Research Article

Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard

Table 3

Comparative analysis.

AlgorithmAlg. structureKey sizeBlock sizeRoundsS-boxRound modules (functions)Key transformation/schedulingDifferentiating factorsIdentificationClassification

DES [6]Feistel structure56 bits64168Permutation, expansion, substitutionPermutation basedNo key encryption, a single type of keyNoNo
3DES [7]Feistel structure112/168 bits64488Permutation, expansion, substitutionPermutation basedNo key encryption, a single type of keyNoNo
AES [8]Substitution-permutation128, 192, 256 bits12810, 12, 141Shift rows, mix column, add keysS-box basedNo key encryption, three types of keysNoNo
Blowfish [8]Feistel structure32–448 bits64164Substitution, swappingPermutation, substitution basedNo key encryptionNoNo
RC5 [9]Feistel structure64128208XOR, left rotation, right rotation“Magic constant” utilizationNo key encryptionNoNo
MES (proposed)Substitution -permutation128, 160, 192, 224, 256 bits56 bits by extender/contractor module91Even and odd round permutation; substitution, shifting, key additionContraction, mathematical operations, encryptionKey encryption, five types of keysYesYes