You are on page 1of 5

Analysis and comparison of DES cryptographic algorithm and AES

cryptographic algorithm in different CPU

Burhan RAHMANI1, Florim IDRIZI2


1
2

Departament of Informatics - State University of Tetova, Macedonia


Departament of Informatics - State University of Tetova, Macedonia

burhanrahmani90@gmail.com, florim.idrizi@unite.edu.mk,
Abstract
Nowadays it is highly important for the transmitted data to be secure. Since everything nowadays is
transmitted through the Internet, it is very likely for our data to be taken and misused. What we have
conducted is mini (minor) software in the c# language, which makes encryption of the file in .txt
format, and what we will conduct in this paper is the measurement of time of encryption of different
size of files with DES algorithm and AES algorithm of different CPUs by encrypting files, with which
we will make comparisons between two algorithms and also make comparisons between the CPUs.

Key words: Encrypting, DES, AES, CPU,

1. Introduction
Cryptography is the science dealing with the process of information protection. Until modern times
cryptography has been used to encrypt a text in an incomprehensible text as well as for decrypting,
which means transferring an incomprehensible text into comprehensible or understandable text by
being based on a key which can be locked (closed) or opened?
Its use also took place at the time of ancient Egypt, proceeding into the Middle Ages and up to our
time; as well as amid various wars and communications between the diplomatic personnel. However
the greater use of cryptography is seen nowadays, which is linked with increasingly large computer
communications through the Internet.1
Cryptography is the art and science of protecting information against unwanted individuals by the
conversion into a form not recognizable by the enemy or attackers.2
Figure one shows to us how encrypting and decrypting work in a schematic way.

1 http://www.doktoratura.unitir.edu.al/wp-content/uploads/2013/11/Doktoratura-Florim-IdriziFakulteti-i-Shkencave-i-Natyrore-Departamenti-i-Informatikes.pdf
2 Diaasalama Abd Elminaam, Hatem Mohamad Abdual Kader, Mohly Mohamed
Hadhoud, -Evalution the Performance of Symmetric Encryption Algorithms,
international journal of network security vol.10,No.3,pp,216-222,May 2010.

Figure 1 The process of encryption and decryption

Although cryptography with a closed key has a great usability it has a major problem with the
delivery of the key. In order to operate with this type of cryptography, both parties ought to be in
possession of a copy of the secret (hidden) key which should be communicated through a secure line,
which should be very difficult to locate.

2. DES Algorithm
DES (Data Encryption Standard) uses the figures (codes) in blocks, it develops the encryption by
dividing it into blocks of 64 bits; the same algorithm is used for decrypting.
This algorithm uses a key with length of 56 bits, from where positions 8, 16, 24, 32, 40, 48, 56 and 64
are removed.
The encryption method is described below:
- Apply an initial permutation block. The result is B = IP (P) where P is the block with 64 bits, IP is
the initial permutation and B is the result.
- Divide B in blocks with 32 bits
Li = the most left 32 bit
Ri = the most right 32bit
Choose a 56-bit key. Put in the permutation.
- Move it from the left by 1 bit by adding K1.
Perform a complex sequence of operations and set X1 = F (R1, K1) (Corpus complex operations
includes research in the table and the issued bits).
- Locate R2 = L1 + X1
- Add to L2 = R1
- Reiterate the steps from the 2nd to the 7th 16 times to attain B16 = L16, R16
- Apply the opposite of initial permutation on B163
3 http://www.doktoratura.unitir.edu.al/wp-content/uploads/2013/11/DoktoraturaFlorim-Idrizi-Fakulteti-i-Shkencave-i-Natyrore-Departamenti-i-Informatikes.pdf

