We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 November 2024
Reseach Article

Improvement of S-DES Technique by use of Key Bunch Matrix and Randomizers

by Arghya Ray, Santhoshi Bhat
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 70 - Number 13
Year of Publication: 2013
Authors: Arghya Ray, Santhoshi Bhat
10.5120/12026-8089

Arghya Ray, Santhoshi Bhat . Improvement of S-DES Technique by use of Key Bunch Matrix and Randomizers. International Journal of Computer Applications. 70, 13 ( May 2013), 51-53. DOI=10.5120/12026-8089

@article{ 10.5120/12026-8089,
author = { Arghya Ray, Santhoshi Bhat },
title = { Improvement of S-DES Technique by use of Key Bunch Matrix and Randomizers },
journal = { International Journal of Computer Applications },
issue_date = { May 2013 },
volume = { 70 },
number = { 13 },
month = { May },
year = { 2013 },
issn = { 0975-8887 },
pages = { 51-53 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume70/number13/12026-8089/ },
doi = { 10.5120/12026-8089 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:32:48.918291+05:30
%A Arghya Ray
%A Santhoshi Bhat
%T Improvement of S-DES Technique by use of Key Bunch Matrix and Randomizers
%J International Journal of Computer Applications
%@ 0975-8887
%V 70
%N 13
%P 51-53
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this modern age information sharing and transfer has increased exponentially. The information shared is vulnerable to unauthorised access and inception. Cryptography is used to provide secrecy in message transmission. The Simplified Data Encryption Standard or in short S-DES algorithm is used to encrypt messages to form secret text. The previously used S-DES technique can be strengthed by use of randomised key generation techniques which will strengthen the secrecy of the message to be transferred.

References
  1. William Stallings, "Cryptography and Network Security: Principles and practices", Pearson education, Third Edition, ISBN 81-7808-902-5.
  2. Data Encryption Standard (DES) ?. National Bureau of Standards (US). Federal Information Processing Standards Publication National Technical Information Service. Springfield VA. April 1997
  3. V. U. K. Sastry and K. Shirisha, "A Novel Block Cipher Involving a Key Bunch Matrix", IJCA(0975-8887)
Index Terms

Computer Science
Information Sciences

Keywords

Information Security Information hiding Information Security Key-Bunch Matrix S-DES