CFP last date
20 May 2024
Reseach Article

Secure Message Transfer using Triple DES

by Somya Garg, Tarun Garg, Bhawna Mallick
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 165 - Number 8
Year of Publication: 2017
Authors: Somya Garg, Tarun Garg, Bhawna Mallick
10.5120/ijca2017913937

Somya Garg, Tarun Garg, Bhawna Mallick . Secure Message Transfer using Triple DES. International Journal of Computer Applications. 165, 8 ( May 2017), 1-4. DOI=10.5120/ijca2017913937

@article{ 10.5120/ijca2017913937,
author = { Somya Garg, Tarun Garg, Bhawna Mallick },
title = { Secure Message Transfer using Triple DES },
journal = { International Journal of Computer Applications },
issue_date = { May 2017 },
volume = { 165 },
number = { 8 },
month = { May },
year = { 2017 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume165/number8/27590-2017913937/ },
doi = { 10.5120/ijca2017913937 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:12:27.620628+05:30
%A Somya Garg
%A Tarun Garg
%A Bhawna Mallick
%T Secure Message Transfer using Triple DES
%J International Journal of Computer Applications
%@ 0975-8887
%V 165
%N 8
%P 1-4
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With the rapid growing of internet and networks applications, data security becomes more important than ever before. Encryption algorithms play a crucial role in information security systems. In this paper, we have a study of a popular encryption algorithm: Triple DES. We overviewed the base functions and analyzed the security for the algorithm. We have succesfully sent mails from one user to other and if a suspicious word is encountered then the mail is being sent to the admin instead of that user.

References
  1. S.Appavu alias Balamurugan, Aravind,Athiappan, Bharathiraja,Muthu Pandian and Dr.R.Rajaram, “Association Rule Mining for Suspicious Email Detection: A Data Mining Approach”, in Proc. Of the IEEE International Conference on Intelligence and Security Informatics, New Jersey,USA, 2007, pp. 316-323.
  2. P.S.Keila and D.B.Skillicorn, “Detecting unusualand Deceptive Communication in Email,” Technical reports June, 2005.
  3. S.Appavu and R.Rajaram, “Suspicious Email Detection via Decision Tree: A Data Mining Approach”, in Journal of Computing and Information Technology–CIT 15, 2007,2, pp. 161-169.
  4. S.Appavu, R.Rajaram, G.Athiapan, M.Muthupandian, “Data Mining Techniques for Suspicious Email Detection: A Comparative Study”. Presented in IADIS European Conference DataMining 2007, pp. 213-217.
  5. R.Agrawal, R.J.Bayardo and R.Srikant. Athena, “Mining-based interactive management of text databases,” In Proc. 7thInt. Conf. Extending Database Technology, Konstanz, Germany, 2000, pp.365-379.
  6. R.B.Segal and J.O.Kephart, MailCat: An Intelligent Assistant for Organizing E-Mail, in the Proc. of 3 rd Int. Conf. on Autonomous Agents.
  7. R.Agrawal and R.Srikant, “Fast algorithms for mining association rules,”In Proc. 20th Int. Conf. Very Large Databases, pp. 487-499, Santiago, Chile, 1994.
  8. Liu, W. Hsu, and Y. Ma, “Integrating classification and Data Mining”, pages 80-86, New York City, NY, August 1998.
  9. X. Yin, J. Han,”CPAR: Classification based on predictive Association Rules,”SDM’03, pages 331-335.
  10. A.A.Zaidan, B.B.Zaidan, “Novel Approach for High Secure Data Hidden in MPEG Video Using Public Key Infrastructure”, International Journal of Computer and Network Security, 2009, Vol.1, No.1, ISSN: 1985-1553, P.P 71- 76.
  11. A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O. Khalifa, “Novel Approach of Hidden Data in the (Unused Area 2 within EXE File) Using Computation between Cryptography and Steganography”, International Journal of Computer Science and Network Security (IJCSNS), Vol.9, No.5, ISSN: 1738-7906, pp. 294-300.
  12. Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan .T. Madhloom, B.B Zaidan, A.A Zaidan,” Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis”, International Journal of Engineering and Technology (IJET) , Published by: Engg Journals Publications, ISSN:0975-4042, Vol.1,NO.2,P.P 63- 69.
  13. K.Selvakuberan, M.Indradevi, R.Rajaram, (2008). Combined feature selection and classification – A novel approach for categorization of web pages. Journal of Information and Computing Science. 32pp. 83-89.
  14. A. Arauzo-Azofra, J. M. Benitez, “Empirical Study of Feature Selection Methods in Classification”, In proc. of Eighth Internation Conference on Hybrid Intelligent System s, 2008, pp. 584-589.
  15. K. T. Durant , M. D. Smith “Predicting t he political sentiment of web log post s using supervised machine learning techniques coupled with feature selecion".LNCS, 2007, pp. 187-206.
  16. A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", World Academy of Science Engineering and Technology(WASET), Vol.54, ISSN: 2070- 3724, P.P 468-479.
  17. A.A.Zaidan, Fazidah. Othman, B.B.Zaidan, R.Z.Raji, Ahmed.K.Hasan,and A.W.Naji," Securing Cover-File without Limitation of Hidden Data Size Using Computation between Cryptography and Steganography", World Congress on Engineering 2009 (WCE), The2009 International Conference of Computer Science and Engineering, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009, ISBN: 978-988-17012-5-1, Vol. I, p.p259-265.
  18. M.Abomhara, Omar Zakaria, Othman O. Khalifa, A.A.Zaidan, B.B.Zaidan, “Enhancing Selective Encryption for H.264/AVC Using Advance Encryption Standard “, International Journal of Computer and Electrical Engineering (IJCEE), ISSN: 1793-8198, Vol.2, NO.2, April2010, Singapore.
Index Terms

Computer Science
Information Sciences

Keywords

Triple DES Encryption Security Suspicious word Cipher text Decryption.