Authors :
Sarah Fawzia; Mujiba Shaima; Norun Nabi; Mazharul Islam Tusher; Nasir Uddin Rana
Volume/Issue :
Volume 9 - 2024, Issue 5 - May
Google Scholar :
https://tinyurl.com/4xne7bbh
Scribd :
https://tinyurl.com/2m6mcudn
DOI :
https://doi.org/10.38124/ijisrt/IJISRT24MAY785
Abstract :
The contemporary landscape of cybersecurity
is fraught with challenges, necessitating a keen
understanding of evolving threats and robust defense
mechanisms. By examining the Data Encryption
Standard (DES) as a key element therein, this paper
explores the complexities of cryptography, a foundational
element of contemporary security paradigms. Securing
confidential data from unwanted access is one of the many
facets of cryptography, the art of secure communication.
In the context of data protection, DES is recognized as a
foundational cryptographic algorithm, valued for both its
historical importance and ongoing applicability. But as
technology moves more quickly and cyberattacks get
more complex, DES's effectiveness is called into question,
which has sparked debate about whether it is still
sufficient in modern security scenarios. Here, in this
paper we explore the complexities surrounding
cryptography and DES, elucidating their strengths,
limitations, and implications for cybersecurity practices.
By examining current trends and emerging challenges, it
endeavors to offer insights into mitigating risks and
fortifying defenses against cyber threats in the digital age.
Keywords :
Cryptography, Data Encryption Standard (DES), Advanced Encryption Standard (AES).
References :
- Mujiba, S., Nurun, N., Md, NUD., Md, TA., Estaq, A., Mazaharul, IT., Moushumi, HM., Quazi, SM. (2024). Elon Musk’s Neuralink Brain Chip: a review on ‘Brain-Reading’ device. Journal of Computer Science and Technology Studies. 6(1). 200-203. https://doi.org/10.32996/jcsts.2024.6.1.22
- Paar, C., & Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer. https://doi.org/10.1007/978-3-642-04101-3
- Singh, S. (2000). The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography. Doubleday.
- National Institute of Standards and Technology. (2001). Federal information processing standards publication 197: Advanced encryption standard (AES). https://csrc.nist.gov/publications/detail/ fips/197/final
- M. Das, X. Tao, and J. C. P. Cheng. (2021). BIM security: A critical review and recommendations using encryption strategy and blockchain. Automation in construction.126 https://doi.org/10.1016/j.autcon. 2021.103682
- S. Naeem, M. Zubair, M. M. Ahmed, A. Ali, S. Anam (2023). Network security and cryptography challenges and trends on recent technologies. Journal of Applied and Emerging Sciences.13(1). https://journal.buitms.edu.pk/j/index.php/bj/article/view/546
- Mujiba, S., Estaq, A., Md, NUD., Md, TA. (2024). An optimizing business process: a comprehensive analysis of amazon inc.’s information architecture. European Journal of Engineering and Technology Research. 9(1). 47-58. https://doi.org/ 10.24018/ejeng.2024.9.1.3097
- Ratnadewi, Roy P. A, Yonatan H, Saleh A, & Setiawan M I. (2016). Implementation cryptography data encryption standard (DES) and triple data encryption standard (3DES) method in communication system based near field communication (NFC). Journal of Physics. v954. 10.1088/1742-6596/954/1/012009
The contemporary landscape of cybersecurity
is fraught with challenges, necessitating a keen
understanding of evolving threats and robust defense
mechanisms. By examining the Data Encryption
Standard (DES) as a key element therein, this paper
explores the complexities of cryptography, a foundational
element of contemporary security paradigms. Securing
confidential data from unwanted access is one of the many
facets of cryptography, the art of secure communication.
In the context of data protection, DES is recognized as a
foundational cryptographic algorithm, valued for both its
historical importance and ongoing applicability. But as
technology moves more quickly and cyberattacks get
more complex, DES's effectiveness is called into question,
which has sparked debate about whether it is still
sufficient in modern security scenarios. Here, in this
paper we explore the complexities surrounding
cryptography and DES, elucidating their strengths,
limitations, and implications for cybersecurity practices.
By examining current trends and emerging challenges, it
endeavors to offer insights into mitigating risks and
fortifying defenses against cyber threats in the digital age.
Keywords :
Cryptography, Data Encryption Standard (DES), Advanced Encryption Standard (AES).