptanalysis," in International Conference on Hybrid Intelligent Systems.
Linxian Zhi (2012) "Research of Image Encryption Algorithm Based on S-DES," in IEEE International Conference on Computer Science and Electronics Engineering.
P. Kitsos, S. Goudevenos, and O. Koufopavlou (2003) "VLSI implementations of the triple-DES block cipher", in International Conference on Electronics Circuits and Systems (ICECS).
Saptarshi Mitra, Bappaditya Jana, Jayanta Poray (2017) "Implementation of novel security techniques using Triple-DES in cashless transactions," in International Conference on Computer, Electrical and Communication Engineering (ICCECE).
I. Raja Sekhar Reddy, G. Murali (2017) "A novel triple DES to enhance E-governance security," in International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
P. Hamalainen, M. Hannikainen, T. Hamalainen, J.Saarinen (2001) "Configurable hardware implementation of triple-DES encryption algorithm for wireless local area network," in IEEE International Conference on Acoustics, Speech, and Signal Processing.
F.-x. Standaert, G. Rouvroy, J.-j. Quisquater (2006) "FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks", in International Conference on Field Programmable logic and Applications.
L Jie, Lv Yuxiang, Sun Huafang, Shan Weiwei (2012) "A Power Analysis Resistant DES Cryptographic Algorithm and its Hardware Design," in IEEE International Conference on Digital Manufacturing and Automation.
Li Wang, Guangling Jiang (2019) "The Design of 3-DES Encryption System Using Optimizing Keys", in China-Qatar International Workshop on Artificial Intelligence and Applications to Intelligent Manufacturing (AIAIM).
Tom T. Karygiannis, L Owens Reading (2002) "Wireless Network Security: 802.11, Bluetooth and Handheld Devices. "
Luminita Scripcariu, Petre-Daniel Matasaru (2017) "Extended DES algorithm to Galois Fields," in International Symposium on Signals, Circuits and Systems(ISSCS).
John Kelsey, Bruce Schneier, David Wagner (2001) "Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES," in Annual International Cryptology Conference.
Reatrey Pich, Sorawat Chivapreecha, Jaruwit Prabnasak (2018) "A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES," in International Workshop on Advanced Image Technology (IWAIT).
Mohammed M. Alani (2010) "DES96- improved DES security," in International Multi- Conference on Systems, Signals and Devices.
10.1016/j.procs.2020.04.113_bib00012
10.1016/j.procs.2020.04.113_bib00011
10.1016/j.procs.2020.04.113_bib00010
10.1016/j.procs.2020.04.113_bib00021
10.1016/j.procs.2020.04.113_bib00020
10.1016/j.procs.2020.04.113_bib00016
10.1016/j.procs.2020.04.113_bib00015
10.1016/j.procs.2020.04.113_bib00014
10.1016/j.procs.2020.04.113_bib00013
Srivatava (10.1016/j.procs.2020.04.113_bib0008) 2016
10.1016/j.procs.2020.04.113_bib0003
10.1016/j.procs.2020.04.113_bib0002
10.1016/j.procs.2020.04.113_bib0005
10.1016/j.procs.2020.04.113_bib0004
10.1016/j.procs.2020.04.113_bib0007
10.1016/j.procs.2020.04.113_bib0006
10.1016/j.procs.2020.04.113_bib0009
10.1016/j.procs.2020.04.113_bib00019
10.1016/j.procs.2020.04.113_bib00018
10.1016/j.procs.2020.04.113_bib00017
10.1016/j.procs.2020.04.113_bib0001
References_xml – reference: Harshali. D. Zodpe, Prakash W.Wani, Rakesh R. Mehta (2012) "Design and implementation of algorithm for DES cryptanalysis," in International Conference on Hybrid Intelligent Systems.
– reference: Saptarshi Mitra, Bappaditya Jana, Jayanta Poray (2017) "Implementation of novel security techniques using Triple-DES in cashless transactions," in International Conference on Computer, Electrical and Communication Engineering (ICCECE).
– reference: H. Rehman, S. Jamshed, Absar ul Haq (2002) "Why triple DES with 128-bit key and not Rijandel should be AES," in IEEE Students Conference.
– reference: Tom T. Karygiannis, L Owens Reading (2002) "Wireless Network Security: 802.11, Bluetooth and Handheld Devices. "
– reference: Linxian Zhi (2012) "Research of Image Encryption Algorithm Based on S-DES," in IEEE International Conference on Computer Science and Electronics Engineering.
