Abstract: Encryption is the most effective way to achieve data security. It is the process in which plain text converts into a cipher text and allows only authorized people to access the sender information. In this research paper I would... more
Abstract: Encryption is the most effective way to achieve data security. It is the process in which plain text converts into a cipher text and allows only authorized people to access the sender information. In this research paper I would like to explain different types of encryption techniques such as hashing function and symmetric and asymmetric methods with advantages and disadvantages including necessary practical examples. Keywords: Encryption, Cryptography, Hashing, Asymmetric, Symmetric, Cipher text Title: Encryption Author: Sruthi Medasani, Professor Tarik El Taeib, International Journal of Computer Science and Information Technology Research ISSN 2348-1196 (print), ISSN 2348-120X (online) Research Publish Journals
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work... more
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented a simple algorithm for both encryption and decryption.
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs to the category of PKCS. The efficiency of a public key cryptographic system is mainly measured in computational overheads, key size and bandwidth. In particular, the RSA algorithm is used in many applications. Although the security of RSA is beyond doubt, the evolution in computing power has caused a growth in the necessary key length. The fact that most chips on smart cards cannot process keys extending 1024 bit shows that there is a need for alternative. NTRU is such an alternative and it is a collection of mathematical algorithms based on manipulating lists of very small integers and polynomials. This allows NTRU to achieve high speeds with the use of minimal computing power. NTRU is the first secure public key cryptosystem not based on factoriza...
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its widespread usage is reduced due to its security issues. In cloud computing environment data will be stored in the servers which are situate at various locations can be accessible by illegal parties may leads to different security problems. Different methods have been developed to overcome the security issues in cloud environment such as signcryption, which is a valuable cryptography skill, which can afford concurrently both the roles of encryption following signature in a reason step. Likewise, different method methods have been planned to overcome the security issues in cloud environment. This survey details the threats and security anxieties in cloud computing along with the Classification of Security in cloud environment. Also, the review grants the current explanations obtainable in the works to counter the security issues. Likewise, the comparison table has been presented for those methods; result has been analyzed and finally ends up with the conclusion.
In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of... more
In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher message based on an algorithm that both the sender and receiver know. There are a number of algorithms for performing encryption and decryption, but comparatively few such algorithms have stood the test of time. The most successful algorithms use a key. In this paper, we may gain knowledge about the cryptography algorithms and its role in Encryption and Decryption.
Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military,... more
Security and confidentiality of data or information at the present time has become an important concern. Advanced methods for secure transmission, storage, and retrieval of digital images are increasingly needed for a number of military, medical, homeland security, and other applications. Various kinds of techniques for increase security data or information already is developed, one common way is by cryptographic techniques. Cryptography is science to maintain the security of the message by changing data or information into a different form, so the message cannot be recognized. To compensate for increasing computing speeds increases, it takes more than one encryption algorithm to improve security of digital images. One way is by using algorithms to double cryptography do encryption and decryption. Cryptographic algorithm often used today and the proven strength specially the digital image is Algorithm with Chaos system. To improve security at the image then we use Additional algorit...
Banking is one of the most important aspects of everyday routine. Several users are using it for performing numerous transactions and many of them have become online nowadays. With the growth of internet and technology, all the... more
Banking is one of the most important aspects of everyday routine. Several users are using it for performing numerous transactions and many of them have become online nowadays. With the growth of internet and technology, all the transactions are done online and there is no need forthe customer to visit banks frequently. A single click does all the transactions by sitting in one place. Though it is very good to hear even online banking has numerous threats. The users are given their own internet logins wherein they perform their transactions. This has become a critical threat as most of them can be easily hacked and all the transactions are done without their knowledge. In order to preserve their critical information, an efficient authentication based secured framework is designed where in case if the user forgets his password of the login it could be recovered easily. As banking systems ask the user to change the password frequently for security purposes user tends to forget his passwords. By this proposed system it is very easy to recover his forgotten password. The proposed system is evaluated is observed to be ef icient than the other existing systems.
