scholarly journals IMPLEMENTATION CRYPTOGRAPHY DATA ENCRYPTION STANDARD (DES) AND TRIPLE DATA ENCRYPTION STANDARD (3DES) METHOD IN COMMUNICATION SYSTEM BASED NEAR FIELD COMMUNICATION (NFC)

2017 ◽  
Author(s):  
Ratnadewi Ratnadewi

Note: This preprint has been presented in the 10th International Conference Asosiasi Ahli dan Dosen RI (ADRI), Batam, 3-5 March 2017--- Cryptography is a method used to create secure communication by manipulating sent messages during the communication occurred so only intended party that can know the content of that messages. Some of the most commonly used cryptography methods to protect sent messages, especially in the form of text, are DES and 3DES cryptography method. This research will explain the DES and 3DES cryptography method and its use for stored data security in smart cards that working in the NFC-based communication system.Several things that will be explained in this research is the ways of working of DES and 3DES cryptography method in doing the protection process of a data and software engineering through the creation of application using C++ programming language to realize and test the performance of DES and 3DES cryptography method in encrypted data writing process to smart cards and decrypted data reading process from smart cards.The execution time of the entering and the reading process data using a smart card DES cryptography method is faster than using 3DES cryptography.

2020 ◽  
Vol 4 (3) ◽  
pp. 105-111
Author(s):  
Zarni Sann ◽  
Thi Thi Soe ◽  
Kaythi Wyut Mhone Knin ◽  
Zin May Win

Data encryption is well known as essential for today’s technology. ElGamal encryption and RSA algorithmis made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mailsfrom mail server. This system is implemented to secure mail server system for local government’s important mailmessages. These algorithms consume a considerable amount of time and resources of memory, CPU time, andcomputation time to encrypt and decrypt data. This paper discuss the results comparison of these algorithms in termof encryption time, decryption time, and memory usage over variable file sizes. The results show that RSA does fasterencryption process in compare with ElGamal. However, ElGamal decryption process is quicker than RSA. This systemis also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographicpublic-key algorithms but have roles in different techniques. This system is using C# programming language and SQLServer to store mail messages.


2017 ◽  
Vol 2017 ◽  
pp. 1-15 ◽  
Author(s):  
Mohammed Abdulridha Hussain ◽  
Hai Jin ◽  
Zaid Alaa Hussien ◽  
Zaid Ameen Abduljabbar ◽  
Salah H. Abbdal ◽  
...  

Online information security is a major concern for both users and companies, since data transferred via the Internet is becoming increasingly sensitive. The World Wide Web uses Hypertext Transfer Protocol (HTTP) to transfer information and Secure Sockets Layer (SSL) to secure the connection between clients and servers. However, Hypertext Transfer Protocol Secure (HTTPS) is vulnerable to attacks that threaten the privacy of information sent between clients and servers. In this paper, we propose Enc-DNS-HTTP for securing client requests, protecting server responses, and withstanding HTTPS attacks. Enc-DNS-HTTP is based on the distribution of a web server public key, which is transferred via a secure communication between client and a Domain Name System (DNS) server. This key is used to encrypt client-server communication. The scheme is implemented in the C programming language and tested on a Linux platform. In comparison with Apache HTTPS, this scheme is shown to have more effective resistance to attacks and improved performance since it does not involve a high number of time-consuming operations.


2021 ◽  
Vol 2 (14) ◽  
pp. 118-130
Author(s):  
Liudmyla Hlynchuk ◽  
Tetiana Hryshanovych ◽  
Andrii Stupin

This research dedicated to the review, implementation and analysis of the symmetric encryption algorithm, namely - DES (Data Encryption Standard) that encrypts and decrypts text information. For this algorithm represented not only a verbal description, but also schemes of its execution and examples of implementation. Intermediate results and the results of information encryption / decryption in the implemented algorithm were verified using examples, so we can assume that the algorithm implemented correctly. Comparison of the execution time for the DES algorithm proposed implementation made for two utilities. One of them is OpenSSL, developed using assembler and the capabilities of the C programming language. The other utility developed using programming language Java. The comparison was made according to three criteria: full time from the utility execution start to its completion; the time spent by the process to execute the utility (downtime and time when the processor perform other tasks not accounted); the time taken by the operating system to run a utility, such as reading or writing the file. The analysis showed that the total execution time is not equal to the total amount of time spent by both the processor and the operating system to execute the utilities. This is due to the following: the total execution time is the real time spent on the execution of the utility; it can measure with a stopwatch. Whereas the time spent by the processor to execute the utility is measured somewhat differently: if two cores execute the same utility for 1 second, the total execution time will be 2 seconds, although in fact one second of time has passed. From the comparison follows the next conclusion: the time spent on encryption is less than the time spent on decryption. The execution time for different utilities is different: the time for OpenSSL utility turned out to be the best, because such an implementation is most adapted to the hardware. The utility in Java turned out to be the worst in terms of execution time. We propose the implementation of the DES algorithm of the nearest execution time to the fastest of the considered. Because a number of hacking possibilities have been found for the symmetric encryption standard DES, in particular due to the small number of possible keys, there is a risk of overriding them. Therefore, to increase crypto currency, other versions of this algorithm have been developed: double DES (2DES), triple DES (3DES), DESX, G-DES. In the future, it is planned to develop a utility based on our proposed implementation of the DES algorithm and to demonstrate the operation of its modifications.


2021 ◽  
Author(s):  
Prasath J S

Abstract The technologies in monitoring and control of industrial process have changed due to the rapid growth of emerging technologies especially the most popular Internet of Things (IoT). The Internet is an essential part of day-to-day life and it is used to gather more information. The emerging trend in the field of industrial automation is the integration of embedded systems with wireless technologies which enables monitoring of process information through the internet. As the internet is the open environment, a lot of security issues and vulnerabilities arise to the industrial devices. The usage of internet in process monitoring enables attackers to monitor and change the process data. The unsecured industrial operations lead to failure of process equipment and safety issues to plant operators. The security mechanisms are essential in order to protect the embedded systems and wireless networks from unauthorized access. This proposed heterogeneous security algorithm includes symmetric, asymmetric and hash algorithms which strengthen the level of security. The novelty of the proposed work is it employs 128-bit key size for symmetric encryption, 1024-bit key size for asymmetric encryption along with the use of hash algorithm all together strengthens the security and it is tested in real time using embedded system with IoT. It takes less time for execution of data encryption and decryption. This proposed hybrid security algorithm is implemented and tested in an embedded system with wireless monitoring of process information through the internet. It ensures secure communication and monitoring of process data through the internet. The attacker cannot identify and modify the plant information transmitted across internet. This proposed work can be applied to industries dealing with sensitive process information.


2021 ◽  
Vol 19 (2) ◽  
pp. 4-6
Author(s):  
Paul C. van Oorschot

Sign in / Sign up

Export Citation Format

Share Document