An efficient implementation of Triple DES (Data Encryption Standard) through Hash function

Abstract

Cryptography, being one of the techniques that is handed out for securing a network. It is utilized by implementing many different algorithms. DES (Data Encryption Standard) is one of the most popular algorithms. But a network implementing DES can be attacked. Hence Triple DES and AES (Advanced Encryption Standard) were formulated to overcome some of the shortcomings of DES. Even then loop holes were found in Triple DES too. In order to plug these loop holes, the new approach Triple DES in a secured way by injecting message digest to it. This paper uses the conventional EDE (Encryption Decryption Encryption) technique as used in triple DES. With the help of two keys transmission, network itself processes with three keys each of 56 bits in length internally and also describes the effectiveness of new approach.

Authors and Affiliations

N. Venkatesan

Keywords

Related Articles

Data Sharing and Querying in Peer-to-Peer Data management System

In this work, we investigate mechanisms to support data sharing and querying in a peer-to-peer data management system, that is, a peer-to-peer system where each peer manages its own data. To support data sharing, we pr...

Android Basic Architecture including Operating System using their Application

This paper discusses about Android which is software developed for the AndroidTM mobile devices. Android is a software stack for mobile devices that includes an operating system, middleware and key applications. Androi...

Corporate Merger & Acquisition: A Strategic approach in Indian Banking Sector

It is an inherent desire and need of every business to grow vertically and horizontally. Organic growth, that is development from within, is often slow and sometimes difficult. Competition is fierce, and companies must...

PRODIGIOUS PROCUREMENT MANAGEMENT ON ROBBINGTON GROUPS CONSTRUCTION PROJECT IN ENGLAND

Robbington leisure place is a dynamic leisure group that is constantly seeking to expand its business forward. They are one of the largest operators of horseracing; they stage 20 percent of all racing fixtures held eac...

Identification of Paraphrasing in the context of Plagiarism

Paraphrasing is a very important form of processing for natural language processing (NLP). A characteristic property of natural language is that various expressions can exist to express a single concept. The aim of thi...

Download PDF file
  • EP ID EP26495
  • DOI -
  • Views 360
  • Downloads 9

How To Cite

N. Venkatesan (2011). An efficient implementation of Triple DES (Data Encryption Standard) through Hash function. International Journal of Engineering, Science and Mathematics, 1(4), -. https://europub.co.uk/articles/-A-26495