Design and Simulation DES Algorithm of Encryption for Information Security

Journal Title: American journal of Engineering Research - Year 2018, Vol 7, Issue 4

Abstract

The demand for protection increases, if the confidentiality of the information is of very high value. Security is very essential to avoid the unauthorized disclosure or alteration of the information. Due to the great change in technologies nowadays, a number of multimedia data is being generated and transmitted, leaving our own data vulnerable to be edited, modified and duplicated. Digital documents are therefore being faced by innumerable threats as they are very easy to copy and distribute. Cryptography is an art of secret writing, which authenticates data and important messages as well as protects the systems from valid attacks. One of the best existing security algorithms to provide data security is DATA Encryption Standard (DES). It comprises of encryption and decryption process each associated with a key which is supposed to be kept secret. In this paper the software C## used for the purpose of synthesis and simulation of DES algorithm. The data encryption standard is also known as DES. DES has been the most extensively used encryption algorithm standard in recent times. Encryption and decryption comprise of cryptography. Cryptography terminology is used in the data encryption standard along with standard algorithm to hide the original text. DES applies the cipher algorithm to each data block. Data encryption is being used to hide the true meaning of data so that it is very hard to attack or crack.

Authors and Affiliations

Mohammed A. Hameed, Ahmed I. Jaber, dr Jamhoor M. Alobaidy, Alaa A. Hajer

Keywords

Related Articles

Study of Various Rainfall Estimation & Prediction Techniques Using Data Mining

It is important to estimate accurately rainfall for effective use of water resources and optimal planning of water structures and availability. For this purpose, the various models and techniques are developed to estimat...

Application of Neuro-Swarm Intelligence Technique ToLoad Flow Analysis

Load flow analysis (LFA) is essential when planning design or stretching of a new or existing power station. Neuro-Swarm Intelligence is an optimally automated Artificial Intelligence (AI) solution technique which combin...

Hydrologic Modeling for Tropical Watershed Monitoring and Evaluation

Excessive farming without good conservation practices is causing watersheds degradation in Indonesia. Watershed assessment and control are needed to prevent more degradation. This study aims to evaluate performance of hy...

Analysis of Attacks in Cognitive Radio Networks

Cognitive Radio (CR) is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and...

The Use of Water Quality Index Method to Determine the Potability of Surface Water and Groundwater in the Vicinity of a Municipal Solid Waste Dumpsite in Nigeria.

The quality of the groundwater and surface water bodies close to the location of the major dumpsite being used for disposing the municipal solid waste produced by residents of Ado Ekiti, Nigeria was determined. In contra...

Download PDF file
  • EP ID EP396779
  • DOI -
  • Views 66
  • Downloads 0

How To Cite

Mohammed A. Hameed, Ahmed I. Jaber, dr Jamhoor M. Alobaidy, Alaa A. Hajer (2018). Design and Simulation DES Algorithm of Encryption for Information Security. American journal of Engineering Research, 7(4), 13-22. https://europub.co.uk/articles/-A-396779