DARE Algorithm: A New Security Protocol

'Introduction to DES Algorithm' tutorial was cited in an 'International Journal of Electrical and Computer Engineering' paper in 2018.

The Introduction to DES Algorithm tutorial was cited in an "International Journal of Electrical and Computer Engineering" paper in 2018.

Subject: DARE Algorithm: A New Security Protocol by Integration
   of Different Cryptographic Techniques
Date: Aug 25, 2018
Author: J.M.B. Espalmado, E.R. Arboleda
Source: https://www.researchgate.net/publication
   /318091221_DARE_Algorithm_A_New_Security_Protocol
   _by_Integration_of_Different_Cryptographic_Techniques

Abstract

Exchange of information between computer networks requires a secure
communications channel to prevent and monitor unauthorized access,
modification and denial of the computer network. To address this growing
problem, security experts sought ways to advance the integrity of data
transmission. Security Attacks compromises the security and hence hybrid
cryptographic algorithms have been proposed to achieve safe service in
the proper manner, such as user authentication and data confidentiality.
Data security and authenticity are achieved using these algorithms.
Moreover, to improve the strength and cover each algorithm's weaknesses,
a new security algorithm can be designed using the combination of
different cryptographic techniques. This design uses Digital Signature
Algorithm (DSA) for authentic key generation, Data Encryption Standard
(DES) for key scheduling, and Advanced Encryption Standard (AES) and
Rivest-Schamir-Adleman Algorithm (RSA) in encrypting data. This new
security algorithm has been proposed for improved security and integrity
by integration of these cryptographic techniques.

...

Bibliography

...
[5] H. Yang, ―Herong Yang, 2015. [Online]. Available:
http://www.herongyang.com/Cryptography/DES-. [Accessed 1 November 2016].
...

Table of Contents

 About This Book

 Reference Citations in 2020

 Reference Citations in 2019

Reference Citations in 2018

 WSDL (วิสเด้าว์) เอกสารส่งข้อมูลของ Web Service (เว็บ เซอร์วิส)

 Properly using .bind() in React...

 XML 파일 보는 방법

 Java Code Examples for java.sql.ResultSet.getAsciiStream()

 Optimized Hybrid Security Model using Base 64 Algorithm

 Locking Rows In MYSQL

 Algoritmat Kriptografike dhe Siguria

 C# (CSharp) RSAPublicKey Examples

 Google Play Games Services works...

 【CTF】SUCTF 2018 部分web writeup

 FISCO-BCOS - client.keystore Generation

 Secure Hashing Algorithm

DARE Algorithm: A New Security Protocol

 SMA CRYPTOGRAPHY ALGORITHM DECRYPT MD5 SOLUTION

 Labeless Part 5: Decrypt Strings in Boleto Banking Malware

 Agregator internetskih radijskih postaja

 openssl 설정 pem 생성 - 프로그래밍 방식으로 SSL 인증서 확인

 security - https - java 서버가 tls 1.2 만 받아들이고

 WSDL 2.0文档示例

 Reference Citations in 2017

 Reference Citations in 2016

 Reference Citations in 2015

 Reference Citations in 2014

 Reference Citations in 2013

 Reference Citations in 2012

 Reference Citations in 2011

 Reference Citations in 2010

 Reference Citations in 2009

 Reference Citations in 2008

 Reference Citations in 2007

 Reference Citations in 2006

 Reference Citations in 2005

 Reference Citations in 2004

 Reference Citations in 2003