A STUDY OF MARS, RC6 AND SERPENT NEETA WADHWA, SYED ZEESHAN HUSSAIN & S. A. M RIZVI Department of Computer Science, Jamia Millia Islamia, New Delhi, India ABSTRACT After DES [Data Encryption Standard] was cracked, the new symmetric encryption standard hunt was started in 1999 and finished in 2001. The process was comprised of two rounds.This paper presents the study of 3 out of 5 finalists of second round of AES [Advanced Encryption Standard] process: MARS, RC6 and SERPENT. It analyzes the structure and working of these algorithms. It also analyzes the three algorithms on the basis of their encryption and decryption time. KEYWORDS: AES, DES, MARS, RC6, SERPENT, Symmetric Cryptography INTRODUCTION When digital communication systems developed, everyone had been using cryptography in his own ways secretly for their personal use. Due to the two major inventions in the world of digital communication, this art became science. First, The publication of the draft DES in the U.S. Federal Register on 17 March 1975. It started the development of Symmetric Cryptography. Second, The publication of the paper New Directions in Cryptographyby Whitfield Diffie and Martin Hellman in 1976. This key exchange protocol gave birth to the Asymmetric Cryptography. This work focuses only on Symmetric cryptography. DES was criticized because of its small key length and cracked by bruteforce attack in late 90‟s. Then AES process started. First round screened out 15 algorithms and the second round shortlisted 5 algorithms. In final round, the winner, RIJNDAEL, got 86 votes at the third AES conference while SERPENT got 59 votes, TWOFISH got 31 votes, RC6 got 23 votes and MARS got 13 votes. So NIST [National Institute of Standards and Technology] selected Rijndael as the AES. The present study analyzes the following three algorithms. STRUCTURE Mars MARS [1] designed by IBM, it was one of the finalists of AES competition but could not win. Like all AES candidates, it uses 128-bit blocks and supports key sizes of 128, 192 or 256 bits. It uses a variant of the Feistel structure which designers call a "type 3 Feistel network"; it is word oriented cipher, the 128-bit block is treated as four 32-bit sub- blocks or words; each round uses one sub-block as input and modifies all of the other three sub-blocks. It uses data- dependent rotations like RC6. One 9*32 S-box is used; for some operations it is treated as two 8*32 S-boxes. MARS supports user key lengths from 128 bits to 448 bits. The key expansion procedure expands the user-supplied key array k0, …, kn-1, into a 40-word internal key array K0, …, K39. The range of n is from 4 to 4 32 bit words. The key expansion procedure guarantees that the key words which are used for multiplication do not have any obvious weaknesses. This procedure keeps these words “random”, in the sense that no single word has probability much larger than in the uniform distribution. Due to the structure of the key expansion procedure, the performance of MARS is essentially independent of the key-length used. International Journal of Computer Science and Engineering (IJCSE) ISSN 2278-9960 Vol. 2, Issue 3, July 2013, 89-94 © IASET