International Journal of Interactive Mobile Technologies (iJIM) – eISSN: 1865-7923 – Vol  17 No  14 (2023) Paper—Analytical Approach for Data Encryption Standard Algorithm Analytical Approach for Data Encryption Standard Algorithm https://doi.org/10.3991/ijim.v17i14.38641 Obaida M. Al-hazaimeh1(), Moyawiah A. Al-Shannaq2, Mohammed J. Bawaneh1, Khalid M.O. Nahar2 1 Al-Balqa Applied University, Irbid, Jordan 2 Yarmouk University, Irbid, Jordan dr_obaida@bau.edu.jo Abstract—Although it was first developed and studied in the late 1970s and early 1977s, the Data Encryption Standard (DES) algorithm has grown in popu- larity. There are two causes for this occurrence. First, the DES algorithm's complex mathematical structure allows it to serve as the theoretical foundation for a wide variety of applications. Second, the encryption technique works quite well in practice for a variety of applications when implemented correctly. In this paper, we undertake a thorough and practical review of the theoretical as- pects of this sort of encryption algorithm and demonstrate how they have been implemented by executing multiple encryption configurations. Keywords—data encryption standard, cryptography, S-box, bit rotation, sym- metric cipher 1 Introduction The Data Encryption Standard (DES) is a standard technique for securing comput- er and telecommunication data. The National Bureau of Standards (now the National Institute of Standards and Technology) first adopted this standard in 1977 as FIPS Pub 46 [1, 2]. DES is a block cipher of the Feistel type that operates on 64-bit data blocks with a 56-bit key [3, 4].Feistel ciphers use numerous rounds to decipher a block of bits by independently processing its left and right halves. To be invertible, a Feistel cipher just requires that the function (f) used to operate on the half-blocks of data bits be invertible, which is an intriguing property in and of itself. Because it exe- cutes both substitutions and permutations, the function f in the Data Encryption Algo- rithm is a product cipher.The Data Encryption Standard (DES) is an example of a symmetric block cipher [5, 6]. Each 64-bit block of plaintext is converted into cipher- text using a 56-bit key.The 56-bit key used to encipher the text is the same key used to decrypt it. The only variation between encryption and decryption is in the for- mation of sub-keys, therefore the key and algorithm are the same in both cases. Per- mutations, initial and inverse initial, and 16 comparable rounds of permutations, summing, and bit-wise manipulations are used in DES's processing of input blocks. The initial permutation merely passes input bits to different processing locations. The 126 https://www.i-jim.org https://doi.org/10.3991/ijim.v17i14.38641 mailto:dr_obaida@bau.edu.jo Paper—Analytical Approach for Data Encryption Standard Algorithm second bit, for example, is routed to location 33, and bit 55 is routed to place two. This rerouting is clearly explained in FIPS Pub-46. The inverse initial permutation is simply the opposite of the initial permutation. The block is processed in 16 iterations between the initial and inverse initial permutations. The DES algorithm's block dia- gram is presented in Figure 1 [5, 7-9]. This paper is structured as follows. In Section 2 we review the theory of DES algo- rithm with simple example. In section 3 illustrates the evaluation of the DES algo- rithm. Section 4 concludes the conclusion. Fig. 1. Block diagram of DES algorithm 2 DES Processes – Example The DES algorithm encrypts messages in blocks of 64 bits, which is equivalent to 16 hexadecimal digits. The "keys" that DES employs to encrypt data are reportedly 16 hexadecimal digits long, or 64 bits. The DES algorithm uses a 56-bit key, but discards every eighth bit as noise. In any event, 64-bits (i.e., 16 Hexadecimal digits) is the round number based on which DES is structured. DES algorithm is based on the fun- damental parts: Subkeys generation and encryption process[10, 11].These parts are explained in the following subsections bellow. iJIM ‒ Vol. 17, No. 14, 2023 127 Paper—Analytical Approach for Data Encryption Standard Algorithm 2.1 Sub keys generator This phase make a 16 sub-keys, each with a length of 48-bits. The Sub-key genera- tion process based on sequential steps: Let K be the Hexadecimal key K = 133457799BBCDFF1. 