Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper

-

July Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the July 2023 Edition of the journal. The last date of research paper submission is June 15, 2023.

Formal method for Cryptography using DES – Tables

Saad Abdual Azize Al-ani, Bilal Sadiq Obaid Al-kubaysi Published in Security

International Journal of Applied Information Systems
Year of Publication 2012
© 2010 by IJAIS Journal
http:/ijais12-450431
Download full text
  1. Saad Abdual Azize Al-ani and Bilal Sadiq Obaid Al-kubaysi. Article: Formal method for Cryptography using DES – Tables. International Journal of Applied Information Systems 3(1):17-20, July 2012. BibTeX

    @article{key:article,
    	author = "Saad Abdual Azize Al-ani and Bilal Sadiq Obaid Al-kubaysi",
    	title = "Article: Formal method for Cryptography using DES – Tables",
    	journal = "International Journal of Applied Information Systems",
    	year = 2012,
    	volume = 3,
    	number = 1,
    	pages = "17-20",
    	month = "July",
    	note = "Published by Foundation of Computer Science, New York, USA"
    }
    

Abstract

In this paper, a new approach is presented to develop the DES algorithm. Where DES is un-linear complex encryption system able to encrypt the information in high speed once applied onto entities that manipulate it. DES – Table is the new schema that uses two tables to encrypt the input as 64 bits and the out is 56 bits of cipher, and then use two inverse tables to decrypt the cipher to return the input from 56 bits of cipher to 64 bit of plaintext. By this schema we achieve emboldening results with maximum possible of confusion, non-obviousness and complexity of ciphering. [1]

Reference

  1. William Stallings. "Cryptography and Network Security", 2006. Person Education, New Jersey.
  2. WadeTrappe, Lawrence C. Washington. "Cryptography with Coding Theory". 2002, Preafice-Hall, New Jersey.
  3. Sean Simmons. "Algebraic Crypto Analysis of Simplified AES ", 2004, 33, 4. Proquest Science Journals.
  4. D. R. Stinson, "Cryptography Theory and Practice" CRC Press, Inc. , 2002.
  5. T. Sheldon and B. Sur, "Cryptography", Pan American and International, 2001. http:// www. Linktionary. com/cryptography. htm
  6. F. Piper and S. Murphy, "Cryptography: A very short introduction", Oxford university press, 2002. http:// www. Books24×7. com/Refrenceware for professionals. htm

Keywords

Cryptography, Des - Table, Encryption, Decryption, Network Security, Computer Security, Ip Table, Ip-1 Table, Exp, Exp-1, Cipher, Plaintext, Key, Ascii, Decimal, Xor