synthesis of 64-bit triple data encryption standard algorithm using vhdl

4
@ IJTSRD | Available Online @ www ISSN No: 245 Inte R Synthesis of Standa Sim 1 M.Tech Student, Department of Elec 2 Assistant Professor, Department of El ABSTRACT Data security is the most important r today’s world, to transmit digital data f to another. We need to secure the trans the transmitting end so that no unautho access it. To encrypt the data at the tran and decrypt the data at the receiving poi communication security[8] . Only the a can get back the original text, provided secret key. Cryptography is a techniqu protected data between two points ‘Cryptography’ was invented by co Greek words, ‘Krypto’ meaning ‘graphene’ meaning writing. Cryptog study of mathematical techniques related various information data security. I protection of data on unsecured chann the data in encrypt (coded)form. Basic two cryptography techniques for digital depending on how the encryption- carried out in the system, Symmetric and Asymmetric Cryptography. DES, T IDEA, AND BLOWFISH algorithms u cryptography technique. Due to the imp DES/TDES algorithm and the numerou that it has, our main concern DES/TDE Decryption using three keys and synt which give higher operating frequency we present, TDES synthesis in VHDL, Code Block(ECB) mode, of this co cryptography scheme with aim performance. The design is simulated an in Xilinx ISE 14.7 with family Virtex-7 w.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 56 - 6470 | www.ijtsrd.com | Volum ernational Journal of Trend in Sc Research and Development (IJT International Open Access Journ f 64-Bit Triple Data Encryptio ard Algorithm using VHDL mran 1 , Parminder Singh Jassal 2 ctronics, Yadavindra College of Engineering, Ta lectronics, Yadavindra College of Engineering, T requirement of from one place smitted data at orized user can nsmitting point int we need the authorized user d they have the ue to transmit s. The word ombining two hidden and graphy is the d to aspects of It deals with nel by altering cally, we have l data transfer, -decryption is Cryptography TRIPLE-DES, use symmetric portance of the us applications ES Encryption/ thesize TDES, y. In this paper , in Electronic ommonly used to improve nd synthesized (XC7VX330t– 3ffg1157). O operating frequency of 114.33 Keywords: Cryptography, D Decryption, Implementation R I. INTRODUCTION In this modern era as the dem of exchanging valuable data booming over electronics com need for today is to prote unauthorized access. As th increasing day-by-day the re security to providing quality is most challenging aspe Cryptography is the one o computer security that conv readable data to unreadable f solution to ensure securi algorithms are used in informa this thesis tries to fair com common and basic symme algorithms: Data Encryption Triple Data Encryption Stand concern is to get a higher oper In [10], efficient and c synthesis of the Data Encry algorithm [10] and syn VirtexEXCV400e. In [11], a pipelined implement mode, of this commonly used n 2018 Page: 775 me - 2 | Issue 4 cientific TSRD) nal on alwandi Sabo, Punjab Talwandi Sabo, Punjab Our design achieves a 3 MHZ. DES, TDES, Encryption, Results mand and the importance a over the internet is mmunication. The main ect valuable data from he applications that is equirement of network of service. The security ects in the internet. of main categories for verts the original and form. Encryption is best ity. Many encryption ation security system. In mparison between most etric key cryptography n Standard (DES) and dard (TDES). The main rating frequency. compact reconfigurable yption Standard (DES) nthesis using device tation in VHDL, in ECB d Cryptography scheme

Upload: ijtsrd

Post on 17-Aug-2019

23 views

Category:

