Efficient Key Management for Data Security using TDES
Citations
2,188 citations
10 citations
References
2,188 citations
"Efficient Key Management for Data S..." refers background or methods in this paper
...Decryption is defined as a process of reverting cipher text back to its actual form [1]....
[...]
...XTR security depends upon the complicated solving of discrete logarithm problems of a finite field [1]....
[...]
...10: Data modification by adversary [1]...
[...]
...One key is for enciphering and another key is for deciphering and also termed as asymmetrical key cryptography [1]....
[...]
...The computation uses the permuted block as an input to produce the pre output block and for a final interchange of block of 16 iterations in terms of the cipher function f operates on two blocks, one of 32 bits and another of 48 bits to produces a final block of 32 bits [1, 2]....
[...]
497 citations
403 citations
320 citations
216 citations
"Efficient Key Management for Data S..." refers background or methods in this paper
...Similarly final permutation is performed on it and the resulting 64 bit block is the desired DES encrypted cipher text of the input plain text block [15]....
[...]
...They are shifted in different groups of key bits which are used in each sub key [15]....
[...]