The Application of Improved DES Algorithm in Moblie Monitoring

Article Preview

Abstract:

In cryptography, the DES algorithm is known to be advantageous by utilizing the mechanisms of grouping and symmetric private key. The algorithm is critical in the field of encryption. It is adaptive to various applications for encryption in many different systems, especially in the embedded system of Internet of Things (IOT) and the Next-generation Convergence Networks. In this paper, an improved scheme is presented in order to overcome the easily attacked shortcomings. This method is to improve the complexity of encryption key in the process and thus to enhance the ability in resisting attacks, so that we use two keys to crosswise encrypt and the safety of the algorithm is further strengthened. In this paper, the improved algorithm is applied in smartphone-based monitoring of broadcasting transmission systems, so as to realize the transmission of data encryption functions.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2097-2101

Citation:

Online since:

December 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu Xiao-Xing, Hu Chang-xia, Liu ming-sheng. The Analys is and Improvement of DES Encryption Algorithm. Micro computer and information,2006,22(4):32-33.(In Chinese)

Google Scholar

[2] Song Zhen. Cryptography. Beijing: China Water Conservancy and Electric Power Press.2002. (In Chinese)

Google Scholar

[3] Yang Ling-jun, Zhou Jian, Feng Hai-yun. The Research on Broadcast and TV Transmitter M—monitoring System Based on Smart Phone. Electronics Quality.No.7,2010. (In Chinese)

Google Scholar

[4] Young Won Lim.EFFICEINT 8-CYCLE DES IMPLEMENTATION[C].The Second IEEE Asia Pacific Conference on ASICs / Aug 28 -30, 2000.

DOI: 10.1109/apasic.2000.896937

Google Scholar

[5] Qiu Wei-Xing, Xiao Ke-Zhi, Ni Fang,et al. DES Key Extension Method. Computer Engineering. Vol.37 No.5 March 2011. (In Chinese)

Google Scholar

[6] Zhang Hua-Qing, Deng Ya-Ping. An ameliorative system based on DES algorithm. Computer applications and software,2003,20(8). (In Chinese)

Google Scholar

[7] Xiao Feng-Xia, Liu Jia-Yong, Li Guo-Yong,et al. Mutual Authentication Scheme Using USB KEY. INFORMATION AND ELECTRONIC ENGINEERINC. Vol.5No.6 Dec 2007. (In Chinese)

Google Scholar

[8] Zhou Bin, Peng Ying-Ning, Tang Jun. Design and optimization of compact AES as stream cipher in radar system. INFORMATION AND ELECTRONIC ENGINEERING,Vo1.8 No.3 Jun 2010. (In Chinese)

Google Scholar