Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Mathematical Logic and Logical equivalence implementation to find the intermediate key Management for DES Encryption Algorithm

Author : Mohanesh B M 1 Anil Kumar C J 2 Dr Putte Gowda D 3

Date of Publication :24th January 2018

Abstract: The objective of the study is to look into a new method to generate an intermediate key for a symmetric key given in DES encryption algorithm. Using the concept of Mathematical Logic and Logical Equivalence an intermediate key is generated. An intermediate key used at the sender and the receiver side.There are two equations used one on the sender side and another on the receiver side both giving the same intermediate key. Mathematical logic is the science dealing with the methods of reasoning; these are the statements that are called propositions. Propositions are the statement which in a given context said to be true or false.These propositions are connected by the logical connectives and they are “not”, “and”, “or”, “if then”, “if and only if”. The propositions formed using these logical connectives is called compound propositions. Two propositions u and v are said to be logically equivalent whenever u and v have the same truth value. This is denoted by u⇐⇒v and it’s represented as u and v are logically equivalent. During the generation of the intermediate key, u is used at the sender side and v is used at the receiver end to provide the same intermediate key.This paper proposes a new method for generating an intermediate key for DES algorithm.

Reference :

    1. Farouzan,B.A & Mukhopadhyay,D (2010). Cryptography and Network Security.New Delhi,India :Tata McGraw-Hill.
    2. Stallings, W. (2011).Cryptography and Network Security: Principles and Practice.US,USA:Pearson.
    3. Sindhu, G.,Krithika,P (2015).Analysis and comparison of symmetric key algorithm (Blowfish,DES,TEA,IDEA) in Cryptography.IJSART-Volume 1 Issue 11 NOVEMBER 2015.
    4. H.Fiestel,W.A.Notz, and J.L Smith, “Some Cryptographic Techniques Machine to Machine Data Communications”, Proceedings on the IEEE,v.63,n.11,1975,pp,1545-1554.
    5. Karthik S,Muruganandam . A,(2014).Data Encryption and Decryption by using Triple DES and Performance Analysis of Crypto System, International Journal of Scientific Engineering and Research (IJSER).Vol. 2 (11).
    6. Ralph P Grimaldi and Ramana B.V.(2009).Discrete and Combinatorial Mathematics.US,USA:Pearson
    7. E.C Koenig , “ Analysis for correct reasoning by robots: modus ponens modus tollens”,Proceedings on the I.E.E.E. August 06 1989,pp,584-589.
    8. Anupam Chattopadhyay,Zoltan Rakosi,“Combinational logic synthesis for material implication”,Proceedings on I.E.E.E 2006,PP,200- 203.
    9. Ji Yao,Hongbo Kang, “ FPGA Implementation of Dynamic Key Management for DES Encryption algorithm”,Proceedings on the I.E.E.E .2011,pp,volume 9 ,4795-4798.
    10. Mathhew Morrison , “Theory,Synthesis and Application of Adiabatic and Reversible logic Circuits for Security Appicaation”.Proceedings on the I.E.E.E ,2014,pp,252-255.
    11.  Aqeel sahi Khader ,David Lai, “Preventing man in the middle attack in Deffie-Hellman key exchange protocol”.Proceedings on the I.E.E.E ,2015,pp,204- 208.
    12. P.M.Aishwarya,Archana Raj,Dona John , “Binary RSA encryption Algorithm”, Proceedings on the I.E.E.E ,2016,PP,178-181.

Recent Article