Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Data Encryption Standard Algorithm (DES) for Secure Data Transmission

Published on September 2016 by Nirmaljeet Kaur, Sukhman Sodhi
International Conference on Advances in Emerging Technology
Foundation of Computer Science USA
ICAET2016 - Number 2
September 2016
Authors: Nirmaljeet Kaur, Sukhman Sodhi
fecf92b1-7430-4df4-a724-0d75d7304545

Nirmaljeet Kaur, Sukhman Sodhi . Data Encryption Standard Algorithm (DES) for Secure Data Transmission. International Conference on Advances in Emerging Technology. ICAET2016, 2 (September 2016), 31-37.

@article{
author = { Nirmaljeet Kaur, Sukhman Sodhi },
title = { Data Encryption Standard Algorithm (DES) for Secure Data Transmission },
journal = { International Conference on Advances in Emerging Technology },
issue_date = { September 2016 },
volume = { ICAET2016 },
number = { 2 },
month = { September },
year = { 2016 },
issn = 0975-8887,
pages = { 31-37 },
numpages = 7,
url = { /proceedings/icaet2016/number2/25887-t036/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Advances in Emerging Technology
%A Nirmaljeet Kaur
%A Sukhman Sodhi
%T Data Encryption Standard Algorithm (DES) for Secure Data Transmission
%J International Conference on Advances in Emerging Technology
%@ 0975-8887
%V ICAET2016
%N 2
%P 31-37
%D 2016
%I International Journal of Computer Applications
Abstract

Cryptography is a technique for secure data communication. Encryption is the process of encoding messages in such a way that only authorized parties can read it. Decryption is the process of transforming data that has been rendered unreadable through encryption back to its unencrypted form. DES algorithm is a 64 bit block cipher with key of 56 bits. In this paper we will discuss the DES technique for secure data transmission while maintaining the authenticity and integrity of the message. In this, message is encrypted before the data transmission process starts. The encryption and decryption of data is done by using the data encryption standard algorithm [1].

References
  1. W. Stallings, Cryptography and Network Security: Principles and Practices, 5th ed. , Prentice Hall, 1999.
  2. Dr. Mohammed M. Alani ? "Improved DES Security"?, International Multi-Conference On System, Signals and Devices, 2010.
  3. Dhanraj, C. Nandini, and Mohd Tajuddin ? "An Enhanced Approch for Secret Key Algorithm based on Data Encryption Standard" ,International Journal of Research And Review in Computer Science,August 2011
  4. Behrouz A. Forouzan. " Cryptography and Network Security". Tata McGraw-Hill, 2007.
  5. Goyal Shivangi, (2012), "A Survey on the Applications of Cryptography" International Journal of Science and Technology Volume 1 No. 3.
  6. Kumar aman, Jakhar Sudesh & Makkar Sunil, (2012), "Comparative Analysis between DES and RSA Algorithm's" International Journal of Advanced Re-search in Computer Science and Software Engineering ISSN: 2277 128X, vol 2.
  7. A. Nath, S. Ghosh, M. A. Mallik, (2010), "Symmetric key cryptography using random key generator" Proceedings of International conference, Vol-2, P-239-244.
  8. P. Saveetha & S. Arumugam, (2012), "Study On Improvement In RSA Algorithm And Its Implementation", International Journal of Computer & Communication Technology ISSN (PRINT): 0975 - 7449, Volume-3.
  9. Shasi Mehlrotra Seth, Rajan Mishra, (2011), "Comparative Analysis of Encryption Algorithms for Data-Communication", IJCST Vol. 2.
  10. Diaasalama, Abdul kader, MohiyHadhoud, (2011), "Studying the Effect of Most Common Encryption Algorithms", International Arab Journal of e-technology, vol 2, no. 1.
  11. K. Rabah(2005), "Theory and implementation of data encryption standard: A review", Information Technology Journal, 4: 307-325.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Symmetric Key Asymmetric Key Des Algorithm