Education


0 download

DESCRIPTION

Data security is the most important requirement of todays world, to transmit digital data from one place to another. We need to secure the transmitted data at the transmitting end so that no unauthorized user can access it. To encrypt the data at the transmitting point and decrypt the data at the receiving point we need the communication security 8 . Only the authorized user can get back the original text, provided they have the secret key. Cryptography is a technique to transmit protected data between two points. The word Cryptography was invented by combining two Greek words, Krypto meaning hidden and graphene meaning writing. Cryptography is the study of mathematical techniques related to aspects of various information data security. It deals with protection of data on unsecured channel by altering the data in encrypt coded form. Basically, we have two cryptography techniques for digital data transfer, depending on how the encryption decryption is carried out in the system, Symmetric Cryptography and Asymmetric Cryptography. DES, TRIPLE DES, IDEA, AND BLOWFISH algorithms use symmetric cryptography technique. Due to the importance of the DES TDES algorithm and the numerous applications that it has, our main concern DES TDES Encryption Decryption using three keys and synthesize TDES, which give higher operating frequency. In this paper we present, TDES synthesis in VHDL, in Electronic Code Block ECB mode, of this commonly used cryptography scheme with aim to improve performance. The design is simulated and synthesized in Xilinx ISE 14.7 with family Virtex 7 XC7VX330t3ffg1157 . Our design achieves a operating frequency of 114.33 MHZ. Simran | Parminder Singh Jassal "Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-4 , June 2018, URL: https://www.ijtsrd.com/papers/ijtsrd14159.pdf Paper URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/14159/synthesis-of-64-bit-triple-data-encryption-standard-algorithm-using-vhdl/simran

TRANSCRIPT

Page 1: Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL

@ IJTSRD | Available Online @ www.ijtsrd.com

ISSN No: 2456

InternationalResearch

Synthesis of 64Standard Algorithm using VHDL

Simran

1M.Tech Student, Department of Electronics, 2Assistant Professor, Department of Electronics,

ABSTRACT Data security is the most important requirement of today’s world, to transmit digital data from one place to another. We need to secure the transmitted data at the transmitting end so that no unauthorized user can access it. To encrypt the data at the tranand decrypt the data at the receiving point we need the communication security[8] . Only the authorized user can get back the original text, provided they have the secret key. Cryptography is a technique to transmit protected data between two points. The word ‘Cryptography’ was invented by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing. Cryptography is the study of mathematical techniques related to aspects of various information data security. It deals witprotection of data on unsecured channel by altering the data in encrypt (coded)form. Basically, we have two cryptography techniques for digital data transfer, depending on how the encryption-carried out in the system, Symmetric Cryptographyand Asymmetric Cryptography. DES, TRIPLEIDEA, AND BLOWFISH algorithms use symmetric cryptography technique. Due to the importance of the DES/TDES algorithm and the numerous applications that it has, our main concern DES/TDES Encryption/ Decryption using three keys and synthesize TDES, which give higher operating frequency. In this paper we present, TDES synthesis in VHDL, in Electronic Code Block(ECB) mode, of this commonly used cryptography scheme with aim to improve performance. The design is simulated and synthesized in Xilinx ISE 14.7 with family Virtex-7

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018

ISSN No: 2456 - 6470 | www.ijtsrd.com | Volume

International Journal of Trend in Scientific Research and Development (IJTSRD)

International Open Access Journal

f 64-Bit Triple Data EncryptionStandard Algorithm using VHDL

Simran1, Parminder Singh Jassal2

Tech Student, Department of Electronics, Yadavindra College of Engineering, Talwandi Sabo, Assistant Professor, Department of Electronics, Yadavindra College of Engineering, Talwandi Sabo,

Data security is the most important requirement of today’s world, to transmit digital data from one place to another. We need to secure the transmitted data at the transmitting end so that no unauthorized user can access it. To encrypt the data at the transmitting point and decrypt the data at the receiving point we need the communication security[8] . Only the authorized user can get back the original text, provided they have the secret key. Cryptography is a technique to transmit

wo points. The word ‘Cryptography’ was invented by combining two Greek words, ‘Krypto’ meaning hidden and ‘graphene’ meaning writing. Cryptography is the study of mathematical techniques related to aspects of various information data security. It deals with protection of data on unsecured channel by altering the data in encrypt (coded)form. Basically, we have two cryptography techniques for digital data transfer,

-decryption is carried out in the system, Symmetric Cryptography and Asymmetric Cryptography. DES, TRIPLE-DES, IDEA, AND BLOWFISH algorithms use symmetric cryptography technique. Due to the importance of the DES/TDES algorithm and the numerous applications that it has, our main concern DES/TDES Encryption/

sing three keys and synthesize TDES, which give higher operating frequency. In this paper we present, TDES synthesis in VHDL, in Electronic Code Block(ECB) mode, of this commonly used cryptography scheme with aim to improve

lated and synthesized 7

(XC7VX330t– 3ffg1157). Our design achieves a operating frequency of 114.33 MHZ.

