Study of symmetric-key cryptosystems and implementing a secure cryptosystem with DES

3Citations
Citations of this article
2Readers
Mendeley users who have this article in their library.
Get full text

Abstract

The advancements in communication networks and computation over the years have led to a massive volume of data flowing from one place to another. A lot of cryptosystems have been proposed and implemented to keep the channel of communication secure. But with increasingly powerful computers rolling out every day, more and more complicated systems are being built with moderate data overheads to ensure maximum security over the channel. So, in this paper, we briefly discuss the strengths and weaknesses of the three most popular symmetric-key cryptosystems: AES, DES, and 3DES. It has been supported by the various organizations that it with the computers of today, DES can be broken using brute-force attacks in a reasonable amount of time. Given its simple nature of implementation and small key size, we propose a modified implementation of DES to enhance its security with a minimum computational trade-off.

Cite

CITATION STYLE

APA

Santhi, H., Gayathri, P., Katiyar, S., Gopichand, G., & Shreevastava, S. (2019). Study of symmetric-key cryptosystems and implementing a secure cryptosystem with DES. In Advances in Intelligent Systems and Computing (Vol. 862, pp. 299–313). Springer Verlag. https://doi.org/10.1007/978-981-13-3329-3_28

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free