Yang Zhao-Hui
School of Electrical and Control Engineering, Chang` an University, China
Chen Hong-Juan
PLA Third twenty-three Hospitals, Disinfection and Supply Room, Chang` an University, China
Chi Yun-Fei
School of Information Engineering, Chang` an University Xi`an, Shaanxi, China
ABSTRACT
The encryption of existing norms which used by bluetooth can be cracked. A new Bluetooth security improvement program to enhance data security which provides by the existing Bluetooth standard. By analyzing Bluetooth information security mechanism, algorithm of each of its part and steps of achieving the algorithm are explored in detail and security of the existing Bluetooth regulations are evaluated. Targeted at its shortage, a new security mechanism is constructed using DES algorithm to meet the requirements of application of Bluetooth with higher security.
PDF References Citation
How to cite this article
Yang Zhao-Hui, Chen Hong-Juan and Chi Yun-Fei, 2013. Improvements Algorithm of Des Cipher Key Based on Bluetooth Security Mechanism. Information Technology Journal, 12: 5107-5110.
DOI: 10.3923/itj.2013.5107.5110
URL: https://scialert.net/abstract/?doi=itj.2013.5107.5110
DOI: 10.3923/itj.2013.5107.5110
URL: https://scialert.net/abstract/?doi=itj.2013.5107.5110
REFERENCES
- Chatschik, B., 2001. An overview of the bluetooth wireless technology. IEEE Commun. Magazin, 39: 86-94.
CrossRef - Hendler, J.A., 1996. Interlligent agents: Where AI meets information technology. In IEEE Expert, 11: 20-23.
CrossRef - Tumer, M.B. and M.C. Demir, 2005. A genetic approach to data dimensionality reduction using a special initial population. Proceedings of the International Work Conference on the Interplay between Natural and Artificial Computation, June 15-18, 2005, Las Palmas, Canary Islands, Spain, pp: 310-316.
CrossRef