— " The analysis of cryptic text is hard problem " , and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algorithms,... more
— " The analysis of cryptic text is hard problem " , and there is no fixed algorithm for generating plain-text from cipher text. Human brains do this intelligently. The intelligent cryptic analysis process needs learning algorithms, cooperative effort of cryptanalyst and mechanism of knowledge based inference engine. This information of knowledge base will be useful for mining data(plain-text, key or cipher text plain-text relationships), classification of cipher text based on enciphering algorithms, key length or any other desirable parameters, clustering of cipher text based on similarity and extracting association rules for identifying weaknesses of cryptic algorithms. This categorization will be useful for placing given cipher text into a specific category or solving difficult level of cipher text-plain text conversion process. This paper elucidates cipher text-plain text process first than utilizes it to create a framework for AI-enabled-Cryptanalysis system. The process demonstrated in this paper attempts to analyze captured cipher from scratch. The system design elements presented in the paper gives all hints and guidelines for development of AI enabled Cryptic analysis tool.
— In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files. BST consider... more
— In this paper, a session based symmetric key cryptographic system has been proposed and it is termed as Bit Shuffle Technique (BST). This proposed technique is very fast, suitable and secure for encryption of large files. BST consider the plain text (i.e. the input file) as binary string with finite no. of bits. The input binary string is broken down into manageable-sized blocks to fit row-wise from left to right into a square matrix of suitable order. Bits are taken diagonally upward from the square matrix to form the encrypted binary string and from this string cipher text is formed. Combination of values of block length and no. of blocks of a session generates the session key for BST. For decryption the cipher text is considered as binary string. Using the session key information, this binary string is broken down into manageable-sized blocks to fit diagonally upward from left to right into a square matrix of suitable order. Bits are taken row-wise from left to right from the s...
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs... more
In many business sectors secure and efficient data transfer is essential. To ensure the security to the applications of business, the business sectors use Public Key Cryptographic Systems (PKCS). An RSA and NTRU system generally belongs to the category of PKCS. The efficiency of a public key cryptographic system is mainly measured in computational overheads, key size and bandwidth. In particular, the RSA algorithm is used in many applications. Although the security of RSA is beyond doubt, the evolution in computing power has caused a growth in the necessary key length. The fact that most chips on smart cards cannot process keys extending 1024 bit shows that there is a need for alternative. NTRU is such an alternative and it is a collection of mathematical algorithms based on manipulating lists of very small integers and polynomials. This allows NTRU to achieve high speeds with the use of minimal computing power. NTRU is the first secure public key cryptosystem not based on factoriza...
— Confidentiality in communication is an important aspect at individual level or organization level. Symmetric key cryptography has been quite popular over a number of years. But, growing technology level may act as boon or bane. Here is... more
— Confidentiality in communication is an important aspect at individual level or organization level. Symmetric key cryptography has been quite popular over a number of years. But, growing technology level may act as boon or bane. Here is a symmetric key algorithm which overcomes the limitations of existing cryptographic algorithm AES-128. This paper deals the simulation and results of new algorithm with respect to AES-128 bit symmetric key algorithm.
Nowadays, the computer network has changed the mode of people's communication. People can easily transfer the various information through the network. However, because of the openness of the network, people have to take more and more... more
Nowadays, the computer network has changed the mode of people's communication. People can easily transfer the various information through the network. However, because of the openness of the network, people have to take more and more attention on security and confidentiality of information. Data encryption is widely use to ensure security of the data. So encryption implies a way or procedure to hide some secrets by either applying some mathematical or logical functions to a plain text to produce a text that will be difficult for some outsider to decrypt. Here we introduced a new algorithm based on symmetric key block encryption technique. In this algorithm encryption is done on binary file. Since this encryption is done on binary file so this algorithm is applicable for any data such as text as well as multimedia data.
Multipliers are the essential and abundant part of DSP applications. There are different types of multipliers are used to perform various applications. Array multipliers, Vedic multipliers are two different types of multipliers. Based on... more
Multipliers are the essential and abundant part of DSP applications. There are different types of multipliers are used to perform various applications. Array multipliers, Vedic multipliers are two different types of multipliers. Based on the comparative study, it is proved that Vedic multipliers are much faster than array multipliers. The speed of operation is further improved by introducing a pipelined architecture to the conventional Vedic multipliers so that it can be used in very complex multiplication based systems. RSA algorithm is one such popular algorithm which is used for security of networks. It includes several time consuming exponentiation operations based on multiplications. Therefore the proposed pipelined Vedic multiplier based on Urdhva Tiryagbhyam Sutra is applied to RSA to enhance the speed of operation. The design is done using ModelSim and implemented using Xilinx.