1. Convert the K to the binary key based on Figure 2 as illustrated in Table 1 and Fig- ure 3. Table 1. Key representation - Binary Range Group HEX Binary [1-2] 1 13 00010011 [3-4] 2 34 00110100 [5-6] 3 57 01010111 [7-8] 4 79 01111001 [9-10] 5 9B 10011011 [11-12] 6 BC 10111100 [13-14] 7 DF 11011111 [15-16] 8 F1 11110001 Fig. 2. Convert key to binary sequence Key = 0001001100110100010101110111100110011011101111001101111111110001 Fig. 3. 64-Bits key length 2. Key permutation to 56-Bits length The 64-bit key is permuted according to the Table 2 to generate a 56-Bit. As the first number in the table, "57" indicates that the 57th bit of the original key is the new starting point for the permuted key. The second bit of the permuted key is the original key's 49th bit. Bit 4 of the original key is now the final bit of the permuted key. Re- member that the permuted key only contains 56-bits of the original key as shown in Figure 4. Fig. 4. 56-Bits permuted key 128 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm Table 2. Index permutation 3. Split the permuted key into 2 blocks (i.e., C0 and D0), each block 28-Bits as shown in Figure 5. Fig. 5. 28-Bits each block 4. Shift each block based on the shift left value to generate 16-Subkeys as shown in Figure 6 and 7. Fig. 6. Result of the shift left operation -Right block Fig. 7. Result of the shift left operation - Left block 5. Recombine Cn and Dn to generate 16- Sub keys each sub key size is 56-Bits as shown in Figure 8. iJIM ‒ Vol. 17, No. 14, 2023 129 Paper—Analytical Approach for Data Encryption Standard Algorithm Fig. 8. Sub keys – 56-Bits length 6. Key permutation to 48-Bits length The 56-bit key is permuted according to the Table 3 to generate a 48-bit as shown in Figure 9. Table 3. Index permutation to 48-bits length 130 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm Fig. 9. 16-Sub keys – 48-Bits key length for each sub key iJIM ‒ Vol. 17, No. 14, 2023 131 Paper—Analytical Approach for Data Encryption Standard Algorithm As soon as this phase is completed, we have generated the sub keys Kn, for 1≤n≤16, by applying the permutation structure based on Table 3 to each of the joined CnDn pairs. Now let's take a look at the actual message (i.e., Plaintext) by applying the second phase (i.e., Encryption process). 2.2 Encryption process Now let's take a look at the actual message (i.e., plaintext) by applying the second phase (i.e., Encryption process). The encryption process based on sequential steps: Let plaintext be the Hexadecimal M = 0123456789ABCDEF. 1. Convert the Plaintext to the binary key based on Figure 10 as illustrated in Table 4 and Figure 11. Table 4. Key binary representation Range Group HEX Binary [1-2] 1 01 00000001 [3-4] 3 23 00100011 [5-6] 5 45 01000101 [7-8] 7 67 01100111 [9-10] 9 89 10001001 [11-12] 11 AB 10101011 [13-14] 13 CD 11001101 [15-16] 15 EF 11101111 Fig. 10. Convert message to binary sequence Message is 0000000100100011010001010110011110001001101010111100110111101111 Fig. 11. Plaintext- 64-Bits length 2. Plain-text initial permutation Initially, the 6-bits that make up the message data M are shuffled around. Each en- try in Table 5 indicates how the bits have been rearranged from their original order. M's 58th bit is now the first bit. As a result, bit 50 of M is now bit 2. As for M, the seventh bit is the very last one as shown in Figure 12. 