A Comparison of The 3DES and AES Encryption Standards: International Journal of Security and Its Applications July 2015
A Comparison of The 3DES and AES Encryption Standards: International Journal of Security and Its Applications July 2015
net/publication/283178410
CITATIONS READS
47 7,304
1 author:
Noura Aleisa
University of Glasgow
5 PUBLICATIONS 127 CITATIONS
SEE PROFILE
All content following this page was uploaded by Noura Aleisa on 28 February 2016.
Noura Aleisa
[email protected]
Abstract
A comparison of two encryption standards, 3DES and AES is presented. It may seem
that DES is insecure and no longer of any use, but that is not the case since the DES and
3DES algorithms are still beyond the capability of most attacks in the present day.
However, the power of computers is increasing and stronger algorithms are required to
face hacker attacks. AES has been designed in software and hardware and it works
quickly and efficiently, even on small devices such as smart phones. With a large block
size and a longer keys, AES will provide more security in the long term.
1. Introduction
It may be surprising to discover that encryption has been known for thousands of years,
and methods have varied from those simply based on paper and pencil to others using
more complex and specialized mechanical equipment, and today has resulted in the use of
computer techniques, encryption applications, and digital signatures.
4000 years ago, the Egyptians used hieroglyphic symbols to confuse the reader and this
is believed to be the first attempt at cryptography. Several other ancient civilizations have
also been found to have used cryptography techniques. For instance, the Arabic
civilization discovered cryptanalytic techniques and were the first to publish a systematic
analysis of cryptography. Another example is the great civilization of India, which has
been shown to have used numerous forms of cryptographic communication. They used a
finger communication system similar to the sign language or signing used by the hearing
and speech impaired today [7]. Cryptography is derived from the Greek word crypto,
which means secret, hidden, or concealed. The idea of cryptography is to allow two
people to communicate using a secure method in such a way that prevents an outsider
from understanding their messages. It is the art of secret writing which allows the passage
of information in hidden form so that only authorized people are able to understand it.
In the present day, any secure communication environment would not be complete
without cryptographic methods. Cryptology can provide a high level of security to any
sensitive information that needs to be protected, such as in emails, file transfers, saved
information on hard disks, backups, and so on. Cryptography is extremely important in
wireless communication because it is easier to break into than a hard-wired network.
The goal of this paper is to present the reader with an introduction to traditional
encryption, the benefits and drawbacks of encryption to the non-professional user, the
security provided by the data encryption algorithm 3DES against attackers, and to discuss
its merits in comparison with one of the first cyphers, AES. In this section, the world of
cryptography is introduced and a brief description of its history is mentioned. In the
second part, the advantages and disadvantages of using different encryption systems are
discussed. In the third part, the 3DES system and its security issues are explained. Finally,
I have introduced the reader is introduced to a comparison between 3DES and AES.
2. Encryption Methodology
There are many reasons why we might want to encrypt data. For instance, individuals
may share the same work space with people they don’t trust. Another reason, in the
business world, is as an extra security layer for a company's sensitive data, such as
financial data, because this information might be of benefit to its competitors.
Furthermore, two people might want to ensure privacy in an email conversation,
transporting important information on a hard disk or a computer could be easy prey to
competitors without encryption, and companies might use encryption to store sensitive
personal data on their clients, such as credit cards information, and medical records.
Cryptology consists of both encryption and decryption; the original information is
referred to as “plaintext”, and the encrypted information as “ciphertext”. To convert the
plaintext to ciphertext an algorithm needs to be implement using a secret key to guarantee
security and create a digital signature. To encrypt plaintext to ciphertext, two types of
keys are available: symmetric or asymmetric.
of the conversation of two people and he has the ability to delete and modify the content
of the messages.
3. Encryption Algorithms
more secure, rather than writing a totally new algorithm. Two main improvements have
resulted in Double DES and Triple DES or 3DES.
Double DES essentially does twice what DES does with two keys uses in one
encryption process. If the attempt to crack the key in DES is 2⁵⁶, then the attempts to
crack two different keys consisting of n bits is 2²ⁿ. However, that is not quite true since
the concept of the meet-in-the-middle attack has been introduced which involves
encryption from one end and decryption from the other and matching the outputs in the
middle.
gives rise to a higher probability of success. Matsui has successfully obtained a key with
243 known plaintexts [7].
Besides, 3DES is not practical when used to encrypt large messages, and there is the
issue of unsafe key transmission between the users. It is considered slow by todays
standards and outdated when compared to modern algorithms such as RC6 and Blowfish.
5. Conclusions
When it comes to security, the winner is undoubtedly AES as it is considered
unbreakable in practical use. After discussing the flaws of DES, thus of 3DES as well, it
may seem that DES is insecure and no longer of any use, but that is not the case. The
1997 attack required a great deal of cooperation and the 1998 machine is too expensive to
implement, and so the DES and 3DES algorithms are still beyond the capability of most
attacks in the present day. However, the power of computers is increasing and stronger
algorithms are required to face hacker attacks. The response to that requirement is AES. It
has been designed in software and hardware and it works quickly and efficiently, even on
small devices such as smart phones. With a larger block size and longer keys using a 128
bit block and with 128, 192 and 256 bit keys, respectively, AES will provide more
security in the long term.
In conclusion, I am pretty confident that I have learned and introduced the main
concepts of traditional cryptography through these four parts. I also believe that I have a
general understanding of Triple Data Encryption Standards and its security issues
comparing with Advanced Encryption Standards.
References
[1] H. Delfs and H. Knebl, “Introduction to Cryptography: Principles and Applications”, Springer-
Verlag, Berlin Heidelberg New York, (2007).
[2] M. E. Flannagan, R. Fuller and J. Khan, “Best Damn Cisco Internet-working Book Period”,
Syngress Publishing, Rockland, (2003).
[3] A. Kahate, “Cryptography and network security”, The Tata McGraw-Hill publishing company
limited, New Delhi, (2003).
[4] R. C. Merkel and M. E. Hellman, “On the Security of Multiple Encryption”, Communications of
the ACM, vol. 24, no. 7, (1981).
[5] E. Maiwald, “Network Security: A beginner's Guide”, Osborne-McGraw Hill, (2001).
[6] Microsoft support, Description of Symmetric and Asymmetric Encryption,
‹http://support.microsoft.com/›, (2007).
[7] R. A. Mollin, “Codes: The Guide To Secrecy From Ancient To Modern Times”, Chapman and
Hall/CRC, Boca Raton, (2005).
[8] C. Paar, J. Pelzl and B. Preneel, “Understanding Cryptography: A Textbook for Students and
Practitioners”, Springer Heidelberg Dordrecht, Bochum, (2010).
[9] V. K. Pachghare, “Cryptography and information security”, PHI learning Private limited, New
Delhi, (2009).
[10] C. P. Pfleeger and S. L. Pfleeger, „Security in Computing”, Pearson education, Inc., New Jersey,
(2003).
[11] T. Sobh, K. Elleithy and A. Mahmood, “Novel Algorithms and Techniques In
Telecommunications”, Automation and Industrial Electronics. Springer Science+ Business Media
B. V., Bridgeport, (2008).
[12] D. R. Stinson, “Cryptography”, Theory and Practice. CRC Press, Inc., Boca Raton, (1995).
[13] P. Van Oorschot and M. J. Wiener, “A Known-Plaintext Attack on Two-Key Triple Encryption”,
Springer- Verlag, Berlin Heidelberg New York, (1990).