Abstract
Network security have become as significant issue in the recent years. In the field of network security, the role of cryptography is most important. A secrecy key and shared key algorithm is known as a symmetric key algorithm. This is because, in symmetric key algorithm a shared key does both the encryption and decryption. However, there are some weakness of that technique such as if the key is known to others the entire conversation is compromised. In data security system, encryption has become a solution and act as significant role providing the security. The Data Encryption Standard (DES) algorithm is a symmetric key algorithm for the encryption of electronic and allowed for information. The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. Substitution cipher is a technique of encoding where units of plain text are replaced with cipher text and XOR operator is one of the encryption process used to make the cipher text harder to decryption. The result has been compared and analysed by using method, encryption strength, message length and encryption time. The strength level is higher because of used the Extended ASCII-code with 256 character length bit and addition with the 8-bit binary key to break the cipher text. Hence, the analysis are obtained when the message length is long around 40 to 188, the encryption time has been achieved the limitation time. The graph that can be show is static .To summarize it, all this technique are useful for real time encryption. The security provided by this algorithm can be enhanced further, if more than one algorithm is applied to data.
Metadata
| Item Type: | Student Project |
|---|---|
| Creators: | Creators Email / ID Num. Abdullah, Nur Amila UNSPECIFIED |
| Contributors: | Contribution Name Email / ID Num. Advisor Alang Hassan, Mohd Daud UNSPECIFIED |
| Subjects: | T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Coding theory > Cryptography. Cryptographic techniques |
| Divisions: | Universiti Teknologi MARA, Pulau Pinang > Permatang Pauh Campus > Faculty of Electrical Engineering Universiti Teknologi MARA, Pulau Pinang > Permatang Pauh Campus |
| Programme: | Bachelor of Electrical Engineering (Hons) Electrical and Electronic Engineering |
| Keywords: | Network, Security, Key |
| Date: | July 2017 |
| URI: | https://ir.uitm.edu.my/id/eprint/132488 |
Download
132488.PDF
Download (101kB)
Digital Copy
Physical Copy
- Bilik Koleksi Akses Terhad PTAR | Kampus Permatang Pauh, Pulau Pinang
On Shelf
ID Number
132488
Indexing
