Design and Simulation DES Algorithm of Encryption for Information Security

Journal Title: American journal of Engineering Research - Year 2018, Vol 7, Issue 4

Abstract

The demand for protection increases, if the confidentiality of the information is of very high value. Security is very essential to avoid the unauthorized disclosure or alteration of the information. Due to the great change in technologies nowadays, a number of multimedia data is being generated and transmitted, leaving our own data vulnerable to be edited, modified and duplicated. Digital documents are therefore being faced by innumerable threats as they are very easy to copy and distribute. Cryptography is an art of secret writing, which authenticates data and important messages as well as protects the systems from valid attacks. One of the best existing security algorithms to provide data security is DATA Encryption Standard (DES). It comprises of encryption and decryption process each associated with a key which is supposed to be kept secret. In this paper the software C## used for the purpose of synthesis and simulation of DES algorithm. The data encryption standard is also known as DES. DES has been the most extensively used encryption algorithm standard in recent times. Encryption and decryption comprise of cryptography. Cryptography terminology is used in the data encryption standard along with standard algorithm to hide the original text. DES applies the cipher algorithm to each data block. Data encryption is being used to hide the true meaning of data so that it is very hard to attack or crack.

Authors and Affiliations

Mohammed A. Hameed, Ahmed I. Jaber, dr Jamhoor M. Alobaidy, Alaa A. Hajer

Keywords

Related Articles

Triple Mixed Oxides Modified Jourdiqua Clay in Heterogeneous Methanolysis of Castor Oil

Biodiesel is the fatty acid methyl esters, an alternative to fossil fuels, the strongest factor concern about global pollutant. Clays have very promising future in catalysis, such as esterification and transesterificatio...

A Study on work Index Evaluation of Ishiagu Galena ore Ebonyi State, Nigeria

The study on work index evaluation of Ishiagu galena ore has been carried out. Quartz and Granite obtained from the same location at a distance of 40m apart from lead ore deposit were used to determine the Bond’s work in...

Weakly π Generalized Homeomorphism in Intuitionistic Fuzzy Topology

In this paper the concepts of weakly π generalized homeomorphism on intuitionistic fuzzy topological space is introduced with numerical examples. Some of their properties are investigated.

Kinetic Study of the Fermentation of Cassava Whey

This project work is about the qualitative analysis and fermentation of cassava whey (a milky liquor that results from the pressing of freshly ground cassava) to produce ethanol using saccharomyces cerevisiae yeast. Qual...

Mathematical Modeling of the Effect of Different Parameters on Spring Back in Sheet Metal Formability Process

In the study, bending process was performed on the AISI304 sheet metals at different thicknesses (2 mm, 3 mm, 4 mm, and 5 mm) and different punch type radii (R2 mm, R4 mm, R6 mm, and R8 mm) by using air V bending techniq...

Download PDF file
  • EP ID EP396779
  • DOI -
  • Views 67
  • Downloads 0

How To Cite

Mohammed A. Hameed, Ahmed I. Jaber, dr Jamhoor M. Alobaidy, Alaa A. Hajer (2018). Design and Simulation DES Algorithm of Encryption for Information Security. American journal of Engineering Research, 7(4), 13-22. https://europub.co.uk/articles/-A-396779