132 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm Table 5. Initial permutation Fig. 12. Result of the initial permutation 3. Ln and Rn Here, DES split the permuted message (See Figure 12) into two halves, each of which consists of 32-bits (i.e., Left and Right) as shown in Figure 13. Fig. 13. Left and right parts Now, perform DES structure to generate L0 to L16 and R0 to R16 based on the fol- lowing formula: Ln=Rn-1 Rn=Ln-1 XOR F(Rn-1, Kn) L1 L1=R1-1 L1=R0 R1 R1=L1-1 XOR F(R1-1, K1) R1=L0 XOR F(R0, K1) L2 L2=R2-1 L2=R1 R2 R1=L2-1 XOR F(R2-1, K2) R2=L1 XOR F(R1, K2) L3 L3=R3-1 L3=R2 R3 R3=L3-1 XOR F(R3-1, K3) R3=L2 XOR F(R2, K3) . . . . . . . . . L15 L15=R15-1 L15=R14 R15 R15=L15-1 XOR F(R15-1, K15) R15=L15 XOR F(R14, K15) L16 L16=R16-1 L16=R15 R16 R16=L16-1 XOR F(R16-1, K16) R16=L15 XOR F(R15, K16) The Implementation process for 2-rounds to generate L1 and R1 as follow: iJIM ‒ Vol. 17, No. 14, 2023 133 Paper—Analytical Approach for Data Encryption Standard Algorithm Figure 14 displayed L1. To find R1, we get R0 = 32-Bits and K1 = 48- Bits. DES algorithm expands R0 to be 48-Bits based on Table 6 (i.e., Bit-selection). Table 6, repeats some of the bits in Rn-1 to expand 32-bit to 48-bits as shown in Figure 15. Fig. 14. L1 32-bits length Table 6. Bit-selection Fig. 15. Expanded R0 to 48-bits length In Figure 16, the expanded R0 is XORed with the Sub key No.1 (See Figure 9) Fig. 16. Result of XOR operation As can be seen in Figure 17, the XORed data has been partitioned into 8 groups, each of which consists of 6-bits. Fig. 17. Group selection 134 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm DES uses six-bit groups as addresses in "S-boxes" as shown in Figure 18. Each six-bit group gives an S-box address. A 4-bit number is at that address. This 4-bit number replaces 6 bits. The eight groups of 6-bits are turned into eight groups of 4- bits (S-box outputs) for 32 bits. S-box value is determined as shown in Table 7. iJIM ‒ Vol. 17, No. 14, 2023 135 Paper—Analytical Approach for Data Encryption Standard Algorithm Fig. 18. S-Box for each group Table 7. S-box utilization Figure 19 displays the result derived from the preceding table (Table 7). Group No. Binary Representation Binary Decimal S-Box Intersection S-Box Group No.1 011000 5 (See Figure 18) S1 – Box-Group No. 1 Row First & Last-Bit (2-Bits) 00 0 Column In Between (4-Bits) 1100 12 Group No.2 010001 12 (See Figure 18) S2 – Box-Group No. 2 Row First & Last-Bit (2-Bits) 01 1 Column In Between (4-Bits) 1000 8 Group No.3 011110 8 (See Figure 16)S3 – Box-Group No. 3 Row First & Last-Bit (2-Bits) 00 0 Column In Between (4-Bits) 1111 15 Group No.4 111010 2 (See Figure 18) S4 – Box-Group No. 4 Row First & Last-Bit (2-Bits) 10 2 Column In Between (4-Bits) 1101 13 Group No.5 100001 11 (See Figure 18) S5 – Box-Group No. 5 Row First & Last-Bit (2-Bits) 11 3 Column In Between (4-Bits) 0000 0 Group No.6 100110 5 (See Figure 18) S6 – Box-Group No. 6 Row First & Last-Bit (2-Bits) 10 2 Column In Between (4-Bits) 0011 3 Group No.7 010100 9 (See Figure 18) S7– Box-Group No. 7 Row First & Last-Bit (2-Bits) 00 0 Column In Between (4-Bits) 1010 10 Group No.8 100111 7 (See Figure 18) S8 – Box-Group No. 8 Row First & Last-Bit (2-Bits) 11 3 Column In Between (4-Bits) 0011 3 136 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm Fig. 19. Binary representation of the obtained result 4. Function (f) The final step in calculating f is to permute the S-box output using Table 8 to achieve the final value of f as shown in Figure 20. Table 8. Index permutation Fig. 20. F(R0, K1) R1=L0 XOR F(R0, K1), we got the result in Figure 21 to represent R1. Fig. 21. R1 Repeating the preceding steps yields L16 and R16as indicated in Figure 22. Fig. 22. L16 and R16 5. Re-combine L16 and R16 We have the blocks L16 and R16 at the end of the sixteenth round. The two blocks are then reversed into the 64-bit block (i.e., R16L16) as shown in Figure 