International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169 Volume: 6 Issue: 3 100 – 106 ___________________________________________________________________________________ ___________ 100 IJRITCC | March 2018, Available @ http://www.ijritcc.org _______________________________________________________________________________________ Design and Implementation of Triple DES Encryption Scheme Prabhavathi M,Saranya S,Seby Netto, Sharmily G 1 IV UGStudents, Dept. of ECE Sri Shakthi Institute of Engineering and Technology Coimbatore, Tamilnadu, India Mrs. Reshma 2 Assistant Professor, Dept. of ECE Sri Shakthi Institute of Engineering and Technology Coimbatore, Tamilnadu, India Email:reshma@siet.ac.in S. Raja 3 Assistant Professor, Dept. of ECE Sri Shakthi Institute of Engineering and Technology Coimbatore, Tamilnadu, India Email:raja.s@siet.ac.in Abstract—The speed of exhaustive key searches against DES after 1990 began to cause discomfort amongst users of DES. However, users did not want to replace DES as it takes an enormous amount of time and money to change encryption algorithms that are widely adopted and embedded in large security architectures. The DES algorithm was replaced by the Advanced Encryption Standard (AES) by the National Institute of Standards and Technology (NIST). The pragmatic approach was not to abandon the DES completely, but to change the manner in which DES is used. DES is often used in conjunction with Triple DES. It derives from single DES but the technique is used in triplicate and involves three sub keys and key padding when necessary, such as instances where the keys must be increased to 64 bits in length. Known for its compatibility and flexibility, software can easily be converted for Triple DES inclusion. Therefore, it may not be nearly as obsolete as deemed by NIST. This led to the modified schemes of Triple DES (sometimes known as 3DES).3DES is a way to reuse DES implementations, by chaining three instances of DES with different keys. 3DES is believed to still be secure because it requires 2^112 brute-force operations which is not achievable with foreseeable technology. While AES is a totally new encryption that uses the substitution-permutation network, 3DES is just an adaptation to the older DES encryption that relied on the balanced Feistel network. But since it is applied three times, the implementer can choose to have 3 discrete 56 bit keys, or 2identical and 1 discrete, or even three identical keys. This means that 3DES can have encryption key lengths of 168, 112, or 56 bit encryption key lengths respectively. But due to certain vulnerabilities when reapplying the same encryption thrice, it leads to slower performance. In this paper we present a pipelined implementation in VHDL, in Electronic Code Book (EBC) mode, of this commonly used Cryptography scheme with aim to improve performance. We achieve a 48-stage pipeline depth by implementing a TDES key buffer and right rotations in the DES decryption key scheduler. We design and verify our implementation using ModelSim SE 6.3f and Xilinx ISE 8.1i. We gather cost and throughput information from the synthesis and Timing results and compare the performance of our design to common implementations presented in other literatures. Keywords-DES, AES, encryption key,VHDL, ModelSim ,Xilinx ISE 8.1i. __________________________________________________*****_________________________________________________ I. INTRODUCTION Cryptography is an art of composing in mystery symbols and is an antiquated craft; the initially reported utilization of cryptography in composing goes once again to circa-1900 B.C. at the point when an Egyptian copyist utilized non-standard symbolic representations in an engraving. A few masters contend that cryptography showed up spontaneously at some point in the wake of composing was imagined, with requisitions running from strategic messages to war-time fight tactics. It is not at all astonishment, then,that new types of cryptography came not long after the across the board improvement of machine interchanges. In information and telecommunications, cryptography is fundamental when conveying over any non-trusted medium, which incorporates pretty much any system, especially the WWW.Cryptography, then ensures information from theft or change, as well as ensures information from theft or change, as well as be utilized for client confirmation. There are, when all is said in done, three sorts of cryptographic plans ordinarily used to achieve these objectives: mystery key (or symmetric) cryptography, open-key (or unbalanced) cryptography, and hash works, each of which is depicted beneath. In all instances, the introductory decodedinformation is alluded to as plain-text. It is encoded into figure content, which will thus (ordinarily) be decoded into utilizable plain-text. Types of Cryptographic Algorithms There are numerous ways of categorizing cryptographic algorithms. For commitments to this thesis, they will be classified based on the number of keys that are engaged for encryption and decryption, and further demarcated by their application and use. The three kinds of algorithms that is conferred are given below in fig 1 Figure 1: Types of Cryptographic Algorithms