DES算法的椭圆曲线密码安全加固

Mohamed A. Seif Eldeen, A. Elkouny, S. Elramly
{"title":"DES算法的椭圆曲线密码安全加固","authors":"Mohamed A. Seif Eldeen, A. Elkouny, S. Elramly","doi":"10.1109/ICCES.2015.7393071","DOIUrl":null,"url":null,"abstract":"The Data Encryption Standard (DES) was a widespread symmetric key block cipher algorithm. It was the most popular used cryptographic scheme. DES's security was a highly contentious and controversial aspect until it became an insecure algorithm in 1999. In this paper, a modification that overcomes the security issue of the DES algorithm is introduced. The enhancement is depending on the art of the Elliptic Curve Cryptography (ECC). The ECC approach is also used to achieve the required key generation and distribution to establish a communication session. Our new ECC-based DES algorithm can be applied to any file format, in this paper it is employed to encrypt and decrypt an image file. Experimental results are carried out with detailed analyses, the results demonstrate that the proposed scheme possesses a very large key space to resist the brute-force attack and it is very immune to statistical attacks. The obtained results show that the ECC-based DES algorithm could be used as a highly secure algorithm.","PeriodicalId":227813,"journal":{"name":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"11","resultStr":"{\"title\":\"DES algorithm security fortification using Elliptic Curve Cryptography\",\"authors\":\"Mohamed A. Seif Eldeen, A. Elkouny, S. Elramly\",\"doi\":\"10.1109/ICCES.2015.7393071\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The Data Encryption Standard (DES) was a widespread symmetric key block cipher algorithm. It was the most popular used cryptographic scheme. DES's security was a highly contentious and controversial aspect until it became an insecure algorithm in 1999. In this paper, a modification that overcomes the security issue of the DES algorithm is introduced. The enhancement is depending on the art of the Elliptic Curve Cryptography (ECC). The ECC approach is also used to achieve the required key generation and distribution to establish a communication session. Our new ECC-based DES algorithm can be applied to any file format, in this paper it is employed to encrypt and decrypt an image file. Experimental results are carried out with detailed analyses, the results demonstrate that the proposed scheme possesses a very large key space to resist the brute-force attack and it is very immune to statistical attacks. The obtained results show that the ECC-based DES algorithm could be used as a highly secure algorithm.\",\"PeriodicalId\":227813,\"journal\":{\"name\":\"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)\",\"volume\":\"32 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"11\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCES.2015.7393071\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 Tenth International Conference on Computer Engineering & Systems (ICCES)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCES.2015.7393071","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 11

摘要

数据加密标准(DES)是一种广泛使用的对称密钥分组密码算法。它是最常用的加密方案。DES的安全性在1999年成为一个不安全的算法之前是一个非常有争议和争议的方面。本文介绍了一种克服DES算法安全问题的改进方法。增强取决于椭圆曲线密码术(ECC)的技术。ECC方法还用于实现建立通信会话所需的密钥生成和分发。我们提出的基于ecc的DES算法可以适用于任何文件格式,本文采用该算法对图像文件进行加密和解密。对实验结果进行了详细的分析,结果表明该方案具有很大的密钥空间来抵抗暴力攻击,并且对统计攻击具有很强的免疫力。实验结果表明,基于ecc的DES算法是一种高度安全的算法。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
DES algorithm security fortification using Elliptic Curve Cryptography
The Data Encryption Standard (DES) was a widespread symmetric key block cipher algorithm. It was the most popular used cryptographic scheme. DES's security was a highly contentious and controversial aspect until it became an insecure algorithm in 1999. In this paper, a modification that overcomes the security issue of the DES algorithm is introduced. The enhancement is depending on the art of the Elliptic Curve Cryptography (ECC). The ECC approach is also used to achieve the required key generation and distribution to establish a communication session. Our new ECC-based DES algorithm can be applied to any file format, in this paper it is employed to encrypt and decrypt an image file. Experimental results are carried out with detailed analyses, the results demonstrate that the proposed scheme possesses a very large key space to resist the brute-force attack and it is very immune to statistical attacks. The obtained results show that the ECC-based DES algorithm could be used as a highly secure algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信