– reference: M. Mc Loone, J.V. McCanny (2003) "High-performance FPGA implementation of DES using a novel method for implementing the Key schedule," in IEEE Proceedings – Circuits, Devices and Systems.
– reference: Reatrey Pich, Sorawat Chivapreecha, Jaruwit Prabnasak (2018) "A single, triple chaotic cryptography using chaos in digital filter and its own comparison to DES and triple DES," in International Workshop on Advanced Image Technology (IWAIT).
– reference: Li Wang, Guangling Jiang (2019) "The Design of 3-DES Encryption System Using Optimizing Keys", in China-Qatar International Workshop on Artificial Intelligence and Applications to Intelligent Manufacturing (AIAIM).
– reference: Mohamad Noura, Hassan N.Noura, Ali chehab, Mohammad M. Mansour, Raphel Couturier (2018) "S-DES: An efficient and secure DES variant." in Middle East and North Africa COMMunications Conference (MENACOMM).
– reference: Luminita Scripcariu, Petre-Daniel Matasaru (2017) "Extended DES algorithm to Galois Fields," in International Symposium on Signals, Circuits and Systems(ISSCS).
– reference: Zhou Yingbing, Li Yongzhen (2014) "The design and implementation of a symmetric encryption algorithm based on DES," in IEEE international conference on software engineering and Service Science.
– reference: John Kelsey, Bruce Schneier, David Wagner (2001) "Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES," in Annual International Cryptology Conference.
– reference: I. Raja Sekhar Reddy, G. Murali (2017) "A novel triple DES to enhance E-governance security," in International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS).
– reference: Mohammed M. Alani (2010) "DES96- improved DES security," in International Multi- Conference on Systems, Signals and Devices.
– reference: P. Hamalainen, M. Hannikainen, T. Hamalainen, J.Saarinen (2001) "Configurable hardware implementation of triple-DES encryption algorithm for wireless local area network," in IEEE International Conference on Acoustics, Speech, and Signal Processing.
– reference: Jian Zhang, Xuling Jin (2012) "Encryption System Design Based on DES and SHA-1," in International Symposium on Distributed Computing and Applications to Business, Engineering and Science.
– reference: Hsiu-Pang Yeh, Yue-Shan Chang, Chia-Feng Lin, Shyan-Ming Yuan (2011) "Accelerating 3-DES Performance Using GPU," in International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery.
– reference: P. Kitsos, S. Goudevenos, and O. Koufopavlou (2003) "VLSI implementations of the triple-DES block cipher", in International Conference on Electronics Circuits and Systems (ICECS).
– year: 2016
  ident: bib0008
  publication-title: Digital watermarking using spatial domain and triple DES
– reference: F.-x. Standaert, G. Rouvroy, J.-j. Quisquater (2006) "FPGA Implementations of the DES and Triple-DES Masked Against Power Analysis Attacks", in International Conference on Field Programmable logic and Applications.
– reference: L Jie, Lv Yuxiang, Sun Huafang, Shan Weiwei (2012) "A Power Analysis Resistant DES Cryptographic Algorithm and its Hardware Design," in IEEE International Conference on Digital Manufacturing and Automation.
