International Journal of Emerging Trends & Technology in Computer Science
A Motivation for Recent Innovation & Research
ISSN 2278-6856
www.ijettcs.org
Call for Paper, Published Articles, Indexing Infromation
Title: |
Combination of the “Data Encryption Standard†algorithm (DES) and the “Public-key encryption†algorithm (RSA) on the key-generation stage
|
Author Name: |
Dr. Abdalilah G. Alhalangi , Dr. Galal Eldin A. Eltayeb |
Abstract: |
Abstract
It is obvious that information is remarkably important and
valuables however, it is exposed to danger of theft, hacking,
abuse and violation every now and then. Therefore, protection
of such valuable information has the attention of all –
organization, firms and individuals. Recently, cyber and
crimes had developed which exposes information to extreme
threat. The dissemination of systems information crimes have
spread in industrial countries and Saudi Arabia is no
exception due to the development that the country has
witnessed and its growing involvement of information systems
in different economic and scientific fields besides the
increasing use of the internet.Information protection has
become crucial and this can be approached through a variety
of means and methods. The most important of these means
and methods is encryption. Encryption uses different
algorithms [2]. This present paper will tackle two algorithms,
namely: Data Encryption Standard (DES) and Public Key
Algorithm (PKA). The paper also presents how the two
algorithms operate, discuss the shortcomings of each of them
and then proposes a model which merges the two algorithms
in the stage of key generating to come up with solutions for
their shortcomings.
Keywords: Encryption, Decryption, DES, PKA, RSA, Plain
text, Cipher text, Combination. |
Cite this article: |
Dr. Abdalilah G. Alhalangi , Dr. Galal Eldin A. Eltayeb , "
Combination of the “Data Encryption Standard†algorithm (DES) and the “Public-key encryption†algorithm (RSA) on the key-generation stage " , International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),
Volume 4, Issue 4, July - August 2015 , pp.
001-003 , ISSN 2278-6856.
|