Browse > Article
http://dx.doi.org/10.7465/jkdi.2012.23.6.1203

On the development of DES round key generator based on Excel Macro  

Kim, Daehak (Department of Mathematics, Catholic University of Daegu)
Publication Information
Journal of the Korean Data and Information Science Society / v.23, no.6, 2012 , pp. 1203-1212 More about this Journal
Abstract
In this paper, we consider the development of round key generator of DES (data encryption standard) based on Microsoft Excel Macro, which was adopted as the FIPS (federal information processing standard) of USA in 1977. Simple introduction to DES is given. Algorithms for round key generator are adapted to excel macro. By repeating the 16 round which is consisted of diffusion (which hide the relation between plain text and cipher text) and the confusion (which hide the relation between cipher key and cipher text) with Microsoft Excel Macro, we can easily get the desired DES round keys.
Keywords
Compression P-box; data encryption standards; macro; permutation cipher; round; substitution cipher;
Citations & Related Records
Times Cited By KSCI : 3  (Citation Analysis)
연도 인용수 순위
1 Choi, H. S. and Ha, J. (2011a). Development of process-oriented education tool for Statistics with Excel Macro. Journal of the Korean Data & Information Science Society, 22, 643-650.   과학기술학회마을
2 Choi, H. S. and Ha, J. (2011b). Development of Bayes' rule education tool with Excel Macro. Journal of the Korean Data & Information Science Society, 23, 905-912.   DOI
3 Choi, H. S. and Kim, T. Y. (2010). A study on sampling using the function of excel. Journal of the Korean Data & Information Science Society, 21, 481-491.   과학기술학회마을
4 Forouzan, B. A. (2008). Introduction to cryptography and network security, The McGraw-Hill Companies, New York.
5 Hoffstein, J., Pipher, J. and Silverman, J. H. (2008). An introduction to mathematical cryptography, Springer, New York.
6 Kahn, D. (1996). The codebreakers : The story of secret writing, Scribner's, New York.
7 Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method of obtaining digital signature and public-key cryptosystem. Communication of the Association for Computing Machinery, 21, 120-126.   DOI   ScienceOn
8 Shannon, C. E. (1949). Communication theory of secrecy system. The Bell Laps Technical Journal, 28, 656-715.
9 Trappe, W. and Washington, L. (2006). Introduction to cryptography and coding theory, Prentice Hall, Upper Saddle River.