SlideShare a Scribd company logo
1 of 5
Download to read offline
Enhanced Cryptography Algorithm for Providing
Data Security
Dr. K.Kiran Kumar, K.Kusuma Kavya, K.R.L.Sindhura
Department of Information Technology, Bapatla Engineering College, Bapatla.
Abstract: Information security is the
process of protecting information. Due to
enormous development in internet
technology the security of data has now
become a very important challenge in data
communication network. One cannot send
any confidential data in raw form from one
machine to another machine as any hacker
can intercept the confidential message. In
this paper we have developed a new
cryptography algorithm which is based on
block cipher concept. In this algorithm we
have used logical operations like XOR and
shift operations which is used to increase
security.
Keywords:Information security, Encryption,
Decryption, Cryptography.
1. Introduction
The main feature of the encryption/
decryption program implementation is the
generation of the encryption key. Now a
days, cryptography has many commercial
applications. The main purpose of the
cryptography is used not only to provide
confidentiality, but also to provide solutions
for other problems like:
 data integrity,
 authentication,
 non-repudiation.
Cryptography is the method that allows
information to be sent in a secure form in
such a way that the only receiver able to
retrieve the information. However, it is very
difficult to find out the specific algorithm,
because we have already known that they
must consider many factors like: security,
time and space complexity.
A Simplified Model of Conventional
Encryption
This paper is further divided into three
sections. In section 2, we are presenting
detailed description of Information security
using cryptography and various algorithms.
In section 3, we are presenting our proposed
algorithm. In section 4, we have explained
the proposed algorithm by taking an
example of 128 bits (16 characters) and in
section 5 we have conclusion.
2. Information security using
cryptography
Here a newly developed technique named,
“A new Symmetric key Cryptography
Algorithm using extended MSA method:
DJSA symmetric key algorithm” is
discussed. In this a symmetric key method
where we have used a random key generator
for generating the initial key and the key is
used for encrypting the give source file and
we are using substitution method where we
take 4 characters from any input file and
then search the corresponding characters in
the random key matrix file after getting the
76
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
encrypted message they store the encrypted
data in another file. To decrypt any file one
has to know exactly what is the key and to
find the random matrix theoretically. They
apply method on possible files such as
executable file, Microsoft word file, excel
file, access database, FoxProfile, text file,
image file, pdf file, video file, audio file,
oracle database and they have found in all
cases it giving 100% correct solution while
encrypting a file and decrypting a file. In
the following section we are going in detail.
Here another newly developed technique
named, “Effect of Security Increment to
Symmetric Data Encryption through AES
Methodology” is discussed. In this method
they describe about symmetric cipher
algorithm which is much more similar. The
difference is that, Rijndael algorithm start
with 128 bits block size, and then increase
the block size by appending columns[10],
whereas his algorithm start with 200 bits.
3. Proposed Algorithm
In this section we are presenting a new
block based symmetric cryptography
algorithm, and using a random number for
generating the initial key, where this key
will use for encrypting the given source file
using proposed encryption algorithm.
Basically In this technique a block based
substitution method will use. In the present
technique I will provide for encrypting
message multiple times. The proposed key
blocks contains all possible words
comprising of number of characters whose
ASCII code is from 0 to 255 in a random
order. The pattern of the key blocks will
depend on text key entered by the user. To
decrypt any file one has to know exactly
what the key blocks is and to find the
random blocks theoretically one has to
apply 2^256 trial run and which is
intractable.
Encryption Approach Used
Here we are using symmetric encryption
approach, and already we know that
symmetric encryption approach is divided
into two types:
1. Block cipher symmetric
cryptography technique
2. Stream cipher symmetric
cryptography.
But here we are choosing block cipher type
because its efficiency and security. In the
proposed technique we have a common key
between sender and receiver, which is
known as private key. Basically private key
concept is the symmetric key concepts
where plain text is converting into encrypted
text known as cipher text and is decrypted
by same private key into plane text. The
keys, in practice, represent a shared secret
between two or more parties that can be
used to maintain private information.
Proposed Key Generation Steps
1. Create any private key of Size 16
characters. It will be varying from 16 to 64
characters.
2. We can choose any character from 0 to
255 ASCII code.
3. Use of 16*8 key that means 128 bits in
length.
4. Divide 16 bytes into 4 blocks of KB1,
KB2, KB3 and KB4.
5. Apply XOR operation between KB1 and
KB3.Results will store in new KB13.
6. Apply XOR operation between KB2 and
KB13.Results will store in new KB213.
7. Apply XOR operation between KB213
and KB4. Results will store in new KB4213.
( KB:KEY BLOCK)