23. Fig. 23. R16L16 iJIM ‒ Vol. 17, No. 14, 2023 137 Paper—Analytical Approach for Data Encryption Standard Algorithm Finally, utilize Table 9's for final Permutation as shown in Table 9 and Figure 24. Table 9. Initial permutation - Inverse Fig. 24. Binary representation of the Cipher text -64-Bits If we express the result as a Hexadecimal, we get the value as shown in Table 10 for both plain and cipher texts. Table 10. HEX data representation for Plain and Cipher texts DATA HEXADECIMAL Number SIZE Plaintext 0123456789ABCDEF 16 * 4 = 64- Bits Cipher text 85E813540F0AB405 16 * 4 = 64- Bits To make it clear, we have outlined how DES algorithm operates to convert plain text to cipher text in Figures 25, 26, and 27. Fig. 25. Steps of DES algorithm 138 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm Fig. 26. DES-For each round Fig. 27. Function F(Rn-1, Kn) 3 Evaluation Data Encryption Standard (i.e., DES) is an obsolete symmetric key encryption technique[12]. It was implemented by government entities in 1977 to safeguard sensi- tive information and was officially decommissioned in 2005 [13, 14].The initial speci- fication was developed by IBM's researchers in the early 1970s. Afterwards, in 1977, it became an official Federal Information Processing Standard (i.e., FIPS) for the encryption of commercial and sensitive but unclassified government computer data by the U.S. National Bureau of Standards, now known as the National Institute of Stand- ards and Technology, or NIST[6, 15, 16].The United States government first allowed the public release of DES, an encryption algorithm. In doing so, it secured its rapid adoption by sectors like the financial sector, which required robust encryption. Due to iJIM ‒ Vol. 17, No. 14, 2023 139 Paper—Analytical Approach for Data Encryption Standard Algorithm its ease of use, DES was also implemented in many embedded devices, such as smart cards, SIM cards, modems, and routers [17-19]. Brute-force attacks, in which each possible key is tried in turn until the correct one is discovered, are the most fundamental way to break any cipher[20]. The number of potential keys, and hence the viability of this form of attack, is directly proportional to the key length as shown in Table 11 [7, 16, 21].A maximum of 256 or nearly 72 quad- rillion, attempts would be needed to find the correct key, given that the effective DES key length is 56 bits. This is insufficient to prevent modern computers from breaking through DES-protected data using brute force[22]. Through the early to middle 1990s, DES was still the de facto standard for secure data transmission. While this may seem like a long time, in 1998, a computer created by the Electronic Frontier Foundation (i.e., EFF) deciphered a DES-encoded communication in just 56 hours. The next year, EFF reduced the decryption time to 22 hours by harnessing the power of thousands of networked computers. The extended version of DES, known as Triple-DES (i.e., TDES or 3-DES), will be used in government and finance for many years to come. The differences and similarities between DES and Triple-DES are shown in Table 12 [14, 23-29]. Table 11. Total Key-Search Time: an Average Estimate Key size - Bits Quantity of alternate keys Decryption time - 1 /μs 168 2168 = 3.7 x1050 2167μs = 5.9 x 1036 years 128 2128 = 3.4 x1038 2127μs = 5.4 x1024 years 56 256 = 7.2 x 1016 255μs = 1142 years 32 232 = 4.3 x 109 231μs = 35.8minutes Table 12. DES and Triple-DES - Comparison Feature DES Triple-DES Created by / Year IBM - 1975 IBM - 1978 Key size 56 - Bits (168 or 112) - Bits Number of rounds 16 48 Number of Sub keys 16 48 Key generations Permute Shift Permute Shift Block size 64 – Bits 64 – Bits Mathematical operations S-Boxes- Fixed, XOR S-Boxes- Fixed, XOR Cipher type Block cipher - Symmetric Block cipher - Symmetric Attack Broken in 1998 - Brute-force No known Attack Security level