Google scholar arxiv informatics ads IJAIS publications are indexed with Google Scholar, NASA ADS, Informatics et. al.

Call for Paper


August Edition 2021

International Journal of Applied Information Systems solicits high quality original research papers for the August 2021 Edition of the journal. The last date of research paper submission is July 15, 2021.

Enhanced Data Encryption Algorithm for Next Generation Networks

Vikas Kaul, S K Narayankhedkar, Kushal Khaitan, Aditya Patil, Rohit Dube Published in Algorithm

IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013
Year of Publication: 2013
© 2012 by IJAIS Journal
Series ICWAC Number 4
Download full text
  1. Vikas Kaul, S K Narayankhedkar, Kushal Khaitan, Aditya Patil and Rohit Dube. Article: Enhanced Data Encryption Algorithm for Next Generation Networks. IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013 ICWAC(4):8-17, July 2013. BibTeX

    	author = "Vikas Kaul and S K Narayankhedkar and Kushal Khaitan and Aditya Patil and Rohit Dube",
    	title = "Article: Enhanced Data Encryption Algorithm for Next Generation Networks",
    	journal = "IJAIS Proceedings on International Conference and workshop on Advanced Computing 2013",
    	year = 2013,
    	volume = "ICWAC",
    	number = 4,
    	pages = "8-17",
    	month = "July",
    	note = "Published by Foundation of Computer Science, New York, USA"


In an age where data transmission over the network has become a vital aspect of communication and information sharing it is very essential to ensure robust data security. Keeping the above fact in mind, we aim to enhance the existing security standards by designing a more efficient Encryption Algorithm. In this paper we propose the idea of using a combination of AES-DES and incorporating it in the Feistal structure. Being a hybrid of two powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard.


  1. William Stallings, "Cryptography and Network Security", Pearson Group,4th Edition.
  2. Behrouz. A. Forouzan, "Cryptography and Network Security", McGraw Hill Group, 5th Edition.
  3. "Cisco Next Generation Encryption Guidelines", http://www. cisco. com/web/about/security/intelligence/nextgen_crypto. html.
  4. Guillaume Lehembre, "Wi-Fi security – -WEP, WAP and WPA2".
  5. John Padgette, Karen Scarfone, Lily Chen, "Guide to Bluetooth Security", NIST Special Publication 800-121 Revision 1.
  6. D. Coppersmith, "The Data Encryption Standard (DES) and its Strength against Attacks", IBM J. RES. DEVELOP. Vol. 38 No. 3 May 1994.
  7. B. Schneier, "Applied Cryptography: Protocols, Algorithms & Source Code", C. John Wiley and Sons, 1994.
  8. Mitsuru Matsui, "Linear Cryptanalysis Method for DES Cipher", In Advances in Cryptology – EUROCRYPT'93, volume 765 of LNCS, pages 386-397. Springer-Verlag, 1993.
  9. Eli Biham, Adi Shamir, "Differential Cryptanalysis of the Data Encryption Standard", Springer-Verlag, 1993.
  10. William C. Barker, Elaine Barker, "Recommendation for the Triple Data Encryption Algorithm (TDEA) Block Cipher", NIST, January 2012.
  11. J. Daemen, V. Rijmen, "AES Proposal: Rijndael", Banksys/Katholieke Universiteit Leuven, Belgium, AES submission, Jun 1998.
  12. NIST, "An Overview of Cryptanalysis Research for Advanced Encryption Standard", 2001.
  13. "An improved AES algorithm based on chaos" by Yuan Kun, Zhang Han, Li Zhaohui in 2009 at International Conference on Multimedia Information Networking and Security.
  14. H. Nover, "Algebraic Cryptanalysis of AES: Overview", University of Wisconsin, USA, 2005.
  15. Rashi kohli, Divya Sharma, Manoj Kr. Baliyan "S-Box Design Analysis and Parameter variation in AES Algorithm", 2012 IJCA.
  16. Aida Janadi and D. Anas Tarah "AES immunity Enhancement against algebraic attacks by using dynamic S-Boxes" in 2008, at IEEE Journal.
  17. Shuo Chen, Rui Wang, Xiao Feng Wang, Kehuan Zhang, "Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow", IEEE Symposium on Security & Privacy, 2010.
  18. David Brumley, Dan Boneh, "Remote Timing Attacks are Practical", Stanford University, 2003.
  19. Vikas Kaul, S. K. Narayankhedkar, S. Archrekar, S. Agarwal, P. Goyal, "Security Enhancement Algorithm for Data Transmission for Next Generation Networks", IJCA 2012
  20. MATLAB Description, Available: http://www. mathworks. in/help/
  21. M. B. Vishnu, S. K. Tiong, "Security Enhancement using Hybrid AES-DES Algorithm" in 2008 at IEEE Journal.
  22. C. E. SHANNON, "A Mathematical Theory of Communication", The Bell System Technical Journal,Vol. 27, pp. 379–423, 623–656, July, October, 1948.


AES, DES, Hybrid, Encryption Time, Avalanche Effect, Throughput, CPU Usage