Nowadays, the rates of malicious data theft and data destruction are alarming. Governments, companies and other organizations have lost a lot of money and many others have closed down due to the activities of dubious hackers and... more
Nowadays, the rates of malicious data theft and data
destruction are alarming. Governments, companies and other
organizations have lost a lot of money and many others have
closed down due to the activities of dubious hackers and
attackers. As data is the life wire of every organization, there is
the need to remotely and securely store the data generated daily
by these organizations in order to enable them recover quickly in
the event of attach and hack. Cloud storage is needed here for the
remote data storage. For many establishments, data security is
one of their major concern when sending their files into the
cloud. They worry about their files being seen or even
compromised by malicious and dubious people because that’s
what happened in the past.
Security is playing a vital role in the field of communication system and Internet. Data encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two popular encryption algorithms that vouch confidentiality and... more
Security is playing a vital role in the field of communication system and Internet. Data encryption standard (DES) and the Rivest-Shamir-Adleman (RSA) algorithms are the two popular encryption algorithms that vouch confidentiality and authenticity over an insecure communication network and Internet. There has been paltry cryptanalytic progress against these two algorithms since their advent. This paper presents the comparison between the DES private key based Algorithm and RSA public key based algorithm. The main feature that specifies and differentiate one algorithm from another are the ability to the speed of encryption and decryption of the input plain text. It also includes several computational issues as well as the analysis of DES algorithm and RSA algorithm like the encryption throughput and decryption throughput. The recipe of finding the encryption throughput and decryption throughput is discovered.
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its widespread usage is reduced due to its security issues. In cloud computing environment data will be stored in the servers which are situate at variouslocations can be accessible by illegal parties may leads to dif erent security problems. Dif erent methods have been developed to overcome the security issues in cloud environment such as signcryption, which is a valuable cryptography skill, which can af ord concurrently both the roles of encryption following signature in a reason step. Likewise, dif erent method methods have been planned to overcome the security issues in cloud environment. This survey details the threats and security anxieties in cloud computing along with the Classification of Security in cloud environment. Also, the review grants the current explanations obtainable in the works to counter the security issues. Likewise, the comparison table has been presented for those methods; result has been analyzed and finally ends up with the conclusion.
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its widespread usage is reduced due to its security issues. In cloud computing environment data will be stored in the servers which are situate at variouslocations can be accessible by illegal parties may leads to dif erent security problems. Dif erent methods have been developed to overcome the security issues in cloud environment such as signcryption, which is a valuable cryptography skill, which can af ord concurrently both the roles of encryption following signature in a reason step. Likewise, dif erent method methods have been planned to overcome the security issues in cloud environment. This survey details the threats and security anxieties in cloud computing along with the Classification of Security in cloud environment. Also, the review grants the current explanations obtainable in the works to counter the security issues. Likewise, the comparison table has been presented for those methods; result has been analyzed and finally ends up with the conclusion
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its... more
Cloud provides high quality computing services, also it’s provided high performance services in a low cost makes it becomes a popular paradigm. The infrastructure of cloud was flexible, net centric approach, and easy to access. But its widespread usage is reduced due to its security issues. In cloud computing environment data will be stored in the servers which are situate at various locations can be accessible by illegal parties may leads to different security problems. Different methods have been developed to overcome the security issues in cloud environment such as signcryption, which is a valuable cryptography skill, which can afford concurrently both the roles of encryption following signature in a reason step. Likewise, different method methods have been planned to overcome the security issues in cloud environment. This survey details the threats and security anxieties in cloud computing along with the Classification of Security in cloud environment. Also, the review grants the current explanations obtainable in the works to counter the security issues. Likewise, the comparison table has been presented for those methods; result has been analyzed and finally ends up with the conclusion.
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. While data transfer... more
Wireless Sensor Network is a combination of one and more nodes basically used for data collection and data aggregation. The collected data is aggregated through a data aggregator and it will be sent to bases station. While data transfer takes place, the intruders sniff the data that are being transmitted from one node to another. In order to prevent data sniffing by the intruder a study is made to prevent data sniffing and data breaching its boundaries. A twofold cryptographic method is proposed using Fibonacci number and Unicode systems. The proposed method is twofold viz, converting the normal simple text to secret message ii) convert secret message to Unicode text. The proposed method uses a twofold security key encryption algorithm for transfer of data in the Wireless sensor networks and a decryption algorithm is also provided to convert back to its normal plain text.