CFP last date
16 December 2024
Call for Paper
January Edition
IJAIS solicits high quality original research papers for the upcoming January edition of the journal. The last date of research paper submission is 16 December 2024

Submit your paper
Know more
Reseach Article

Hybrid Security Algorithms for Data Transmission using AES-DES

by Jignesh R. Patel, Rajesh S. Bansode, Vikas Kaul
International Journal of Applied Information Systems
Foundation of Computer Science (FCS), NY, USA
Volume 6 - Number 3
Year of Publication: 2013
Authors: Jignesh R. Patel, Rajesh S. Bansode, Vikas Kaul
10.5120/ijais13-451028

Jignesh R. Patel, Rajesh S. Bansode, Vikas Kaul . Hybrid Security Algorithms for Data Transmission using AES-DES. International Journal of Applied Information Systems. 6, 3 ( October 2013), 15-21. DOI=10.5120/ijais13-451028

@article{ 10.5120/ijais13-451028,
author = { Jignesh R. Patel, Rajesh S. Bansode, Vikas Kaul },
title = { Hybrid Security Algorithms for Data Transmission using AES-DES },
journal = { International Journal of Applied Information Systems },
issue_date = { October 2013 },
volume = { 6 },
number = { 3 },
month = { October },
year = { 2013 },
issn = { 2249-0868 },
pages = { 15-21 },
numpages = {9},
url = { https://www.ijais.org/archives/volume6/number3/535-1028/ },
doi = { 10.5120/ijais13-451028 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2023-07-05T18:52:25.794245+05:30
%A Jignesh R. Patel
%A Rajesh S. Bansode
%A Vikas Kaul
%T Hybrid Security Algorithms for Data Transmission using AES-DES
%J International Journal of Applied Information Systems
%@ 2249-0868
%V 6
%N 3
%P 15-21
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The fast evolution of digital data exchange has forced the information security to be of much important in data storage and transmission. As large amount of data is transmitted over the network, it is preliminary to secure all types of data before sending them. The problem with AES, most extensively used encryption is that it uses many multi variant equations which are linear in nature. Thus it can be broken using algebraic cryptanalysis. This provides a serious threat as AES was considered to be unbreakable and thus it was used in many encryption systems. The current paper presents the design and implementation of a hybrid based 128 bit key AES-DES algorithm as a security enhancement.

References
  1. Carlos Cid, Sean Murphy and Matthew Robshaw,2004 "Computational and Algebraic aspects of the Advanced Encryption Standard", In Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing .
  2. Aida Janadi, 2008 " AES immunity Enhancement against algebraic attacks by using dynamic S-Boxes", Information and Communication Technologies from Theory to Applications, ICTTA2008.
  3. Jing Wang & Guo-ping Jiang, 2008 "Improved DES algorith based on irrational number", IEEE Int. Conference Neural Networks & Signal Processing.
  4. M. B. Vishnu & S. K. Tiong, 2008 "Security Enhancement of Digital Motion Image Transmission Using Hybrid AES-DES Algorithm", IEEE Int.
  5. Tingyuan Nie, 2009 "A Study of DES and Blowfish Encryption Algorithm".
  6. Yuan Kun, Zhang HanLi Zhaohui, 2009 "An Improved AES algorithm based on chaos",Multimedia Information NetworkingandSecurity,INES'09. International Conference.
  7. Tingyuan Nie, Chuanwang Song, Xulong Zhi, 2010 " Performance Evaluation of DES and Blowfish Algorithms", Biomedical Engineering and Computer Science International Conference.
  8. Xiang Li, Junli Chen, Dinghu Qin, Wanggen Wan. 2010 " Research and Realization Based on hybrid encryption algorithm of improved AES and ECC", Audio Language and Image Processing (ICALIP).
  9. M. Zeghid , M. Machhout, L. khriji, A. baganne and R. Tourki, 2007 "A modified AES based algorithm for image encryption ",World Academy of Science ,Engineering and Technology .
  10. Abdinasir hasan Ali, "Analysis and implementation of security algorithms for wireless communication", IEEE, 2010.
  11. Craig Teegarden,Mudit Bhargava,Ken mai, 2010 "Side channel attack Resistant ROM based AES S-Box", IEEE Int.
  12. Manhee Lee, Student Member, IEEE, and Eun Jung Kim, Member, IEEE Computer Society, 2007 "A Comprehensive Framework for Enhancing Security in InfiniBand Architecture",IEEE Int.
  13. H. Nover, 2005 "algebraic cryptanalysis of aes: overview", university of wisconsin, usa,.
  14. S. Murphy, mj. b robshaw, 2002 "essential algebraic structure within the aes", advances in cryptology crypto 2002, lecture notes in computer science, springer-verlag.
  15. MATLAB Description, Available: http://www. mathworks. in/help/
  16. AES Description, Available: http://people. eku. edu/styere/Encrypt/JS-AES. html
  17. DES Description, Available: http://orlingrabbe. com/des. htm
  18. AES mix column http://www. angelfire. com/biz7/atleast/mix_columns. pdf
  19. Forouzan Behrouz "Cryptography & Network Security",McGraw-Hill Forouzan Networking , 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Cipher DES AES Hybrid AES DES Key matrix.