DARE Algorithm: A New Security Protocol

'Introduction to DES Algorithm' tutorial was cited in an International Journal of Electrical and Computer Engineering (IJECE) paper in 2017.

The Introduction to DES Algorithm tutorial was cited in an "International Journal of Electrical and Computer Engineering (IJECE)" paper in 2017.

Subject: DARE Algorithm: A New Security Protocol by Integration of 
   Different Cryptographic Techniques
Date: April 2017
Author: John Mark B. Espalmado, Edwin R. Arboleda
Source: http://iaescore.com/journals/index.php/IJECE/article/download/6456/6327

ABSTRACT

Exchange of information between computer networks requires a secure 
communications channel to prevent and monitor unauthorized access, 
modification and denial of the computer network. To address this growing 
problem, security experts sought ways to advance the integrity of data 
transmission. Security Attacks compromises the security and hence hybrid 
cryptographic algorithms have been proposed to achieve safe service in the 
proper manner, such as user authentication and data confidentiality. Data 
security and authenticity are achieved using these algorithms. Moreover, to 
improve the strength and cover each algorithm’s weaknesses, a new security 
algorithm can be designed using the combination of different cryptographic 
techniques. This design uses Digital Signature Algorithm (DSA) for authentic 
key generation, Data Encryption Standard (DES) for key scheduling, and 
Advanced Encryption Standard (AES) and Rivest–Schamir–Adleman Algorithm (RSA) 
in encrypting data. This new security algorithm has been proposed for 
improved security and integrity by integration of these cryptographic 
techniques. 

[4] M. Y. Ree, ―Internet Security: cryptographic principles, algorithms, and 
protocols, PO19 8SQ, England, John Wiley & Sons Ltd, 2003.

[5] H. Yang, ―Herong Yang, 2015. [Online]. Available: 
http://www.herongyang.com/Cryptography/DES-. [Accessed 1 November 2016].
...

Table of Contents

 About This Book

Reference Citations in 2017

 curl/openssl configuration for php under windows

 [RESOLVED] Corrupt dll

 13 Memories Everyone Who Made Mix CDs

 System property javax.xml.soap.MessageFactory

 Add inline image in Rmarkdown

 Enhanced SHA-1 on Parsing Method and Message Digest Formula

DARE Algorithm: A New Security Protocol

 如何强制java服务器只接受tls 1.2并拒绝tls 1.0和tls 1.1连接

 WSDL คืออะไร WSDL คือ เอกสารข้อมูลของ web service

 Tehnologii Web - securitatea aplicațiilor Web

 在Java中,SSL和TLS的区别及其用法

 Nejde se připojit na youtube

 SOAP response error to source

 Read UTF-8 encoded text content inside table cell

 unicode - BOM이없는 UTF-8과 UTF-8의 차이점은 무엇입니까?

 Cách để Xem tập tin XML

 DIFERENÇA ENTRE VIEW E VIEWGROUP NO ANDROID

 τεχνολογιών NFC και QR-code σε πλατφόρμες Android

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003

 PDF Printing Version