Call For Paper

Volume 10 Issue 3

March 2024

Submit Paper Here
Download Paper Format
Copyright Form
NEWS & UPDATES
News for Authors:

We have started accepting articles by online means directly through website. Its our humble request to all the researchers to go and check the new method of article submission on below link: Submit Manuscript

Follow us on Social Media:

Dear Researchers, to get in touch with the recent developments in the technology and research and to gain free knowledge like , share and follow us on various social media. Facebook

title

LOCAL DATA SECURITY THROUGH ENCRYPTION

Author(s):

Bhanupriya Vyas

Keywords:

2DES,3DES,DES,Transposition technique.

Abstract

Security is playing a vital and crucial role in the field of network communication system and Internet. Data encryption standard (DES) is a private key cryptography system that provides the security in communication system but now a days the changes in the computational power the DES seems to be weak against the brute force attacks. To improve the confidentiality of DES algorithm the transposition technique is added before the DES algorithm to perform its function. By using an Enhanced DES algorithm the security has been improved which is very crucial in the communication and also field of Internet. If the transposition technique is utilized before the original DES algorithm then the intruder required first to creak the original DES algorithm and then transposition technique. So the security is approximately double as compared to a simple DES algorithm.

Other Details

Paper ID: IJSARTV
Published in: Volume : 2, Issue : 8
Publication Date: 8/2/2016

Article Preview




Download Article