Steps for proposed Algorithm
1. Initially select plain text of 16 bytes.
77
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
2. Apply XOR operation between key
(KB4213) and plain text block. Result will
store in CB1.
3. Apply right circular shift with 3 values.
Result will store in CB2.
4. Apply XOR operation between CB2 and
KB2.
5. Result will store in new CB3.
6. Apply XOR operation between CB3 and
KB4. Result will store in CB4.
(CB:CIPHER BLOCK)
4. Implementation example of the
Proposed Algorithm
Encryption Method
Key Generation:
Step:1
1.Take the 16 characters plain text
2.Plain text: BAPATLAENGINEERS
3. Divide the key in to 4 blocks
BAPA TLAE NGIN EERS
KB 1 KB2 KB 3 KB 4
Step:2
Apply the EX-OR operation between KB1
& KB3
BAPA NGIN
KB1 KB3
BAPA- 66 65 80 65
NGIN- 78 71 73 78
KB1: 01100110 01100101 10000000
01100101
KB3: 01111000 01110001 01110011
01111000
KB 13: 00011110 00010100 11110011
00011100
Step:3
Apply the EX-OR operation between KB2
& KB13
KB2: 10000100 01110110 01100101
01101001
KB13:00011110 00010100 11110011
00011101
KB213: 10011010 01100010 10010110
01110100
Step:4
Apply the EX-OR operation between KB4
& KB213:
KB213:10011010 01100010 10010110
01110100
KB4: 01101001 01101001 10000010
10000011
KB4213: 11110011 00001011 00010100
11110111
The obtained key is:
11110011 00001011 00010100
11110111
Encryption:
Step:1
Apply the EX-OR operation between KB
4213 & KB1:
KB4213: 11110011 00001011 00010100
11110111
KB1: 01100110 01100101 10000000
01100101
CB1: 10010101 01101110 10010100
10010010
Step:2
78
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
Apply right circular shift with 3bits of CB1.
Result will store in new CB2.
CB2: 01010010 10101101 11010010
10010010
Step:3
Apply the EX-OR operation between CB2
& KB2:
CB2: 01010010 10101101 11010010
10010010
KB2: 10000100 01110110 01100101
01101001
CB3: 11010110 11011011 10110111
11111011
Step:4
Apply the EX-OR operation between CB3 &
KB4:
CB3: 11010110 11011011 10110111
11111011
KB4: 01101001 01101001 10000010
10000011
CB4: 10111111 10110010 00110101
01111000
Now CB1, CB2, CB3, CB4 are the cipher
blocks respected to KEY1, KEY2, KEY3,
KEY4
Decryption Method:
Step:1
Apply the EX-OR operation between
KB4213 & CB1
KB4213: 11110011 00001011 00010100
11110111
CB1: 10010101 01101110 10010100
10010010
P1: 01100110 01100101 10000000
01100101
Step:2
Apply the EX-OR operation between CB2&
CB3:
CB 2: 01010010 10101101 11010010
10010010
CB 3: 11010110 11011011 10110111
11111011
P2: 10000100 01110110 01100101
01101001
Step:3
Apply the EX-OR operation between CB3
& CB4:
CB3: 11010110 11011011 10110111
11111011
CB4: 10111111 10110010 00110101
01111000
P4: 01101001 01101001 10000010
10000011
Step:4
Plain text 3 is :
Apply the EX-OR operation between
KB4321 & P4
KB4213: 11110011 00001011 00010100
11110111
P4: 01101001 01101001 10000010
10000011
X1: 10011010 1100010 10010110
01110100
Step:5
Apply the EX-OR operation between X1 &
P2
X1: 110011010 01100010 10010110
01110100
79
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in
P2: 10000100 01110110 01100101
01101001
X2: 00011110 00010100 11110011
00011101
Step:6
Apply the EX-OR operation between X2
& P1
X2: 00011110 00010100 11110011
00011101
P1: 01100110 01100101 10000000
01100101
P3: 01111000 01110001 01110011
01111001
Here P1,P2,P3,P4 are the plain text’s with
respect to key blocks KB1,KB2,KB3,KB4.
If we want to get P3, we are going to use
KB4321,P4,P2,P1.
Decrypted Text is:
BAPATLAENGINEERS
5. Conclusion
In this paper we have specified a new
algorithm based on block cipher principle. In
this algorithm we have used logical
operations like XOR and shift operations
which is used to increase security. The
algorithm is explained with the help of an
example clearly. Our method is essentially
block cipher method and it will take less
time if the file size is large. The important
thing of our proposed method is that it is
almost impossible to break the encryption
algorithm without knowing the exact key
value. We propose that this encryption
method can be applied for data encryption
and decryption in any type of public
application for sending confidential data.
6. References
[1] Dripto Chatterjee, Joyshree Nath,
Suvadeep Dasgupta, Asoke Nath “A new
Symmetric key Cryptography Algorithm
using extended MSA method: DJSA
symmetric key algorithm” published in 2011
International Conference on Communication
Systems and Network Technologies, 978-0-
7695-4437-3/11 $26.00 © 2011 IEEE.
[2] Yan Wang and Ming Hu “Timing
evaluation of the known cryptographic
algorithms “2009 International Conference
on Computational Intelligence and Security
978-0-7695-3931-7/09 $26.00 © 2009 IEEE
DOI 10.1109/CIS.2009.81.
[3] Symmetric key cryptography using
random key generator, A.Nath, S.Ghosh,
M.A.Mallik, Proceedings of International
conference on SAM-2010 held at Las
Vegas(USA) 12-15 July,2010, Vol-2,P-239-
244.
[4] Data Hiding and Retrieval, A.Nath,
S.Das, A.Chakrabarti, Proceedings of IEEE
International conference on Computer
Intelligence and Computer Network held at
Bhopal from 26-28 Nov, 2010.
[5] Neal Koblitz “A Course in Number
Theory and Cryptography” Second Edition
Published by Springer-Verlag.
[6] T Morkel, JHP Eloff “ ENCRYPTION
TECHNIQUES: A TIMELINE
APPROACH” published in Information and
Computer Security Architecture (ICSA)
Research Group proceeding.
[7] Text book William Stallings, Data and
Computer Communications, 6eWilliam 6e
2005.
[8] [Rijn99]Joan Daemen and Vincent
Rijmen, AES submission document on
Rijndael, Version 2, September 1999.
80
INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT
ISBN: 378 - 26 - 138420 - 5
www.iaetsd.in