Not Secure Enough Adequate Security Speed Slow Very Slow 4 Conclusion In this paper we have attempted to present the theory of Data Encryption Standard (i.e., DES) algorithm from the simplest to the most sophisticated concept. It has been 140 https://www.i-jim.org Paper—Analytical Approach for Data Encryption Standard Algorithm our purposes to focus on the practical explanation of the basic mathematics and how DES algorithm it could be implemented in practice in real world system because a correct comprehension of the encryption algorithm leads to an understanding of the pros and cons, which allows for modernization and the development of a new encryp- tion algorithm that operates more efficiently. 5 References [1] O. C. Abikoye, A. D. Haruna, A. Abubakar, N. O. Akande, and E. O. Asani, "Modified advanced encryption standard algorithm for information security," Symmetry, vol. 11, p. 1484, 2019. https://doi.org/10.3390/sym11121484 [2] H. B. Acla and B. D. Gerardo, "Security Analysis of Lightweight Encryption based on Advanced Encryption Standard for Wireless Sensor Networks," in 2019 IEEE 6th Interna- tional Conference on Engineering Technologies and Applied Sciences (ICETAS), 2019, pp. 1-6. https://doi.org/10.3390/sym11121484 [3] O. M. A. AI-Hazaimeh, "Design of a new block cipher algorithm," Network and Complex Systems, vol. 3, pp. 1-5, 2013. [4] O. Al-Hazaimeh, N. Alhindawi, S. M. Hayajneh, and A. Almomani, "HANON chaotic map-based new digital image encryption algorithm," MAGNT Research Report, vol. 2, pp. 261-266, 2014. [5] R. Bhanot and R. Hans, "A review and comparative analysis of various encryption algo- rithms," International Journal of Security and Its Applications, vol. 9, pp. 289-306, 2015. https://doi.org/10.3390/sym11121484 [6] O. M. Al-hazaimeh, "A novel encryption scheme for digital image-based on one dimen- sional logistic map," Computer and Information Science, vol. 7, p. 65, 2014. https://doi. org/10.5539/cis.v7n4p65 [7] T. Hagras, D. Salama, and H. Youness, "Anti-attacks encryption algorithm based on DNA computing and data encryption standard," Alexandria Engineering Journal, vol. 61, pp. 11651-11662, 2022. https://doi.org/10.5539/cis.v7n4p65 [8] S.-J. Han, H.-S. Oh, and J. Park, "The improved data encryption standard (DES) algo- rithm," in Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Tech- niques and Applications, 1996, pp. 1310-1314. [9] M. Khan and N. Munir, "A novel image encryption technique based on generalized ad- vanced encryption standard based on field of any characteristic," Wireless personal com- munications, vol. 109, pp. 849-867, 2019. https://doi.org/10.5539/cis.v7n4p65 [10] M. E. Smid and D. K. Branstad, "Data encryption standard: past and future," Proceedings of the IEEE, vol. 76, pp. 550-559, 1988. https://doi.org/10.1109/5.4441 [11] Z. Yingbing and L. Yongzhen, "The design and implementation of a symmetric encryption algorithm based on DES," in 2014 IEEE 5th International Conference on Software Engi- neering and Service Science, 2014, pp. 517-520. https://doi.org/10.1109/ICSESS.2014. 6933619 [12] O. Laia and E. Zamzami, "Analysis of Combination Algorithm Data Encryption Standard (DES) and Blum-Blum-Shub (BBS)," in Journal of Physics: Conference Series, 2021, p. 012017. https://doi.org/10.1109/ICSESS.2014.6933619 [13] M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, "A survey on the cryptographic encryption algorithms," International Journal of Advanced Computer Science and Applications, vol. 8, 2017. https://doi.org/10.14569/IJACSA.2017. 