Manzoor Hussain Dar : is a M. Tech. Scholar (Computer Sc. &
Engineering), in the Dept. of Computer Science & Applications,
Kurukshetra University, Kurukshetra. His research interests lies in
Algorithms, Machine Learning, Systems Programming and Network
Security.
Pardeep Mittal : is working as an Assistant Professor in the
Department of Computer Science & Applications, Kurukshetra
University, Kurukshetra with a teaching experience of fifteen years.
His research interest includes Networking, Optimization, Network Security, Simulation, Genetic Algorithms and Compilers. He has
published thirteen research papers in international and national
journals, conferences and seminars. He has attended many
workshops and faculty development programme.
Vinod Kumar : is working as an Assistant Professor in the Dept. of
Computer Science & Applications, Kurukshetra University,
Kurukshetra with a teaching and technical experience of sixteen
years. His research interests includes Medical Image Mining, Data
Mining, Web Mining and in the field of Networking. He has
published various research papers in international journals and
conferences. He has attended many workshops and faculty
development program. He is a good counsellor and motivator to the
cancer patients from last eighteen years.
[1] Stalling,W., “Cryptographyan Network Security:
Principles and Practices”. Prentice Hall, 2010.
[2] Elminaam, D.S.A., Kader, H.M.A., Hadhoud, M.M.,
“Evaluation of the Performance of Symmetric Encryption
Algorithms”, International Journal of Network Security,
Vol.10, No.3, PP.216–222, May 2010.
[3] Naji, A.W., Zaidan, A.A., Zaidan, B.B., Khalifa, O.O.,
“Novel Approach of Hidden Data”, International Journal
of Computer Science and Information Security, 2009.
[4] Posch, K.C., Posch, R., “Designing a New Encryption
Method for Optimum Parallel Performance”, IEEE First
International Conference on Algorithms and Architectures
for Parallel Processing, Brisbane, Australia 1995.
[5] Kiesler, T., Harn, L., “Cryptographic Master Key
Generation Scheme and its Applications to Public Key
Distribution”, IEEE Proceedings E-computers and Digital
Techniques, 1992.
[6] Rouse, M., “Data Encryption Standard”, 2006.
[7] Avinash, K., “Block Ciphers and the DES”.
http://www.engineering.purdue.edu/kak/compsec/.../lectur
e3.pdf.
[8] Triple DES Encryption. Tropical Software, 2014.
http://www.tropsoft.com/strongenc/des.htm(accessed
February, 9, 2014).
[9] Engelfriet, A., DES Encryption Algorithm.
http://www.iusmentis.com/technology/encryption/des(acc
essed February, 10, 2014).
[10] DES Encryption. Tropical Software. 2014.
http://www.tropoft.com/strongenc/des.htm (accessed
February, 10, 2014)
[11] Kaufman, C., Perlman, R., Speciner, M., “Network
Security: Private Communication in a Public World”. 2nd
ed. Upper Saddle River, N J.: Prentice Hall PTR, 2002.
[12] Rijndael. Knowledgerush. 2009.
http://www.easybib.com/cite/form/website (accessed
February, 10, 2014).
[13] Advanced Encryption Standard (AES).
http://csrc.nist.gov/publications/fips/fips-197.pdf
(accessed February, 10, 2014).
[14] Paar, C., Pelzi, J., “Understanding Cryptography: A
Textbook for Students and Practioners”, ISBN 978-3-642-
04 101-3, 2010.
[15] Daemen, J., Rijmen, V., “AES Proposal:Rijndael”. Sept. 3,
1999.http://www.comms.scitech.sussex.ac.uk/fft/crypo/rij
ndael.pdf (accessed February, 9, 2014).
[16] Evgeny, M., The RSA Algorithm. June 2009.
http://www.math.washington.edu. (accessed February,11,
2012).