Keywords: Cryptography, DES, TDES, Encryption, Decryption, Implementation Results I. INTRODUCTION

In this modern era as the demand and the importance of exchanging valuable data over the internet is booming over electronics communication. The main need for today is to protect valuable data from unauthorized access. As the applications that is increasing day-by-day the requirement of network security to providing quality of service. The security is most challenging aspects in the internet. Cryptography is the one of main categories for computer security that converts the original and readable data to unreadable form. Encryption is best solution to ensure security. Many encryption algorithms are used in information security system. In this thesis tries to fair comparison between most common and basic symmetric key cryptography algorithms: Data Encryption STriple Data Encryption Standard (TDES). The main concern is to get a higher operating frequency.

In [10], efficient and compact reconfigurable synthesis of the Data Encryption Standard (DES) algorithm [10] and synthesis using device VirtexEXCV400e.

In [11], a pipelined implementation in VHDL, in ECB mode, of this commonly used Cryptography scheme

Jun 2018 Page: 775

www.ijtsrd.com | Volume - 2 | Issue – 4

Scientific (IJTSRD)

International Open Access Journal

Bit Triple Data Encryption

Talwandi Sabo, Punjab of Engineering, Talwandi Sabo, Punjab

3ffg1157). Our design achieves a operating frequency of 114.33 MHZ.

Cryptography, DES, TDES, Encryption, Decryption, Implementation Results

In this modern era as the demand and the importance of exchanging valuable data over the internet is booming over electronics communication. The main need for today is to protect valuable data from unauthorized access. As the applications that is

day the requirement of network security to providing quality of service. The security is most challenging aspects in the internet. Cryptography is the one of main categories for computer security that converts the original and

eadable form. Encryption is best solution to ensure security. Many encryption algorithms are used in information security system. In this thesis tries to fair comparison between most common and basic symmetric key cryptography algorithms: Data Encryption Standard (DES) and Triple Data Encryption Standard (TDES). The main concern is to get a higher operating frequency.

In [10], efficient and compact reconfigurable synthesis of the Data Encryption Standard (DES)

and synthesis using device

In [11], a pipelined implementation in VHDL, in ECB mode, of this commonly used Cryptography scheme

Page 2: Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL

International Journal of Trend in Scientific Research and

@ IJTSRD | Available Online @ www.ijtsrd.com

with aim to improve performance, is given. using Altera Cyclone II FPGA as platform, design, verification and synthesis with a EDA tools providby ALTERA. This design achieves a throughput of 3.2 Gbps with a 50MHz clock, is given.

This paper is organized as follows: the second section presents the DES and TDES algorithms under study. The third section gives the encryption/decryption simulation results of DES and TDES algorithms. The comparison results and relevant conclusions are drawn briefly in section 4.

II. DES AND TDES ALGORITHM

A. DES (Data Encryption Standard) -

DES performs an initial permutation (IP) on the entire 64 bit block of data. It is then split into Two, 32 bit sub-blocks,( Li and Ri) which are then passed into what is known as a Round which has 16 (the subscript i in Li and Ri indicates the current round)iterations[7]. There are 16 iterations of identical operations, called Function f, in which the input data are combined with the key. The basic operation of DES can be understood with the help of fig 1[2]. The same 56-bit cipher key is used for encryption and decryption. There are three operations performed in DES algorithm: - Decryption and Key Generation [1].

Fig.1- General structure of DES[2]

Algorithm Encryption Steps

Step 1: Initially get 64-bit key and plaintext to be encrypted.

Step 2: Perform initial permutation on plaintext.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018

with aim to improve performance, is given. using Altera Cyclone II FPGA as platform, design, verification and synthesis with a EDA tools provided by ALTERA. This design achieves a throughput of

This paper is organized as follows: the second section presents the DES and TDES algorithms under study. The third section gives the encryption/decryption

results of DES and TDES algorithms. The comparison results and relevant conclusions are

DES performs an initial permutation (IP) on the entire It is then split into Two, 32 bit

blocks,( Li and Ri) which are then passed into which has 16 (the

subscript i in Li and Ri indicates the current round)iterations[7]. There are 16 iterations of

unction f, in which the input data are combined with the key. The basic operation of DES can be understood with the help of

bit cipher key is used for encryption and decryption. There are three operations

Encryption,

General structure of DES[2]

bit key and plaintext to be

Step 2: Perform initial permutation on plaintext.

