International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Information Technology | Malaysia | Volume 2 Issue 9, September 2013

Proposing an Encryption Algorithm based on DES

Omar Zughoul, Hajar Mat Jani

In this paper, a new method for key generation using Data Encryption Standard (DES) is proposed in order to make it more secure than DES algorithm, but at the same time faster than 3DES algorithm. Some parts of the DES are modified to improve its security and performance aspects. The proposed algorithm is named XS-DES (Extra Secure DES). We modify the process of key generation to improve its level of security, and present the proposed algorithms design structure in more detail. We increase the size of the key from 64 bits into 128 bits, and then split the key into two halves, left and right (Kl, Kr), and each one consists of 64 bits. XS-DES will be used to encrypt some important information inside the database, like passwords, exam scores, and other confidential details. In other words, to increase the security in the database and protect it from attackers, all critical information must be encrypted using a strong encryption algorithm and a more secure algorithm (XS-DES) is proposed here. A workable Online Examination System (OES) that applies XS-DES and the original DES algorithms is developed. It has gone through some preliminary testings and a comparison is performed between the results of these algorithms based on their strengths in handling database attackers.

Keywords: Database Security, DES, 3DES, and XS-DES

Edition: Volume 2 Issue 9, September 2013

Pages: 321 - 326


How to Cite this Article?

Omar Zughoul, Hajar Mat Jani, "Proposing an Encryption Algorithm based on DES", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=02013299, Volume 2 Issue 9, September 2013, 321 - 326

29 PDF Views | 22 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Database Security'

Research Paper, Information Technology, Malaysia, Volume 2 Issue 9, September 2013

Pages: 321 - 326

Proposing an Encryption Algorithm based on DES

Omar Zughoul, Hajar Mat Jani

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 3, March 2015

Pages: 612 - 613

Database Privilege Management and Data Dictionary: Security Issues and Avoidance

M. Rajesh

Share this article

Similar Articles with Keyword 'DES'

M.Tech / M.E / PhD Thesis, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 1788 - 1791

Provision of Content Based Service Recommendations using Hadoop and MapReduce

M. Vigneesh, K. Nimala

Share this article

Survey Paper, Information Technology, India, Volume 4 Issue 5, May 2015

Pages: 2568 - 2570

Survey on NMS Supporting Network Elements implementing Heterogeneous Protocols

Sheik Nousheen Taj, Dr. Sagar B M

Share this article

Review Papers, Information Technology, Kenya, Volume 4 Issue 2, February 2015

Pages: 1293 - 1296

Management of Records in Health Institutions

Samuel Macharia Were

Share this article

Research Paper, Information Technology, India, Volume 4 Issue 4, April 2015

Pages: 2734 - 2737

Detection of Outliers Using Hybrid Algorithm on Categorical Datasets

Rachana P. Jakkulwar, Prof. R. A. Fadnavis

Share this article

Research Paper, Information Technology, India, Volume 6 Issue 6, June 2017

Pages: 1459 - 1462

An Effective Way for Data Encryption and Decryption Using Hierarchical Techniques

Kavyashree S, Manjula V, Gnanashree S

Share this article

Top