Downloads: 126 | Views: 131
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013
A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES
B. Parsharamulu | R. V. Krishnaiah [7]
Abstract: Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
Keywords: E0 key stream, triple des, RSA, hybrid algorithm
Edition: Volume 2 Issue 9, September 2013,
Pages: 279 - 283
Similar Articles with Keyword 'triple des'
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Downloads: 108
Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015
Pages: 1056 - 1059Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Nikhitha K. Nair | Navin K. S.