Affiliation:
1. Ministry of Education, Bagdad-Iraq
Abstract
Encryption makes a message incomprehensible to the reader and difficult for unauthorized individuals to access. One of the most serious issues we face is the key, which plays a crucial role in secure communication and is critical to the encryption process. To enhance the level of security, the key of any algorithm must be vital, and the secret key used must be a copy of it at both the sending and receiving ends. This type of encryption is known as symmetric encryption and must be secure. In this paper, the key of one of the symmetric encryption techniques, the 3DES Algorithm, will be reconfigured to make the algorithm more secure, faster, and more robust. The results obtained from this paper also have good resistance against brute force attacks, which makes the system more efficient by applying the improved algorithm where the message is encrypted and decrypted faster, making the attacker difficult to hack the encrypted message. The proposed method has been programmed in VisualBaic.Net 2015.
Reference19 articles.
1. Christy Atika Sari1, Eko Hari Rachmawanto2, Christanto Antonius Haryanto3, "Cryptography Triple Data Encryption Standard (3DES) for Digital Image Security", Scientific Journal of Informatics , Vol. 5, No. 2, Nov 2018 p-ISSN 2407-7658 , e-ISSN 2460-0040Int. DOI: 10.15294/sji.v5i2.14844
2. Muhammad Faheem Mushtaq1 , Sapiee Jamel2 , Siti Radhiah B. Megat3 , Urooj Akram4 , Mustafa Mat Deris5 , "Key Schedule Algorithm using 3-Dimensional Hybrid Cubes for Block Cipher", (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 10, No. 8, 2019, (DOI) : 10.14569/IJACSA.2019.0100857
3. A. H. Disina, Z. A. Pindar, and S. Jamel, "Enhanced Caeser Cipher to Exclude Repetition and Withstand Frequency Cryptanalysis," J. Netw. Inf. Secur., 2015. Article can be accessed online at http://www.publishingindia.com
4. M. F. Mushtaq, S. Jamel, A. H. Disina, Z. A. Pindar, N. S. A. Shakir, and M. M. Deris, "A Comprehensive Survey on the Cryptographic Encryption Algorithms," Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 11, pp. 333–344, 2017, DOI: 10.14569/IJACSA.2017.081141.
5. M. F. Mushtaq, U. Akram, I. Khan, S. N. Khan, A. Shahzad, and A. Ullah, "Cloud Computing Environment and Security Challenges: A Review," Int. J. Adv. Comput. Sci. Appl., vol. 8, no. 10, pp. 183–195, 2017, (DOI) : 10.14569/IJACSA.2017.081025