DeCrypt: a 3DES inspired optimised cryptographic algorithm

Deepraj Chowdhury, Ajoy Dey, Ritam Garai, Subhrangshu Adhikary, Ashutosh Dhar Dwivedi*, Uttam Ghosh, Waleed S. Alnumay

*Corresponding author for this work

Research output: Contribution to journalJournal articleResearchpeer-review

4 Citations (Scopus)

Abstract

Triple Data Encryption Standard (also known as 3DES) is a symmetric encryption algorithm. European Traffic Management System popularly uses 3DES for authentication and encryption. However, as per a draft published by NIST in 2018, 3DES is officially being retired and not suggested to use for new applications. Several attacks were imposed on 3DES, and the biggest threat to 3DES is meet in the middle attack. Therefore for long term security, it is essential to enhance the security of such algorithms. This paper proposed a new cipher DeCrypt inspired by 3DES, an improved version of the 3DES algorithm, and secured against meet in the middle attack. As per the experiment performed, DeCrypt cipher is 61 per cent faster than 3DES, providing long-term and better security against sweet-32 attacks than other symmetric algorithms. The proposed algorithm is also faster than 3DES due to reduced encryption and decryption time.

Original languageEnglish
JournalJournal of Ambient Intelligence and Humanized Computing
Volume14
Issue number5
Pages (from-to)4745-4755
Number of pages11
ISSN1868-5137
DOIs
Publication statusPublished - May 2023
Externally publishedYes

Bibliographical note

Funding Information:
The work of Ashutosh Dhar Dwivedi is supported by the Independent Research Fund Denmark for Technology and Production under Grant 8022-00348A. Waleed Al-Numay acknowledges financial support from the Researchers Supporting Project number (RSP-2021/250), King Saud University, Riyadh, Saudi Arabia.

Publisher Copyright:
© 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.

Keywords

  • Feistel cipher
  • Meet in the middle attack
  • Sweet-32 attack
  • Symmetric cryptography

Fingerprint

Dive into the research topics of 'DeCrypt: a 3DES inspired optimised cryptographic algorithm'. Together they form a unique fingerprint.

Cite this