International Journal on Science and Technology

E-ISSN: 2229-7677     Impact Factor: 9.88

A Widely Indexed Open Access Peer Reviewed Multidisciplinary Bi-monthly Scholarly International Journal

Call for Paper Volume 16 Issue 4 October-December 2025 Submit your research before last 3 days of December to publish your research paper in the issue of October-December.

Privacy-Preserving and Secure Big Data Analysis Utilizing the Triple Data Encryption Standards

Author(s) Nikita singh
Country India
Abstract In the era of large-scale digital communication and real-time applications, safeguarding sensitive data has become a critical concern. This study explores the Triple Data Encryption Standard (3DES) as a robust method for ensuring privacy and security in big data analysis. By applying the Data Encryption Standard (DES) algorithm three times consecutively with three independent 64-bit keys, 3DES achieves an effective key length of 192 bits, significantly enhancing resistance to brute-force attacks and other cryptanalytic threats. The research examines the historical evolution of DES, the emergence of 3DES as a transitional solution, and its practical implementation in various sectors, including banking, e-commerce, network security, and industrial communication. A detailed methodological approach—including literature review, algorithmic analysis, and comparative evaluation with modern standards like the Advanced Encryption Standard (AES)—highlights both the strengths and limitations of 3DES. While 3DES provides backward compatibility, strong security, and effective protection for legacy systems, it suffers from computational inefficiency, slower performance, and increased operational complexity compared to AES. The findings emphasize that 3DES was a pivotal transitional technology bridging DES and modern encryption methods. Yet, organizations are now encouraged to adopt AES or other contemporary algorithms for enhanced efficiency, scalability, and long-term data protection. This study offers valuable insights for designing secure, privacy-preserving big data systems and informs future research in advanced cryptographic solutions.
Keywords Security, data security, network security, cyber secuirty
Field Engineering
Published In Volume 16, Issue 3, July-September 2025
Published On 2025-09-28
DOI https://doi.org/10.71097/IJSAT.v16.i3.8412
Short DOI https://doi.org/g949wn

Share this