Figure 2 Visual presentation of the functions of DES algorithm

3. AES Algorithm
The Advanced Encryption Standard (AES), also known as Rijndael (its original name), is a
specification for the encryptionof electronic data established by the U.S. National Institute of
Standards and Technology (NIST) in 2001.4[5]
The official announcement of AES algorithm was made on 4 December 2001, AES algorithm is a
subset of the Rijndael algorithm, and it uses 128-bit block and three different sizes of keys 128, 196,
and 256 bits.
We can say that AES algorithm is symmetric, which means that for encryption and for decryption we
use one key, also encrypted message is with same size as original message.
4. The results of the experiment
For our experiment we will use three laptops with different CPUs, one laptop is 2.10 GHz i7, the other
is i5 and other last one is 3.10 GHz i3. The experiment is conducted through the program created by
us, in the language of programming C # in Visual Studio 2013, where DES and AES algorithms are
used.
The program measures the time of encryption of the file, while in the experiment we will use files of
different sizes, from where we will see even more clearly the differences in the time of encryption of
the files on different algorithms.
Moreover in order for our experiment to be more precise, we have made each encryption of the file
three times, with which we find the average and then we have listed the obtained value in the table.
In the following we have the table with the obtained data from the conducted experiment during the
encryption of files with different sizes.

4 "Announcing the ADVANCED ENCRYPTION STANDARD (AES)". Federal Information


Processing Standards Publication 197. United States National Institute of Standards and Technology
(NIST). November 26, 2001. Retrieved October 2, 2012.

Table 1 The time of encryption of files with DES algorithm and AES algorithm i3 CPU

The size of the file

DES Algorithm (sec)

AES Algorithm (sec)

50 Kb
100 Kb
200 Kb
500 Kb
1 Mb
2 Mb
3 Mb
4 Mb

7.6
10
18.4
37.2
110.3
140.5
209.1
281

4.0
7.8
14.8
36.7
75.3
152.1
236.8
304.9

350
300
250
200
DES Algorithm (sec)

150

AES Algorithm (sec)

100
50
0

Graph 2 The time of encryption of files with DES algorithm add AES algorithm

Table 2 The time of encryption of files with DES algorithm and AES algorithm i5 CPU

The size of the file

DES Algorithm (sec)

AES Algorithm (sec)

50 Kb
100 Kb
200 Kb
500 Kb
1 Mb
2 Mb

8.3
9.2
14.2
31.3
59.8
110.6

3.9
7.2
14.5
36
73.3
144.8

Table 3 The time of encryption of files with DES algorithm and AES algorithm i7 CPU

The size of the file

DES Algorithm (sec)

AES Algorithm (sec)

50 Kb
100 Kb
200 Kb
500 Kb
1 Mb
2 Mb

7
7.7
12.5
26.2
39.5
58.6

3.6
7
14.3
36
73.2
140.6

5. Conclusion
A comparative study was carried out on this paper between two different algorithms and between
different CPUs by realizing encryption of files with different sizes. What was gained as a result was
that the encryption with DES algorithm had significant differences in the time of the encryption
comparing with AES algorithm if files are small then 1 Mb, but as the size of the file is bigger we see
that the AES algorithm is more slowly comparing with DES algorithm.

6. Reference
[1] F.Idrizi Kriptografia e kombinuar si mjet per sigurin e transaksioneve elektronike n
Republikn Maqedonis, Tiran 2013
[2] Diaasalama Abd Elminaam, Hatem Mohamad Abdual Kader, Mohly
Mohamed Hadhoud, -Evalution the Performance of Symmetric Encryption Algorithms,
international journal of network security vol.10,No.3,pp,216-222,May 2010.
[3] Jawahar Thakur , Nagesh Kumar - DES, AES and Blowfish: Symmetric Key Cryptography
Algorithms Simulation Based Performance Analysis
[4] Sombir Singh, Sunil M Maakar, and Dr. Sudesh Kumar A performance Analysis of DES
and RSA Cryptography
[5] States National Institute of Standards and Technology (NIST) - Announcing the
ADVANCED ENCRYPTION STANDARD (AES), November 26, 2001

You might also like