Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Data Encryption Standard Algorithm (DES) for Secure Data Transmission

IJCA Proceedings on International Conference on Advances in Emerging Technology
© 2016 by IJCA Journal
ICAET 2016 - Number 2
Year of Publication: 2016
Nirmaljeet Kaur
Sukhman Sodhi

Nirmaljeet Kaur and Sukhman Sodhi. Article: Data Encryption Standard Algorithm (DES) for Secure Data Transmission. IJCA Proceedings on International Conference on Advances in Emerging Technology ICAET 2016(2):31-37, September 2016. Full text available. BibTeX

	author = {Nirmaljeet Kaur and Sukhman Sodhi},
	title = {Article: Data Encryption Standard Algorithm (DES) for Secure Data Transmission},
	journal = {IJCA Proceedings on International Conference on Advances in Emerging Technology},
	year = {2016},
	volume = {ICAET 2016},
	number = {2},
	pages = {31-37},
	month = {September},
	note = {Full text available}


Cryptography is a technique for secure data communication. Encryption is the process of encoding messages in such a way that only authorized parties can read it. Decryption is the process of transforming data that has been rendered unreadable through encryption back to its unencrypted form. DES algorithm is a 64 bit block cipher with key of 56 bits. In this paper we will discuss the DES technique for secure data transmission while maintaining the authenticity and integrity of the message. In this, message is encrypted before the data transmission process starts. The encryption and decryption of data is done by using the data encryption standard algorithm [1].


  • W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. , Prentice Hall, 1999.
  • Dr. Mohammed M. Alani ? "Improved DES Security"?, International Multi-Conference On System, Signals and Devices, 2010.
  • Dhanraj, C. Nandini, and Mohd Tajuddin ? "An Enhanced Approch for Secret Key Algorithm based on Data Encryption Standard" ,International Journal of Research And Review in Computer Science,August 2011
  • Behrouz A. Forouzan. " Cryptography and Network Security". Tata McGraw-Hill, 2007.
  • Goyal Shivangi, (2012), "A Survey on the Applications of Cryptography" International Journal of Science and Technology Volume 1 No. 3.
  • Kumar aman, Jakhar Sudesh & Makkar Sunil, (2012), "Comparative Analysis between DES and RSA Algorithm's" International Journal of Advanced Re-search in Computer Science and Software Engineering ISSN: 2277 128X, vol 2.
  • A. Nath, S. Ghosh, M. A. Mallik, (2010), "Symmetric key cryptography using random key generator" Proceedings of International conference, Vol-2, P-239-244.
  • P. Saveetha & S. Arumugam, (2012), "Study On Improvement In RSA Algorithm And Its Implementation", International Journal of Computer & Communication Technology ISSN (PRINT): 0975 - 7449, Volume-3.
  • Shasi Mehlrotra Seth, Rajan Mishra, (2011), "Comparative Analysis of Encryption Algorithms for Data-Communication", IJCST Vol. 2.
  • Diaasalama, Abdul kader, MohiyHadhoud, (2011), "Studying the Effect of Most Common Encryption Algorithms", International Arab Journal of e-technology, vol 2, no. 1.
  • K. Rabah(2005), "Theory and implementation of data encryption standard: A review", Information Technology Journal, 4: 307-325.