Aug. 8-9, 2017 Singapore Back RTET-17, CFBHS-17, IECMAE-17, AESTWM-17, LHHSS-17 &Amp; LEBCSR-17 2017
DOI: 10.17758/eirai.f0817106
|View full text |Cite
|
Sign up to set email alerts
|

Optimized Approach for Secure Communication Using DES Algorithm

Abstract: Abstract-Security remains a major "pain" for both individuals and large organizations in today's modern world. Everything needs security, whether it is communication through telephonic media, or transfer of data files. The security or privacy can only be ensured by applying algorithms to the data defined under Cryptography. Encryption, a mechanism which changes the plaintext to a secured form defined as scrambled text(cipher). The scrambled text, then is received and decryption is done to analyze the plaintext… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 1 publication
0
2
0
Order By: Relevance
“…Information is confronted with various challenges primarily owing to the Internet, which has transformed the world into a small village, where numerous illegal methods are used to obtain information. Accordingly, the subject of security has become extremely critical for information protection, in which many security algorithms are used to achieve safety goals, and that the various aims of secure systems include authentication, confidentiality, and data integration [1]. In this current research a new method has been developed to improve advanced encryption standard (AES) algorithm.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Information is confronted with various challenges primarily owing to the Internet, which has transformed the world into a small village, where numerous illegal methods are used to obtain information. Accordingly, the subject of security has become extremely critical for information protection, in which many security algorithms are used to achieve safety goals, and that the various aims of secure systems include authentication, confidentiality, and data integration [1]. In this current research a new method has been developed to improve advanced encryption standard (AES) algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…1709 Cryptographic algorithms that are considered security algorithms involve two technicalities: symmetric and asymmetric cryptography [1]. Encipherment is a process that converts original text to unclear text, whereas decryption is the reverse of this process [3].…”
Section: Introductionmentioning
confidence: 99%