Javascript must be enabled to continue!
Improved Structure of Data Encryption Standard Algorithm
View through CrossRef
The Internet is providing vital communications between millions of individuals. It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information. Cryptography algorithms are essential in the field of security. Brute force attacks are the major Data Encryption Standard attacks. This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm. This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks. The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key generations. This means the key generation system generates two keys: one is simple, and the other one is encrypted by using an improved Caesar algorithm. The encryption algorithm in the first 8 round uses simple key 1, and from round 9 to round 16, the algorithm uses encrypted key 2. Using the improved structure of the Data Encryption Standard algorithm, the results of this paper increase Data Encryption Standard encryption security, performance, and complexity of search compared with standard Data Encryption Standard. This means the Differential cryptanalysis cannot be performed on the cipher-text.
Title: Improved Structure of Data Encryption Standard Algorithm
Description:
The Internet is providing vital communications between millions of individuals.
It is also more and more utilized as one of the commerce tools; thus, security is of high importance for securing communications and protecting vital information.
Cryptography algorithms are essential in the field of security.
Brute force attacks are the major Data Encryption Standard attacks.
This is the main reason that warranted the need to use the improved structure of the Data Encryption Standard algorithm.
This paper proposes a new, improved structure for Data Encryption Standard to make it secure and immune to attacks.
The improved structure of Data Encryption Standard was accomplished using standard Data Encryption Standard with a new way of two key generations.
This means the key generation system generates two keys: one is simple, and the other one is encrypted by using an improved Caesar algorithm.
The encryption algorithm in the first 8 round uses simple key 1, and from round 9 to round 16, the algorithm uses encrypted key 2.
Using the improved structure of the Data Encryption Standard algorithm, the results of this paper increase Data Encryption Standard encryption security, performance, and complexity of search compared with standard Data Encryption Standard.
This means the Differential cryptanalysis cannot be performed on the cipher-text.
Related Results
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
Segmented encryption algorithm for privacy and net neutrality in distributed cloud systems
The advent of distributed cloud systems has revolutionized data storage and access, providing flexibility and scalability across various industries. However, these benefits come wi...
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
RSA vs Quantum Encryption: Flexibility, Security, and Performance Analysis for Information Processing
Introduction: With the advent of quantum computing, traditional encryption methods face significant challenges in maintaining security. This study explores quantum information proc...
An Authorized Scheme Service Privately Shared Data
An Authorized Scheme Service Privately Shared Data
In the modern digital landscape, the secure sharing of data across distributed systems remains a critical challenge. This paper proposes a blockchain-based architecture that levera...
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
Research on Video Encryption Technology Based on Cross Coupled Map Lattices System
<p>The traditional video encryption algorithm only encrypts video images, which has the problems of an extended time-consuming algorithm and poor format retention. To improve...
Efficient Hybrid Cryptography Algorithm
Efficient Hybrid Cryptography Algorithm
Cryptography is the operation of transferring a specific message to prevent an attacker from accessing the contents of a message. To increase the level of security in any communica...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Investigating data encryption technologies in securing business information systems
Investigating data encryption technologies in securing business information systems
In today’s increasingly interconnected digital landscape, businesses are confronted with the pressing need to secure sensitive information from a growing range of cyber threats. As...
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
Optimization Research of Hyperchaotic Model-Driven Encryption Algorithm in Network Security
In the context of the rapid advancement of global informatization, network security is facing unprecedented challenges, among which encryption technology, as the core means to ensu...