081141 iJIM ‒ Vol. 17, No. 14, 2023 141 https://doi.org/10.3390/sym11121484 https://doi.org/10.3390/sym11121484 https://doi.org/10.3390/sym11121484 https://doi.org/10.5539/cis.v7n4p65 https://doi.org/10.5539/cis.v7n4p65 https://doi.org/10.5539/cis.v7n4p65 https://doi.org/10.5539/cis.v7n4p65 https://doi.org/10.1109/5.4441 https://doi.org/10.1109/ICSESS.2014.6933619 https://doi.org/10.1109/ICSESS.2014.6933619 https://doi.org/10.1109/ICSESS.2014.6933619 https://doi.org/10.14569/IJACSA.2017.081141 https://doi.org/10.14569/IJACSA.2017.081141 Paper—Analytical Approach for Data Encryption Standard Algorithm [14] C. Paar and J. Pelzl, "The data encryption standard (DES) and alternatives," in Under- standing Cryptography, ed: Springer, 2010, pp. 55-86. https://doi.org/10.14569/IJACSA. 2017.081141 [15] O. M. Al-Hazaimeh, "A new speech encryption algorithm based on dual shuffling Hénon chaotic map," International Journal of Electrical and Computer Engineering (IJECE), vol. 11, pp. 2203-2210, 2021. https://doi.org/10.14569/IJACSA.2017.081141 [16] O. M. Al-Hazaimeh, N. Alhindawi, and N. A. Otoum, "A novel video encryption algo- rithm-based on speaker voice as the public key," in 2014 IEEE International Conference on Control Science and Systems Engineering, 2014, pp. 180-184. https://doi.org/10.1109/ CCSSE.2014.7224533 [17] S. K. Rakeshkumar, "Performance analysis of data encryption standard algorithm & pro- posed data encryption standard algorithm," International Journal of Engineering Research and Development, vol. 7, pp. 11-20, 2013. [18] D. Sensarma and S. S. Sarma, "GMDES: A Graph Based Modified Data Encryption Standard Algorithm With Enhanced Security‖," International Journal of Research in Engi- neering and Technology, vol. 3, pp. 653-660, 2014. https://doi.org/10.15623/ijret.2014. 0303121 [19] N. Tahat, A. A. Tahat, M. Abu-Dalu, R. B. Albadarneh, A. E. Abdallah, and O. M. Al- Hazaimeh, "A new RSA public key encryption scheme with chaotic maps," International Journal of Electrical & Computer Engineering (2088-8708), vol. 10, 2020. https://doi.org/ 10.11591/ijece.v10i2.pp1430-1437 [20] N. Tahat, A. Alomari, A. Al–Freedi, O. M. Al-Hazaimeh, and M. F. Al–Jamal, "An effi- cient identity-based cryptographic model for Chebyhev chaotic map and integer factoring based cryptosystem," Journal of Applied Security Research, vol. 14, pp. 257-269, 2019. https://doi.org/10.11591/ijece.v10i2.pp1430-1437 [21] O. M. A. Al-hazaimeh, "New cryptographic algorithms for enhancing security of voice da- ta," Universiti Utara Malaysia, 2010. [22] M. Abdelwahab, M. Rizk, and H. Slim, "Extracting algebraic equations of the 2-key sim- plified 3-DES for algebraic cryptanalysis," Journal of Engineering Science and Military Technologies, vol. 3, pp. 1-13, 2019. https://doi.org/10.21608/ejmtc.2019.9737.1105 [23] L. Wang and G. Jiang, "The design of 3-DES encryption system using optimizing keys," in 2019 China-Qatar International Workshop on Artificial Intelligence and Applications to Intelligent Manufacturing (AIAIM), 2019, pp. 56-58. https://doi.org/10.1109/AIAIM. 2019.8632786 [24] O. M. A. Al-Hazaimeh, "A new approach for complex encrypting and decrypting data," In- ternational Journal of Computer Networks & Communications, vol. 5, p. 95, 2013. https://doi.org/10.1109/AIAIM.2019.8632786 [25] R. Sharma and R. Sharma, "A Novel Approach Using 3-Des Algorithm Against Crypto- graphic Attacks," Think India Journal, vol. 22, pp. 8130-8139, 2019. https://doi.org/ 10.26643/think-india.v22i3.8314 [26] S. Zeebaree, "DES encryption and decryption algorithm implementation based on FPGA," Indones. J. Electr. Eng. Comput. Sci, vol. 18, pp. 774-781, 2020. https://doi.org/10.11591/ ijeecs.v18.i2.pp774-781 [27] M. A. Dar, A. Askar, D. Alyahya, and S. A. Bhat, "Lightweight and Secure Elliptical Curve Cryptography (ECC) Key Exchange for Mobile Phones," International Journal of Interactive Mobile Technologies, vol. 15, 2021. https://doi.org/10.3991/ijim.v15i23.26337 [28] I. M. ALattar and A. M. S. Rahma, "A New Block Cipher Algorithm Using Magic Square of Order Five and Galois Field Arithmetic with Dynamic Size Block," International Jour- 142 https://www.i-jim.org https://doi.org/10.14569/IJACSA.2017.081141 