Notes on Reference Citations - Version 2.71, by Dr. Herong Yang
DARE Algorithm: A New Security Protocol
'Introduction to DES Algorithm' tutorial was cited in an International Journal of Electrical and Computer Engineering (IJECE) paper in 2017.
The Introduction to DES Algorithm tutorial was cited in an "International Journal of Electrical and Computer Engineering (IJECE)" paper in 2017.
Subject: DARE Algorithm: A New Security Protocol by Integration of Different Cryptographic Techniques Date: April 2017 Author: John Mark B. Espalmado, Edwin R. Arboleda Source: http://iaescore.com/journals/index.php/IJECE/article/download/6456/6327 ABSTRACT Exchange of information between computer networks requires a secure communications channel to prevent and monitor unauthorized access, modification and denial of the computer network. To address this growing problem, security experts sought ways to advance the integrity of data transmission. Security Attacks compromises the security and hence hybrid cryptographic algorithms have been proposed to achieve safe service in the proper manner, such as user authentication and data confidentiality. Data security and authenticity are achieved using these algorithms. Moreover, to improve the strength and cover each algorithm’s weaknesses, a new security algorithm can be designed using the combination of different cryptographic techniques. This design uses Digital Signature Algorithm (DSA) for authentic key generation, Data Encryption Standard (DES) for key scheduling, and Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) in encrypting data. This new security algorithm has been proposed for improved security and integrity by integration of these cryptographic techniques.  M. Y. Ree, ―Internet Security: cryptographic principles, algorithms, and protocols, PO19 8SQ, England, John Wiley & Sons Ltd, 2003.  H. Yang, ―Herong Yang, 2015. [Online]. Available: http://www.herongyang.com/Cryptography/DES-. [Accessed 1 November 2016]. ...
Table of Contents