Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


March Edition 2023

International Journal of Applied Information Systems solicits high quality original research papers for the March 2023 Edition of the journal. The last date of research paper submission is February 15, 2023.

Hybrid Security Algorithms for Data Transmission using AES-DES

Jignesh R. Patel, Rajesh S. Bansode, Vikas Kaul Published in Security

International Journal of Applied Information Systems
Year of Publication: 2013
© 2012 by IJAIS Journal
Download full text
  1. Jignesh R Patel, Rajesh S Bansode and Vikas Kaul. Article: Hybrid Security Algorithms for Data Transmission using AES-DES. International Journal of Applied Information Systems 6(3):15-21, October 2013. BibTeX

    	author = "Jignesh R. Patel and Rajesh S. Bansode and Vikas Kaul",
    	title = "Article: Hybrid Security Algorithms for Data Transmission using AES-DES",
    	journal = "International Journal of Applied Information Systems",
    	year = 2013,
    	volume = 6,
    	number = 3,
    	pages = "15-21",
    	month = "October",
    	note = "Published by Foundation of Computer Science, New York, USA"


The fast evolution of digital data exchange has forced the information security to be of much important in data storage and transmission. As large amount of data is transmitted over the network, it is preliminary to secure all types of data before sending them. The problem with AES, most extensively used encryption is that it uses many multi variant equations which are linear in nature. Thus it can be broken using algebraic cryptanalysis. This provides a serious threat as AES was considered to be unbreakable and thus it was used in many encryption systems. The current paper presents the design and implementation of a hybrid based 128 bit key AES-DES algorithm as a security enhancement.


  1. Carlos Cid, Sean Murphy and Matthew Robshaw,2004 "Computational and Algebraic aspects of the Advanced Encryption Standard", In Proceedings of the Seventh International Workshop on Computer Algebra in Scientific Computing .
  2. Aida Janadi, 2008 " AES immunity Enhancement against algebraic attacks by using dynamic S-Boxes", Information and Communication Technologies from Theory to Applications, ICTTA2008.
  3. Jing Wang & Guo-ping Jiang, 2008 "Improved DES algorith based on irrational number", IEEE Int. Conference Neural Networks & Signal Processing.
  4. M. B. Vishnu & S. K. Tiong, 2008 "Security Enhancement of Digital Motion Image Transmission Using Hybrid AES-DES Algorithm", IEEE Int.
  5. Tingyuan Nie, 2009 "A Study of DES and Blowfish Encryption Algorithm".
  6. Yuan Kun, Zhang HanLi Zhaohui, 2009 "An Improved AES algorithm based on chaos",Multimedia Information NetworkingandSecurity,INES'09. International Conference.
  7. Tingyuan Nie, Chuanwang Song, Xulong Zhi, 2010 " Performance Evaluation of DES and Blowfish Algorithms", Biomedical Engineering and Computer Science International Conference.
  8. Xiang Li, Junli Chen, Dinghu Qin, Wanggen Wan. 2010 " Research and Realization Based on hybrid encryption algorithm of improved AES and ECC", Audio Language and Image Processing (ICALIP).
  9. M. Zeghid , M. Machhout, L. khriji, A. baganne and R. Tourki, 2007 "A modified AES based algorithm for image encryption ",World Academy of Science ,Engineering and Technology .
  10. Abdinasir hasan Ali, "Analysis and implementation of security algorithms for wireless communication", IEEE, 2010.
  11. Craig Teegarden,Mudit Bhargava,Ken mai, 2010 "Side channel attack Resistant ROM based AES S-Box", IEEE Int.
  12. Manhee Lee, Student Member, IEEE, and Eun Jung Kim, Member, IEEE Computer Society, 2007 "A Comprehensive Framework for Enhancing Security in InfiniBand Architecture",IEEE Int.
  13. H. Nover, 2005 "algebraic cryptanalysis of aes: overview", university of wisconsin, usa,.
  14. S. Murphy, mj. b robshaw, 2002 "essential algebraic structure within the aes", advances in cryptology crypto 2002, lecture notes in computer science, springer-verlag.
  15. MATLAB Description, Available: http://www. mathworks. in/help/
  16. AES Description, Available: http://people. eku. edu/styere/Encrypt/JS-AES. html
  17. DES Description, Available: http://orlingrabbe. com/des. htm
  18. AES mix column http://www. angelfire. com/biz7/atleast/mix_columns. pdf
  19. Forouzan Behrouz "Cryptography & Network Security",McGraw-Hill Forouzan Networking , 2007.


Cipher, DES, AES, Hybrid AES DES, Key matrix.