An efficient implementation of Triple DES (Data Encryption Standard) through Hash function

Abstract

Cryptography, being one of the techniques that is handed out for securing a network. It is utilized by implementing many different algorithms. DES (Data Encryption Standard) is one of the most popular algorithms. But a network implementing DES can be attacked. Hence Triple DES and AES (Advanced Encryption Standard) were formulated to overcome some of the shortcomings of DES. Even then loop holes were found in Triple DES too. In order to plug these loop holes, the new approach Triple DES in a secured way by injecting message digest to it. This paper uses the conventional EDE (Encryption Decryption Encryption) technique as used in triple DES. With the help of two keys transmission, network itself processes with three keys each of 56 bits in length internally and also describes the effectiveness of new approach.

Authors and Affiliations

N. Venkatesan

Keywords

Related Articles

DESIGN & DEVELOPMENT OF A NEW AND EFFICIENT APPROACH FOR LINE TEXT EDITING IN TURBO C FOR WINDOWS.

Text editors come in the forms viz. Line editors, Stream editors, Screen editors, Word processors, Structure editors, etc. There are many text editors provided with Windows viz. Notepad, WordPad, Microsoft Office Word,...

Kerberos Authentication Protocol Modeling Using NUSMV Model

Authentication is one of the biggest problem related to computer information security in the area of distributed environments. Various protocols are used for the authentication purpose such as Needham-Schroeder protoco...

POWER QUALITY IMPROVEMENT USING PWM VOLTAGE REGULATOR

In this present paper, stress has been laid upon the present scenario of power quality in every grid. With more and more use of non linear electrical loads instead of linear loads, we get increased efficiency with redu...

Securing Mobile Agent and Reducing Overhead Using Dummy and Monitoring Mobile Agents

A mobile agent is a composition of computer software and data which is able to migrate (move) from one computer to another autonomously and continue its execution on the destination computer. The host computer offers t...

Multi Objective Multi Agent Based AccessPoint Selection Mechanism using Fuzzy Logic.

The last few years have seen a tremendous increase in the deployment of 802.11 Wireless Local Area Networks (WLANs). The proliferation of wireless users and the promise of converged voice, data and video technology is...

Download PDF file
  • EP ID EP26495
  • DOI -
  • Views 367
  • Downloads 9

How To Cite

N. Venkatesan (2011). An efficient implementation of Triple DES (Data Encryption Standard) through Hash function. International Journal of Engineering, Science and Mathematics, 1(4), -. https://europub.co.uk/articles/-A-26495