Step 3: Then divide the plaintext into two 32

Step 4: The key generator generates round key which perform 16 times round function.

Step 5: Finally, use the output of 4 steps to perform final permutation (fp) in the form of original ciphertext.

Algorithm Key Generator Steps

Step 1: Initially get the 64-bit key.

Step 2: Then perform parity bit drop to reduce it to 56-bits.

Step 3: Divide it into two equal 28

Step 4: According to round function it perform shift left operation of the 28-bit data.

Step 5: Perform the compressed permutation use the output of step 4.

Step 6: Repeat the step 4 and step 5 to produce 16 round keys

Algorithm Decryption Steps

Decryption process performs all the sane steps of Encryption process but in reverse order

B. TDES (Triple Data Encryption Standard)

Triple Data Encryption Standard (Triple DES) uses a Symmetric key block cipher algorithm to convert original text into cipher text[3]. DES algorithm is used three times in Triple DES. Hence, there are 3 different keys(e.g. K1,K2,K3) to perform each application of DES. Therefore, it raises the key length to 168 bits(56 bit key each)/(excluding 24 parity bits, 8 from each key) and the keys are collectively known as the ‘key bundle’. Triple DES uses DES three times that’s why it have 48 rounds in it for more and less prone to attacks. Triple DES uses a key length of 168 bits whereas a key length of 112 bits is preferred in TDES. 3 DES uses 64 bits of data block for encrypting the plaintext.

The main function of Triple DES is, to encrypt the plaintext with the first key(K1), decrypt the result of step 1 with second key(K2) and finally, encrypting the obtained result from step 2,with the third key(K3). Triple DES is defined by the function in figure (2) [14].

Development (IJTSRD) ISSN: 2456-6470

Jun 2018 Page: 776

Step 3: Then divide the plaintext into two 32-bit parts.

Step 4: The key generator generates round key which perform 16 times round function.

Step 5: Finally, use the output of 4 steps to perform final permutation (fp) in the form of original

Algorithm Key Generator Steps

bit key.

Step 2: Then perform parity bit drop to reduce it to

Step 3: Divide it into two equal 28-bits parts.

Step 4: According to round function it perform shift bit data.

Step 5: Perform the compressed permutation use the

Step 6: Repeat the step 4 and step 5 to produce 16

Algorithm Decryption Steps

Decryption process performs all the sane steps of Encryption process but in reverse order

B. TDES (Triple Data Encryption Standard)-

Triple Data Encryption Standard (Triple DES) uses a Symmetric key block cipher algorithm to convert original text into cipher text[3]. DES algorithm is used three times in Triple DES. Hence, there are 3 different keys(e.g. K1,K2,K3) to perform each

ation of DES. Therefore, it raises the key length to 168 bits(56 bit key each)/(excluding 24 parity bits, 8 from each key) and the keys are collectively known as the ‘key bundle’. Triple DES uses DES three times that’s why it have 48 rounds in it for more security and less prone to attacks. Triple DES uses a key length of 168 bits whereas a key length of 112 bits is preferred in TDES. 3 DES uses 64 bits of data block

The main function of Triple DES is, to encrypt the with the first key(K1), decrypt the result of

step 1 with second key(K2) and finally, encrypting the obtained result from step 2,with the third key(K3). Triple DES is defined by the function in figure (2)

Page 3: Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL

International Journal of Trend in Scientific Research and

@ IJTSRD | Available Online @ www.ijtsrd.com

Fig 2:- TDES Algorithm working [14]

If we assume that k1, k2 and k3 are the 3 different keys and C to be the ciphertext and plaintext and F to denote encryption and decryption, then the encryption process of the Triple DES can be represented as

C = Fk3 [fk2 {Fk1 (P)}]……..equation. 1

In the same way, the decryption process of Triple DES can be represented as

P = fk1 [Fk2 {fk3 (C)}]……….equation. 2

Fig 3 : TDES Encryption Simulation Waveform

IV. EXPERIMENTAL RESULTS The design is simulated and synthesize in Xilinx ISE 14.7. The verified model is synthesized to get an high operating frequency. TDES implementation results are as given in table 1 : As shown our work provides high operating frequency:

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018

TDES Algorithm working [14]

are the 3 different to be the ciphertext and P to be the

to denote encryption and f to denote decryption, then the encryption process of the Triple

quation. 1

In the same way, the decryption process of Triple

P = fk1 [Fk2 {fk3 (C)}]……….equation. 2

III. SIMULATION RESULT

Encryption Simulation Waveform verifies TDES Encryption for following Key and Plain text values: The input key ,data input & decrypted output are as given. This Encryption Simulation Waveform verifies TDES Encryption for following Key and Plain text values:

TDES ENCRYPTION

• data in : FF00FF00FF00FF00• data_out : 328DBFFA68CF0D06• Key_1: 0000FFFF0000FFFF• Key_2 : 00000000FFFFFFFF• Key_3 : FFFF0000FFFF0000 TDES DECRYPTION • data_in : 328DBFFA68CF0D06• data_out : FF00FF00FF00FF00• Key_1: 0000FFFF0000FFFF• Key_2 : 00000000FFFFFFFF• Key_3 : FFFF0000FFFF0000

Fig 3 : TDES Encryption Simulation Waveform

The design is simulated and synthesize in Xilinx ISE 14.7. The verified model is synthesized to get an high

TDES implementation results

As shown our work provides high operating

Table 1. TDES implem

Author Device

[10] XCV 400

Our work

XC6VLX75T

Development (IJTSRD) ISSN: 2456-6470

Jun 2018 Page: 777

SIMULATION RESULT

Encryption Simulation Waveform verifies TDES Encryption for following Key and Plain text values:

key ,data input & decrypted output are as given. This Encryption Simulation Waveform verifies TDES Encryption for following Key and Plain text

data in : FF00FF00FF00FF00 data_out : 328DBFFA68CF0D06 Key_1: 0000FFFF0000FFFF

000000FFFFFFFF Key_3 : FFFF0000FFFF0000

data_in : 328DBFFA68CF0D06 data_out : FF00FF00FF00FF00 Key_1: 0000FFFF0000FFFF Key_2 : 00000000FFFFFFFF Key_3 : FFFF0000FFFF0000

Table 1. TDES implementation Results Frequency (MHZ)

47.7

114.33

Page 4: Synthesis of 64-Bit Triple Data Encryption Standard Algorithm using VHDL

International Journal of Trend in Scientific Research and

@ IJTSRD | Available Online @ www.ijtsrd.com

In this work, TDES is analyzed on XC6VLX75T device. The table depicts that the our work results in higher operating frequency.

Fig 4. Comparision graph of TDES(Max. Operating Frequency)

V. CONCLUSION This research presents the implementation of Triple Data Encryption Standards (TDES) algorithm using VHDL. The implemented design consumes fewer devices available on board which results better performance of algorithm. As shown in Table 1, the frequency of TDES is higher than previous work, as compared to previous work. VI. FUTURE SCOPE For the future work, it is recommended that the input and plaintext can be taken using image or audio/video data. It is also recommended that the use of better FPGA board, which has better specification than Virtex-4 XC4VSX25-FF668 and has more number of input/output pins. The modification of Triple Data Encryption Standards(TDES) algorithm can also be done to get better security and reduction in total Encryption time, area and frequency etc. REFERENCES 1. M. Breezely George and S. Igni Sabasti Prabu,”

Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography”, Springer India 2016.

2. Anilekha Thampi V V, Raju K Gopal,” A Review on Different Encryption Algorithms for a Wellness Tracking System”, Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE 2015.

International Journal of Trend in Scientific Research and Development (IJTSRD) ISSN: 2456

@ IJTSRD | Available Online @ www.ijtsrd.com | Volume – 2 | Issue – 4 | May-Jun 2018

In this work, TDES is analyzed on XC6VLX75T device. The table depicts that the our work results in

graph of TDES

(Max. Operating Frequency)

This research presents the implementation of Triple Data Encryption Standards (TDES) algorithm using VHDL. The implemented design consumes fewer devices available on board which results better

As shown in Table 1, the frequency of TDES is higher than previous work, as compared to previous work.

For the future work, it is recommended that the input and plaintext can be taken using image or audio/video

. It is also recommended that the use of better FPGA board, which has better specification than

FF668 and has more number of input/output pins. The modification of Triple Data Encryption Standards(TDES) algorithm can also be

better security and reduction in total Encryption time, area and frequency etc.

