• Order
  • USA
  • Offers
  • Support
    • Due to unforeseen circumstances, our phone line will be unavailable from 5pm to 9pm GMT on Thursday, 28th March. Please be assured that orders will continue to be processed as usual during this period. For any queries, you can still contact us through your customer portal, where our team will be ready to assist you.

      March 28, 2024

  • Sign In

Disclaimer: This is an example of a student written essay.
Click here for sample essays written by our professional writers.

Any scientific information contained within this essay should not be treated as fact, this content is to be used for educational purposes only and may contain factual inaccuracies or be out of date.

Difference between des and aes

Paper Type: Free Essay Subject: Engineering
Wordcount: 1172 words Published: 1st Jan 2015

Reference this

Difference between des and aes

AES has a better encryption standard i.e. it is far more advanced when compared to Des.There are many reasons attributing to this, Firstly the encryption key of an DES standard is just 56 bitsthus having a maximum of 256 combinations, while that of AES is 128, 192 or 259 bits long, with eachof them containing 2128, 2192 and 2256 combinations , thus makes it a tough nut to crack. Secondly, the block size used by DES is just 64 bits long , resulting in the maximum amount of information that can be transmitted with just a single encryption keyof just 32 GB , and beyond this it amounts in in partial leaking, as the information is not encrypted. This doesn’t happened with AES since with a block size of 128 bits, and with a single encryption key a data of 256 billion gigabytes can be transmitted , making it much more safety than the former. Finally, before going through the encryption steps DES uses the Feistel network which divides the block into two halves. AES on the other hand, uses permutation-substitution, which involves a series of substitution and permutation steps to create the encrypted block, thus making it difficult to break the code. [web]

Get Help With Your Essay

If you need assistance with writing your essay, our professional essay writing service is here to help!

Essay Writing Service

Differences between Asymmetric and symmetric encryption tech

The strength of the encryption lies with the encryption algorithm and key length used by the encryption. To encrypt the data an encryption algorithm is used by both symmetric and asymmetric, a 128-bit key encryption algorithm when implemented has the same strength against being cracked whether it’s used in symmetric or asymmetric encryption program. Hence both symmetric and asymmetric encryption can be compared to the same safe, and so far no one has randomly cracked a 128 bit key length encryption algorithm, unless the algorithm itself was flawed. Thus, the basic difference lies not in the encryption but the decryption. i.ethe one which cannot be decrypted would be the secure type of safe.

Generally keys can be broken in three ways

  1. Simply guessing the password or key.
  2. Through interception – Getting the keyby accessing the communication between the sender and recipient or gaining access their computer.
  3. Brute Force – until a correct match is made all the random keys are tried using computing power.

Symmetric encryption can be vulnerable to all three methods, reason being the same password that is used to encrypt the data is also used decrypt the data. Asymmetric encryption is only vulnerable to the third method and the second half of the second method. Because the same key is not used to encrypt and decrypt the data but a combination of public and private keys to encrypt and decrypt the information, thus eradicating the need to communicate the password to the other person.

This doesn’t mean that asymmetric encryption is much more efficient when compared to symmetric. It also suffers from certain drawbacks. The biggest drawback being that, it is complicated to use. Certain prerequisites have to be met before using this technique.

  1. One needs to make sure that there is appropriate decrypting software at the receiving end.
  2. The public key has to be registered on one of the databases that maintain the keys.

For example, if A wants to send B some encrypted information he must first check whether B has the appropriate decrypting software and has registered his public key on one of the databases that maintains these keys or have B send him his public key. If he does already have everything, then great, the process itself is fairly simple as long as A already has the appropriate software for encrypting. If B doesn’t have a public key already, or the appropriate software for decrypting, then he must go through this process of installing and registering before the encrypted message can be sent which makes it a time-consuming process.

This is the main reason why people are not using asymmetric encryption in today’s fast-paced world.

Difference between Stream cipher and Block cipher

Both Stream cipher and Block Cipher are symmetric ciphers. WhileStream ciphers encrypt one bit or byte at a time by generating an infinite cryptographic key-stream, block cipherson the other hand work on larger chunks of data at a time, and are often involved in combining these blocks for additional security (e.g. AES in CBC mode). And it is this basic property which makes the stream cipher faster than the latter.

Stream ciphers are generally implemented in scenarios such as embedded devices, firmware, and esp. hardware as they work on only a few bits at a time, consuming very low memory requirements, and therefore making it cheaper. On the other hand memory are consumed by the block ciphers are more, due to the fact that they work on larger chunks of data and often have “carry over” from previous blocks, which doesn’t make it feasible to work in the embedded environments where memory and speed plays a major role. And apart from this block ciphers are it more susceptible to noise in transmission as they encrypt a whole block at a time. Whereas with stream ciphers are bytes are individually encrypted with no connection to other chunks of data (in most ciphers/modes), and often have support for interruptions on the line, thus making it is less susceptible to noise.

Find Out How UKEssays.com Can Help You!

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

View our services

Despite these advantages stream ciphers do suffer from certain drawbacks.Stream ciphers do not provide integrity protection or authentication, whereas some block ciphers (depending on mode) can provide integrity protection, in addition to confidentiality. This is because at any given instant large blocks of data get processed, thus ensuring that the block of data obtained at the receiving end is free from all the errors. Data loss or a data mismatch might occur in stream ciphers since they work on a bit by bit basis. And apart from this ciphers are more difficult to implement correctly, and prone to weaknesses based on usage – since the principles are similar to one-time pad, the key-stream has very strict requirements. On the other hand block ciphers are comparatively easier to handle.

Because of all the above mentioned features, stream ciphers are usually best suited for cases where the amount of data is either unknown, or continuous – such as network streams and other hardware devices . Block ciphers are more useful when the amount of data is pre-known – such as a file, data fields, or request/response protocols, such as HTTP where the length of the total message is known already at the beginning.

 

Cite This Work

To export a reference to this article please select a referencing stye below:

Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.
Reference Copied to Clipboard.

Related Services

View all

DMCA / Removal Request

If you are the original writer of this essay and no longer wish to have your work published on UKEssays.com then please: