International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 2 Issue 9, September 2013

A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES

B. Parsharamulu, R. V. Krishnaiah

Bluetooth technology is an emerging wireless networking standard, which is based on chip that provides short-range wireless frequency hopping communication. Now, Bluetooth technology is mainly applied to the communication between mobile terminal devices, such as palm computers, mobile phones, laptops and so on. However, the phenomenon of data-leaking frequently arises in using the Bluetooth technology for data transfer. To enhance the security of data transmission in Bluetooth communication, a hybrid encryption algorithm based on DES and RSA is proposed. The currently used encryption algorithm employed by the Bluetooth to protect the confidentiality of data during transport between two or more devices is a 128-bit symmetric stream cipher called E0. The proposed hybrid encryption algorithm, instead of the E0 encryption, DES algorithm is used for data transmission because of its higher efficiency in block encryption, and RSA algorithm is used for the encryption of the key of the DES because of its management advantages in key cipher. Under the dual protection with the DES algorithm and the RSA algorithm, the data transmission in the Bluetooth system will be more secure. This project is extended with triple des in place of des to enhance more security.

Keywords: E0 key stream, triple des, RSA, hybrid algorithm

Edition: Volume 2 Issue 9, September 2013

Pages: 279 - 283


How to Cite this Article?

B. Parsharamulu, R. V. Krishnaiah, "A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=12091302, Volume 2 Issue 9, September 2013, 279 - 283

34 PDF Views | 19 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'triple des'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this article

Informative Article, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1056 - 1059

Dual Security Using Dual Encryption Schemes and Efficient User Revocation in Cloud

Nikhitha K. Nair, Navin K. S.

Share this article

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 9, September 2013

Pages: 279 - 283

A New Design of Algorithm for Enhancing Security in Bluetooth Communication with Triple DES

B. Parsharamulu, R. V. Krishnaiah

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 859 - 861

Rapid Image Search with Tags Using Semantic- Aware Namespace

V. Archana, M. Tamil Thendral

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 7 Issue 4, April 2018

Pages: 1042 - 1047

A Secure End-To-End Protocol for Secure Transmission of SMS

Vaidehi V. Mantri, M. Y. Joshi

Share this article

Similar Articles with Keyword 'RSA'

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1303 - 1305

Obstacle Detection Technologies to Empower Visually Challenged: A Short Notes

N. Laxmi Manasa

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 5, May 2020

Pages: 1365 - 1367

A Survey on Detection of Fake Online Reviews

Dr. Sameena Banu, Asma Shaheen

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 1698 - 1704

Maintenance of User Query Integrity and Voronoi Neighbors Using Multiple Signers in Signature Aggregation

V. Maruvoor Arasi, Carolene

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2011 - 2014

Attack Detection and Mitigation for AGC

Pooja A Kulkarni, Harshal A Karande

Share this article

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1285 - 1287

Location Based Social Networking in Geo-Social Applications

Shamsiamol K Shaji, Boby Jose

Share this article

Similar Articles with Keyword 'hybrid algorithm'

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2083 - 2089

An Enhanced Web Mining Technique for Image Search using Weighted PageRank based on Visit of Links and Fuzzy K-Means Algorithm

Rashmi Sharma, Kamaljit Kaur

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1586 - 1593

Optimization of Geocast Routing in Vehicular Ad-Hoc Networks

Rajwinder Singh, Amandeep Kaur Virk

Share this article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 8, August 2014

Pages: 1044 - 1049

An Energy Efficient Approach for Routing in MANETS using GA and ACO

Sonia Ahuja, Sukhpreet Kaur

Share this article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 2469 - 2473

High Security of Data Using Steganography with Hybrid Algorithm

Madhugeeta Verma, Poonam Dhamal

Share this article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 1747 - 1752

Mining Service Using Ontology Learning

R. Santhosh Gowtham, S. J. Vivekanandan

Share this article

Top