M. Breezely George and S. Igni Sabasti Prabu,” Secured Key Sharing in Cloud Storage Using Elliptic Curve Cryptography”, Springer India

Raju K Gopal,” A Review on Different Encryption Algorithms for a Wellness Tracking System”, Proceedings of 2015 Global Conference on Communication Technologies (GCCT 2015), IEEE 2015.

3. Parminder Singh Jassal et al., International Journal of engineering and technical Research ISSN: 2321-0869,volume-3,Issue

4. Mandeep et al., International Journal of advanced research in computer science and software engineering 4(1),january-2014,pp.667

5. P. Kitsos, S. Goudevenos and 0. Koufopavlou,”VLSI IMPLEMEN-TATIONS OF THE TRIPLEDES BLOCK CIPHER”,IEEE2003.

6. Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl Christian Posch, Reinhard Posch, and Johannes Wolkerstorfer,”A 155 Mbps TripleNetwork Encryptor”, SpringerHeidelberg 2000.

7. "Data Encryption Standard," Processing Standards Publication No. 46, Bureau of Standards ,January15,1977 .

8. V. Pasham et. al, “High -DES Encryption/ Decryption”, XAPP270 (v1.0) August 03, 2001.

9. D.Coppersmith, “The Data Encryption Standard (DES) and its strength against attacks”, IBM J.RES.DEVELOP. VOL.38 NO.3MAY,1994.

10. Shivangi Vajpayee et al, Int.J. Computer Technology & Applications, Vol3(3),1015

11. Rosal, E.D. and Kumar, S. (20Implementation for Triple DES Encryption Scheme. Circuits and Systems, 8, 237

12. Venigalla et.al.,” implementation of triple des block cipher using VHDL”, International Journal of Advances in Engineering & Technology, March 2012.

13. Akash Kumar Mandal et.al, “Performance Evaluation of Cryptographic Algorithms DES and AES”, IEEE Students’ Conference on Electrical, Electronics and Computer Science, 2012.

14. O P Verma et.al, "Performance Analysis of Data Encryption Algorithms”, IEEE International Journal of Computer Applications, Vo1.42, No.16, March 2011.

15. Miles E. Smid and Dennis K. Branstad, "The Data Encryption Standard: Past and Future," in Gustavus.

Development (IJTSRD) ISSN: 2456-6470

Jun 2018 Page: 778

Parminder Singh Jassal et al., International Journal and technical Research ISSN:

3,Issue-5,May2015

Mandeep et al., International Journal of advanced research in computer science and software

2014,pp.667-672.

P. Kitsos, S. Goudevenos and 0. Koufopavlou,” TATIONS OF THE TRIPLE-

”,IEEE2003.

Herbert Leitold, Wolfgang Mayerwieser, Udo Payer, Karl Christian Posch, Reinhard Posch, and Johannes Wolkerstorfer,”A 155 Mbps Triple-DES Network Encryptor”, Springer-Verlag Berlin

"Data Encryption Standard," Federal Infonnation Processing Standards Publication No. 46, National Bureau of Standards ,January15,1977 .

- Speed DES and Triple DES Encryption/ Decryption”, XAPP270 (v1.0)

D.Coppersmith, “The Data Encryption Standard (DES) and its strength against attacks”, IBM J.RES.DEVELOP. VOL.38 NO.3MAY,1994.

Shivangi Vajpayee et al, Int.J. Computer Technology & Applications, Vol3(3),1015-1022.

Rosal, E.D. and Kumar, S. (2017) A Fast FPGA Implementation for Triple DES Encryption Scheme. Circuits and Systems, 8, 237-246.

Venigalla et.al.,” implementation of triple des block cipher using VHDL”, International Journal of Advances in Engineering & Technology,

umar Mandal et.al, “Performance Evaluation of Cryptographic Algorithms DES and AES”, IEEE Students’ Conference on Electrical, Electronics and Computer Science, 2012.

O P Verma et.al, "Performance Analysis of Data Encryption Algorithms”, IEEE International Journal of Computer Applications, Vo1.42, No.16,

Miles E. Smid and Dennis K. Branstad, "The Data Encryption Standard: Past and Future," in