TY - JOUR
T1 - DeCrypt
T2 - A 3DES Inspired Optimised Cryptographic Algorithm
AU - Chowdhury, Deepraj
AU - Dey, Ajoy
AU - Garai, Ritam
AU - Adhikary, Subhrangshu
AU - Dwivedi, Ashutosh Dhar
AU - Ghosh, Uttam
AU - Alnumay, Waleed S.
N1 - Published online: 23 September 2022.
PY - 2023/5
Y1 - 2023/5
N2 - Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications. Several attacks were imposed on 3DES, and the biggest threat to 3DES is meet in the middle attack. Therefore for long term security, it is essential to enhance the security of such algorithms. This paper proposed a new cipher DeCrypt inspired by 3DES, an improved version of the 3DES algorithm, and secured against meet in the middle attack. As per the experiment performed, DeCrypt cipher is 61 per cent faster than 3DES, providing long-term and better security against sweet-32 attacks than other symmetric algorithms. The proposed algorithm is also faster than 3DES due to reduced encryption and decryption time.
AB - Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications. Several attacks were imposed on 3DES, and the biggest threat to 3DES is meet in the middle attack. Therefore for long term security, it is essential to enhance the security of such algorithms. This paper proposed a new cipher DeCrypt inspired by 3DES, an improved version of the 3DES algorithm, and secured against meet in the middle attack. As per the experiment performed, DeCrypt cipher is 61 per cent faster than 3DES, providing long-term and better security against sweet-32 attacks than other symmetric algorithms. The proposed algorithm is also faster than 3DES due to reduced encryption and decryption time.
KW - Symmetric cryptography
KW - Feistel cipher
KW - Meet in the middle attack
KW - Sweet-32 attack
KW - Symmetric cryptography
KW - Feistel cipher
KW - Meet in the middle attack
KW - Sweet-32 attack
U2 - 10.1007/s12652-022-04379-7
DO - 10.1007/s12652-022-04379-7
M3 - Journal article
SN - 1868-5137
VL - 14
SP - 4745
EP - 4755
JO - Journal of Ambient Intelligence and Humanized Computing
JF - Journal of Ambient Intelligence and Humanized Computing
IS - 5
ER -