Secure Key Based Key Scheduling for DES and TDES Algorithms


(*) Corresponding author


Authors' affiliations


DOI's assignment:
the author of the article can submit here a request for assignment of a DOI number to this resource!
Cost of the service: euros 10,00 (for a DOI)

Abstract


Cryptographic algorithms are used as fundamental techniques for assuring confidentiality and integrity of data used in financial transactions and for authenticating entities involved in the transactions. Secure data transmission via Internet or any public network, there is no alternative to cryptography. It is widely used by governmental and intelligence agencies around the world to safe transmission of any format of messages-online or offline. No data online is secure unless use any type of cryptography to send messages. Cryptographic algorithm development is a never-ending race as the cryptanalysts are also getting smatter with the advent of higher computer power of decoding secret codes. This research will concentrate on increasing the complexity of block cipher encryption. Secure key based SDES and Trible Data Encryption Standard algorithm (STDES) is used on secure keys of Static IP address; it’s through geo-location based. Secure key based algorithms ensure the improved encryption performance, high secure and less encryption, decryption time. These algorithms are highly secure while improving the efficiency of cryptography algorithm.
Copyright © 2013 Praise Worthy Prize - All rights reserved.

Keywords


Secure Key; Static IP Address; Geo-Location; Permutation; S-Box

Full Text:

PDF


References


Imannejad, P., Karimpour, A., A new fuzzy approach on planning and decision making in engineering and construction industry, (2011) International Review on Modelling and Simulations (IREMOS), 4 (4), pp. 1974-1981.

Uddin, M., Rahman, A.A., Alsaqour, R., Server virtualization: Building energy efficient and high performance data centers to save total cost of ownership, (2012) International Review on Modelling and Simulations (IREMOS), 5 (6), pp. 2618-2626.

Benhadjyoussef, N., Elhadjyoussef, W., Machhout, M., Tourki, R., Hardware implementations of AES algorithm for 32-bit embedded system, (2013) International Review on Modelling and Simulations (IREMOS), 6 (1), pp. 277-283.

Bruice Schneier, “Applied Cryptography - Protocol, Algorithm and Source Code in C”, Second Edition, John Wiley & Sons, 2008.

William Stallings, “Network Security Essentials (Applications and Standards)” Pearson Education, 2004,pp.2-80.

Charles P. Pfleeger, Shari Lawrence Pfleeger. “Security in Computing”, Pearson Education 2004 pp. 642-666.

Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength against Attacks."IBM Journal of Research and Development, May 1994,pp. 243 -250

W.Stallings, ''Cryptography and Network Security4th Ed,'' Prentice Hall, 2005, PP. 58-309.

Federal Information Processing Standards Publication 140-1, “Security Requirements forCryptographic Modules”, U.S. Department of Commerce/NIST, Springfield, VA: NIST, 1994

Tingyuan Nie and Teng Zhang,“ A Study of DES and Blowfish Encryption Algorithm”, IEEE, 2009.

Diaa Salama, Abdul Minaam, Hatem M. Abdual-Kader, and Mohiy Mohamed Hadhoud, “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types”, International Journal of Network Security, PP.78-87,Sept. 2010.

Bruce Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, New York,1996.

Miles E. Smid and Dennis K. Branstad, "The Data Encryption Standard: Past and Future," in Gustavus J. Simmons, ed., Contemporary Cryptography: The Science of Information Integrity, IEEE Press, 1992

O.P Verma, Ritu Agarwal, Dhiraj Dafouti , Shobha Tyagi, “Peformance Analysis Of Data Encryption algorithms”,IEEE Delhi Technological University India, 2011.

NIST Special Publications 800-20, "Modes of Operation Validation System for the Triple Data Encryption Algorithm", National Institute of Standard and Technology, 2000.


Refbacks

  • There are currently no refbacks.



Please send any question about this web site to info@praiseworthyprize.com
Copyright © 2005-2024 Praise Worthy Prize