https://doi.org/10.14569/IJACSA.2017.081141 https://doi.org/10.14569/IJACSA.2017.081141 https://doi.org/10.1109/CCSSE.2014.7224533 https://doi.org/10.1109/CCSSE.2014.7224533 https://doi.org/10.15623/ijret.2014.0303121 https://doi.org/10.15623/ijret.2014.0303121 https://doi.org/10.11591/ijece.v10i2.pp1430-1437 https://doi.org/10.11591/ijece.v10i2.pp1430-1437 https://doi.org/10.11591/ijece.v10i2.pp1430-1437 https://doi.org/10.21608/ejmtc.2019.9737.1105 https://doi.org/10.1109/AIAIM.2019.8632786 https://doi.org/10.1109/AIAIM.2019.8632786 https://doi.org/10.1109/AIAIM.2019.8632786 https://doi.org/10.26643/think-india.v22i3.8314 https://doi.org/10.26643/think-india.v22i3.8314 https://doi.org/10.11591/ijeecs.v18.i2.pp774-781 https://doi.org/10.11591/ijeecs.v18.i2.pp774-781 https://doi.org/10.3991/ijim.v15i23.26337 Paper—Analytical Approach for Data Encryption Standard Algorithm nal of Interactive Mobile Technologies, vol. 15, 2021. https://doi.org/10.3991/ijim.v15i16. 24187 [29] A. S. Jamil and A. M. S. Rahma, "Cyber Security for Medical Image Encryption using Circular Blockchain Technology Based on Modify DES Algorithm," International Journal of Online & Biomedical Engineering, vol. 19, 2023. https://doi.org/10.3991/ijoe.v19i03. 37569 6 Authors Obaida M. Al-Hazaimeh earned a BSc in Computer Science from Jordan's Ap- plied Science University in 2004 and an MSc in Computer Science from Malaysia's University Science Malaysia in 2006. In 2010, he earned a PhD in Network Security (Cryptography) from Malaysia. He is a Full professor at Al-Balqa Applied Universi- ty's Department of Computer Science and Information Technology. Cryptology, im- age processing, machine learning, and chaos theory are among his primary research interests. He has published around 57 papers in international refereed publications as an author or co-author. He can be contacted at email: dr_obaida@bau.edu.jo. Moyawiah A. Al-Shannaq is an associate Professor of Computer Sciences in the Faculty of Information Technology and Computer Science, Yarmouk University. I received my MSc and BSc in Computer Sciences from Yarmouk University, Jordan. I received my PhD in Computer Sciences from Kent State University, Ohio, USA (2015). His main research interests are stenography, machine learning, algorithmic graph and hypergraph theory, and natural language processing. He can be contacted at email: moyawiah.s@yu.edu.jo. Mohammed J. Bawaneh is an associate Professor in the Department of Computer Science and Information Technology. He received his PhD in computer information systems. His main research interests are stenography and machine learning. Now, he is a lecturer at Al-Balqa Applied University – Al-huson University College, Jordan. He can be contacted at email: dr_mjab@bau.edu.jo. Khalid M.O. Nahar is an associate Professor in the Department of Computer Sci- ences-Faculty of IT, Yarmouk University, Irbid-Jordan. He received his BS and MS in Computer Sciences from Yarmouk University in Jordan, in 1992 and 2005, respec- tively. He was awarded a full scholarship to continue his PhD in Computer Sciences and Engineering from King Fahd University of Petroleum and Minerals (KFUPM), KSA. In 2013, he completed his PhD and started his job as an Assistant Professor at Tabuk University, KSA for two years. In 2015, he backs to Yarmouk University and from now he is the chairman of training and development department. He can be contacted at email: Khalids@yu.edu.jo. Article submitted 2023-02-07. Resubmitted 2023-04-01. Final acceptance 2023-04-01. Final version published as submitted by the authors. iJIM ‒ Vol. 17, No. 14, 2023 143 https://doi.org/10.3991/ijim.v15i16.24187 https://doi.org/10.3991/ijim.v15i16.24187 https://doi.org/10.3991/ijoe.v19i03.37569 https://doi.org/10.3991/ijoe.v19i03.37569 mailto:dr_obaida@bau.edu.jo mailto:moyawiah.s@yu.edu.jo mailto:dr_mjab@bau.edu.jo mailto:Khalids@yu.edu.jo