Aunando e Investigando Métodos De Encriptación DES y 3DES

Main Article Content

Diego Capera Tole
Darwin Arias Tique
Carlos Castellanos Calero
Iván Vargas González

Abstract

This document aims to provide the reader with information about the Des and 3Des Encryption algorithms, this through research in different sources of scientific certification data referenced in the document. Currently, the usability of these algorithms is not frequent due to obsolescence, but without a doubt they were the basis for other more robust encryption algorithms that provide more reliability and security for the end user today. This document seeks a critical and argued view for the reader’s knowledge of the subject based on research carried out by the authors of the document, for this it is necessary to make known the importance of encryption algorithms and the usability that they have today in day.

Downloads

Download data is not yet available.

Article Details

How to Cite
Capera Tole, D., Arias Tique, D., Castellanos Calero, C., & Vargas González, I. (2022). Aunando e Investigando Métodos De Encriptación DES y 3DES. Ingenio Magno, 12(2), 21-32. Retrieved from http://revistas.ustatunja.edu.co/index.php/ingeniomagno/article/view/2423
Section
Articulos

References

Srinivasa, O. (2015). Performance Analysis of DES and Triple DES. International Journal of Computer Applications, 130(14), 30-34. https:// doi.org/10.5120/ijca2015907190

H.O.A., B.B.Z., A.A.Z., H.A.J., M.S., &Y.A.-N. (2016). New Comparative Study Between DES, 3DES and AES within Nine Factors. JOURNAL OF COMPUTING, 2(3), 1-6. Recuperado de https://arxiv. org/ftp/arxiv/papers/1003/1003.4085. pdf

R. Pramono Adhie, Y. Hutama, A. Ahmar and M. Setiawan, “ShieldSquare Captcha”, Iopscience.iop.org, 2020. [Online]. Available: https://iopscience. iop.org/article/10.1088/1742-6596/954/1/012009/pdf. [Accedido: 08- Nov- 2020].

Pizzuti, D., Spolon, R., Lobato, R. S., & Manecero, A. (2017, 1 enero). Vista do Desempenho dos Algoritmos 3DES e AES Usando Cuda. Recuperado 1 de febrero de 2021, de https://sol.sbc.org.br/index.php/eradsp/artic le/ view/4351/4277

PAl-Azzeh, J. (2019, 10 enero). A Novel Based On Image Blocking Method To Encrypt-Decrypt Color | Al-Azzeh| JOIV : International Journal on Informatics Visualization. Recuperado 17 de enero de 2021, de http://joiv. org/index.php/joiv/article/view/2 10

H. Tang, Q. T. Sun, X. Yang and K. Long, “A Network Coding and DES Based Dynamic Encryption Scheme for Moving Target Defense,” in IEEE Access, vol. 6, pp. 26059-26068, 2018, doi: 10.1109/ACCESS.2018.2832854.

Ferreira A.C., Silva N.B.F. Comparison of secure communication with 3DES between embedded system and general purpose computer Proceedings - IEEE Symposium on Computers and Communications, Volumes 2016-July, 2016. https://www. sciencedirect.com/science/arti cle/ abs/pii/1084804515002283

Nash Andrew, Infraestructura de Claves públicas, Ed. McGraw Hill, México 2004. De Jemas. NET Framework Ed. McGraw Hill, México 2004. https://www.redalyc.org/ pdf/5055/5055548 06007.pdf

O. Salcedo, L. F. Pedraza y C. A. Hernández, “Modelo de Semaforización Inteligente para la Ciudad de Bogotá”, Revista Ingeniería Universidad Distrital, vol. 11, no. 2, pp. 61-69, 2006. https://revistas.udistrital.edu.co/index.php/T ecnura/article/ view/7236

O. Salcedo, L. F. Pedraza y C.A. Hernández, “Modelo de Semaforización Inteligente para la Ciudad de Bogotá”. Revista Ingeniería Universidad Distrital, vol. 11, no 2, pp. 61-69, 2006. https://revistas.udistrital. edu.co/index.php/T ecnura/article/ view/7236

SANTOS, Daniel F.; AMAYA BARRERA, Isabel and SUÁREZ PARRA, César Augusto. Algoritmo de Encriptación para Imágenes a Color Basado en Sistemas Caóticos. ing. [online]. 2020, vol. 25, n. 2, pp.144-161. ISSN 0121-750X. http://dx.doi. org/10.14483/23448393.15530.

CORTÉS-MARTÍNEZ, Luis Miguel; ALVARADO-NIETO, Luz Deicy and AMAYA-BARRERA, Isabel. Composite cellular automata based encryption method applied to surveillance videos. Dyna rev.fac.nac.minas [online]. 2020, vol.87, n.213, pp.212- 221 ISSN 0012-7353. http://dx.doi. org/10.15446/dyna.v87n213.81 859.

Universidad de la Costa, Navarro Núñez, W., & Bareño Gutiérrez, R. (2013, junio). Revisión de la Seguridad en la Implementación de Servicios sobre IPv6. INGE CUC. https://repositorio.cuc. edu.co/bitstream/handle/11323/2550/Revisi%C3%B3n%20de%20la%20segu ridad%20en%20la%20implementaci%C3%B3n%20de%20servicios%20sobre %20IPv6.pdf?sequence=1&isAllowed=y

Restrepo, C., Universidad Católica de Oriente, & Castrillón Osorio, L. (2019, julio). Diseño y desarrollo de un sistema de cifrado de datos basado en curvas elípticas (No 43). Revista Universidad Católica de Oriente. http://200.9.158.34/index.php/uco/ article/vie w/156/190

Revista Espacios. (2019, septiembre). Red óptica pasiva para proveer de Internet a la ciudad de Riobamba - Ecuador. Autor.

Bart, M., and Bart, P. (2016). Triple and Quadruple Encryption: Bridging the Gaps. [Archivo PDF]. Asociación Internacional para la Investigación Criptológica. https://eprint.iacr.org/20 14/016.pdf

Sohal, M. Sharma, S. (2018). BDNA-A DNA inspired symmetric key cryptographic technique to secure cloud computing. Revista de la Universidad King Saud - Ciencias de la Información y la Computación. https://www- sciencedirect- com. bdigital.udistrital.edu.co/science/ article/ pii/S1319157818303999

Zong, R., Dong, X. (2016). Meet-in- the- Middle Attack on QARMA Block Cipher. ShandongUniversity. https:// eprint.iacr.org/2016/1160.pdf