Proposing an Encryption Algorithm based on DES
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 2 Issue 9, September 2013

Proposing an Encryption Algorithm based on DES

Omar Zughoul, Hajar Mat Jani

In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithms design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.

Keywords: Database Security, DES, 3DES, and XS-DES

Edition: Volume 2 Issue 9, September 2013

Pages: 321 - 326

Share this Article

How to Cite this Article?

Omar Zughoul, Hajar Mat Jani, "Proposing an Encryption Algorithm based on DES", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013299, Volume 2 Issue 9, September 2013, 321 - 326

92 PDF Views | 78 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Database Security'

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 612 - 613

Database Privilege Management and Data Dictionary: Security Issues and Avoidance

M. Rajesh

Share this Article

Research Paper, Information Technology, Malaysia, Volume 2 Issue 9, September 2013

Pages: 321 - 326

Proposing an Encryption Algorithm based on DES

Omar Zughoul, Hajar Mat Jani

Share this Article

Similar Articles with Keyword 'DES'

Survey Paper, Information Technology, Ghana, Volume 8 Issue 6, June 2019

Pages: 64 - 69

The Use of Information and Communication Technology (ICT) in Teaching and Learning of Mathematics in Al-Faruq College of Education, Wenchi-Ghana

Abu Sulemana, Yahuza Abdul-Kadir

Share this Article

Research Paper, Information Technology, Kenya, Volume 9 Issue 10, October 2020

Pages: 502 - 505

Integrated Library Systems and Performance of the Post-Modern Library of Kenyatta University, Kenya

Yvonne Oyaro Opiyo, David Nzuki

Share this Article

Research Paper, Information Technology, India, Volume 3 Issue 10, October 2014

Pages: 1896 - 1909

User's Experience with E-Journal Features: A Research Survey of Aerospace Scientists and Engineers of Bangalore

R. Guruprasad, P. Marimuthu

Share this Article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this Article

Research Paper, Information Technology, India, Volume 7 Issue 2, February 2018

Pages: 291 - 294

India's Arm Manufacturing in Defence Sector

Kashif Kaularikar, Ajeet Yadav, Farheen Baig, Sabeeha Khan, Shehnaz Khan

Share this Article
Top