– ident: 10.1016/j.procs.2020.04.113_bib0004
  doi: 10.1109/AIAIM.2019.8632786
– ident: 10.1016/j.procs.2020.04.113_bib00016
  doi: 10.1049/ip-cds:20030574
– ident: 10.1016/j.procs.2020.04.113_bib00011
– ident: 10.1016/j.procs.2020.04.113_bib00014
– year: 2016
  ident: 10.1016/j.procs.2020.04.113_bib0008
– ident: 10.1016/j.procs.2020.04.113_bib0005
  doi: 10.1109/ISSCS.2017.8034875
– ident: 10.1016/j.procs.2020.04.113_bib00020
– ident: 10.1016/j.procs.2020.04.113_bib0006
  doi: 10.1109/ICCECE.2017.8526233
– ident: 10.1016/j.procs.2020.04.113_bib00019
  doi: 10.1109/IWAIT.2018.8369682
– ident: 10.1016/j.procs.2020.04.113_bib00010
  doi: 10.1109/DCABES.2012.42
– ident: 10.1016/j.procs.2020.04.113_bib00013
  doi: 10.1109/MENACOMM.2018.8371019
– ident: 10.1016/j.procs.2020.04.113_bib0009
– ident: 10.1016/j.procs.2020.04.113_bib00017
  doi: 10.1109/ICSESS.2014.6933619
– ident: 10.1016/j.procs.2020.04.113_bib00021
– ident: 10.1016/j.procs.2020.04.113_bib00015
  doi: 10.1109/ICDMA.2012.29
– ident: 10.1016/j.procs.2020.04.113_bib0003
– ident: 10.1016/j.procs.2020.04.113_bib00018
– ident: 10.1016/j.procs.2020.04.113_bib00012
  doi: 10.1109/FPL.2006.311315
– ident: 10.1016/j.procs.2020.04.113_bib0001
– ident: 10.1016/j.procs.2020.04.113_bib0002
– ident: 10.1016/j.procs.2020.04.113_bib0007
SSID ssj0000388917
Score 2.2114987
Snippet As a result of advancement in technology, the transfer rate of digital data through cryptographic embedded devices such as smart cards is increasing rapidly...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 1054
SubjectTerms DES
Encryption Standard
Hardware security
VLSI
Title An Efficient Optimization and Secured Triple Data Encryption Standard Using Enhanced Key Scheduling Algorithm
URI https://dx.doi.org/10.1016/j.procs.2020.04.113
Volume 171
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVHPJ
  databaseName: ROAD: Directory of Open Access Scholarly Resources (ISSN International Center)
  customDbUrl:
  eissn: 1877-0509
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0000388917
  issn: 1877-0509
  databaseCode: M~E
  dateStart: 20100101
  isFulltext: true
  titleUrlDefault: https://road.issn.org
  providerName: ISSN International Centre
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lj9MwELbKwoELb8Tykg_cSqTESezmWEEREtKCdgvaW-Q4Dslu61bpg-XCD-JXMn6lAaqKPXCJWqtx2s6XmW8m80DoVcykoEymgUhlGQD_JwEnVAaUF4XMCiHirDTDJtjJyej8PPs0GPz0tTDbGVNqdHWVLf-rqGENhK1LZ68h7m5TWIDXIHQ4gtjh-E-CHys9LrkxhY7Dj6AR5q7U0mZp6vg6kMxpa9II3_I1H06UaL871eEjCzaVYKJqmyHwQesYkG-5MeXr49nXRdus63mf25qaA4CbSVPXkyKGzrx6oX7ZLJd8ZgO5l6sazu9swuliVbsnUsMz3nQhav6Nmwj3Wc2brqbolG8bVbY2y9dZVRe4IGFPy44YC3TjGWuE9qx51WzHszjlClQw6RlqcGbjvUbAxiMutAkSuiM7CXU328jWvP7ecvsPU9glKPrct4vcbJLrTfIwAX8pvoFuEgZumE4T_bGL5-muOpkZ8Nz9Et_kyqQT_vVl9hOhHrmZ3kN3nFeCxxZN99FAqgforp_4gZ0BeIjmY4U7cOE-uDDgBjtwYQsurMGFd-DCHlzYgAt7cGEAF96BC3fgeoQ-v5tM37wP3MCOQBAax0FRgeUX4LASoZ81CJpVNKwSkghBSvCLk1BKCfd_mYWy4ixlJa2AzmbAGUUkYYvH6EgtlHyCMBB9wpNUpLxiCR1FPCpDUtGiioowLll1jIj_93LhutnroSqz_IDojtHr7qSlbeZy-OPUiyV3N4zlmTkg7dCJT693nWfotn5nA3vP0dG63cgX6JbYrptV-9LA7BcJebAP
linkProvider ISSN International Centre
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Efficient+Optimization+and+Secured+Triple+Data+Encryption+Standard+Using+Enhanced+Key+Scheduling+Algorithm&rft.jtitle=Procedia+computer+science&rft.au=Vuppala%2C+Akshitha&rft.au=Roshan%2C+R+Sai&rft.au=Nawaz%2C+Shaik&rft.au=Ravindra%2C+JVR&rft.date=2020&rft.issn=1877-0509&rft.eissn=1877-0509&rft.volume=171&rft.spage=1054&rft.epage=1063&rft_id=info:doi/10.1016%2Fj.procs.2020.04.113&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_procs_2020_04_113
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1877-0509&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1877-0509&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1877-0509&client=summon