An efficient implementation of Triple DES (Data Encryption Standard) through Hash function
Journal Title: International Journal of Engineering, Science and Mathematics - Year 2011, Vol 1, Issue 4
Abstract
Cryptography, being one of the techniques that is handed out for securing a network. It is utilized by implementing many different algorithms. DES (Data Encryption Standard) is one of the most popular algorithms. But a network implementing DES can be attacked. Hence Triple DES and AES (Advanced Encryption Standard) were formulated to overcome some of the shortcomings of DES. Even then loop holes were found in Triple DES too. In order to plug these loop holes, the new approach Triple DES in a secured way by injecting message digest to it. This paper uses the conventional EDE (Encryption Decryption Encryption) technique as used in triple DES. With the help of two keys transmission, network itself processes with three keys each of 56 bits in length internally and also describes the effectiveness of new approach.
Authors and Affiliations
N. Venkatesan
ENERGY CONSERVATION: An effective way of energy Utilization
Energy plays a key role in achieving the desired economic growth. The entire fabric of developmental goals is webbed around a successful energy strategy. Energy is a pivotal prerequisite of developed economy and social...
HIGHLY QUANTITATIVE MINING ASSOCIATION RULES WITH CLUSTERING
Data mining is a step in the knowledge discovery process consisting of certain data mining algorithms that, under some acceptable computational efficiency limitations, finds patterns or models in data. Association rule...
Incorporating security into Web Applications - An Aspect oriented approach
In this era of collaborative computing and networked and shared web applications, ensuring the safety and privacy of data stored in computers and transmitted over the internet has become critically important. Web appli...
AN AUTOMATIC BACTERIAL COLONY COUNTER
Bacterial colony counting is useful in many areas e.g. Disinfectants are used to kill harmful microorganismsin many different applications. They are used in veterinary practice to help to preventthe spread of infectiou...
Privacy and Trust Management in Cloud Computing
Cloud computing is a technology that uses the internet and central remote servers to maintain data and applications. Cloud computing allows consumers and businesses to use applications without installation and access t...