Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013
A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES
B. Parsharamulu | R. V. Krishnaiah 
Abstract: Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.
Keywords: E0 key stream, triple des, RSA, hybrid algorithm
Edition: Volume 2 Issue 9, September 2013,
Pages: 279 - 283
How to Cite this Article?
B. Parsharamulu, R. V. Krishnaiah, "A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES", International Journal of Science and Research (IJSR), Volume 2 Issue 9, September 2013, pp. 279-283, https://www.ijsr.net/get_abstract.php?paper_id=12091302
How to Share this Article?
Similar Articles with Keyword 'triple des'
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud
Nikhitha K. Nair | Navin K. S.