Document Type : Research Paper

Authors

1 Govt. Degree College, Indora (Himachal Prdaesh)-INDIA

2 Galgotias College of Engineering and Technology

10.37652/juaps.2012.63241

Abstract

The selective application of technology and related procedural safeguard is an important responsibility for cryptographic algorithm to its electronic data systems. This paper specifies the functionality of TORDES for encryption and decryption to protect the sensitive unclassified data. TORDES is made available within the context of a total security program consisting of physical security procedure.

Keywords

Main Subjects

[1]   Bhushan, A. (2012). TORDES A Symmetric key algorithm. LAP Publishers.
[2]   Seth, S. and Mishra, R. (2011). Comparative Analysis Of Encryption Algorithms For Data Communication. IJCST, Vol. 2, Issue 2, June 2011, ISSN : 2229-4333(Print).
[3]   Stallings, W. (2007). Cryptography and Network Security Principles and Practice. Fourth Edition, Prentice Hall.
[4]   Gope, P., Ghosh, D., Chelluri, A. and Chattopadhyay, P. (2009).  Multi Operator Delimiter based Data Encryption Standard (MODDES). ICCNT Conference. Chennai, India, June 27 – 29, 2009.
[5]   Bhushan, A. and Dulari, P. (2012). Component of Symmetric key Algorithm TORDES with its Functionality. IJCEM International Journal of Computational Engineering & Management, Vol. 15 Issue 5, September 2012 ISSN (Online): 2230-7893
[6]   Gope, P., Kaushik, A., Arora, K. and Kumar, N. (2010). X-MODDES (Extended Multi Operator Delimiter Based Data Encryption Standard, Proceedings of the 2nd International Conference on Future Networks (ICFN), China, March, 2010, pp 399-403.
[7]   Ayushi, A. (2010). A Symmetric Key Cryptographic Algorithm. International Journal of Computer Application.
[8]   Dhanraj, C. Nandini, N. and Tajuddin, M. (2011). An Enhanced Approach for Secret Key Algorithm based on Data Encryption Standard. International Journal of Research and Reviews in Computer Science (IJRRCS), Vol. 2, No. 4, August 2011, ISSN: 2079-2557.
[9]   Khanna, N., Nath, N., James, J., Chakrabarti , A., Chakrabort, S., and Nath, A., (2011). New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key  algorithm. International Conference on Communication Systems and Network Technologies.
[10]           Ray, J., Sanyal, J., Das, D., Nath, A. (2012). A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS wordfile: RJDA Algorithm.  I. J. Modern Education and Computer Science, 2012, 5, 1-9 Published Online June 2012 in MECS.