More Related Content

What's hot

Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Hardik Manocha
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit vArthyR3
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functionsDr.Florence Dayana
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1Sumit Bajaj
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodIDES Editor
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security PrimerVenkatesh Iyer
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)inventionjournals
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmIjcem Journal
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash functionomarShiekh1
 

What's hot (20)

Simulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish AlgorithmSimulated Analysis and Enhancement of Blowfish Algorithm
Simulated Analysis and Enhancement of Blowfish Algorithm
 
Pgp smime
Pgp smimePgp smime
Pgp smime
 
Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)Advanced Encryption Standard (AES)
Advanced Encryption Standard (AES)
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Hybrid encryption ppt
Hybrid encryption pptHybrid encryption ppt
Hybrid encryption ppt
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
Hybrid AES DES
Hybrid AES DESHybrid AES DES
Hybrid AES DES
 
Public Key Encryption & Hash functions
Public Key Encryption & Hash functionsPublic Key Encryption & Hash functions
Public Key Encryption & Hash functions
 
researchpaperfinal1
researchpaperfinal1researchpaperfinal1
researchpaperfinal1
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution MethodNovel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
Novel Algorithm For Encryption:Hybrid of Transposition and Substitution Method
 
Network Security Primer
Network Security PrimerNetwork Security Primer
Network Security Primer
 
encrption.PDF
encrption.PDFencrption.PDF
encrption.PDF
 
International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)International Journal of Engineering and Science Invention (IJESI)
International Journal of Engineering and Science Invention (IJESI)
 
Implementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithmImplementation of-hybrid-cryptography-algorithm
Implementation of-hybrid-cryptography-algorithm
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Hash function
Hash functionHash function
Hash function
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Message authentication and hash function
Message authentication and hash functionMessage authentication and hash function
Message authentication and hash function
 

Viewers also liked

불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...
불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...
불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...kuuyr loot
 
ใบความรู้ มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4page
ใบความรู้  มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4pageใบความรู้  มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4page
ใบความรู้ มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4pagePrachoom Rangkasikorn
 
Iaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anprIaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anprIaetsd Iaetsd
 
ใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4page
ใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4pageใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4page
ใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4pagePrachoom Rangkasikorn
 
Reference J .White (1)
Reference J .White (1)Reference J .White (1)
Reference J .White (1)Jadie White
 
Horari cinquè
Horari cinquèHorari cinquè
Horari cinquèEscolaGoya
 
JD Auto - Retífica de Cabeçote e Motor
JD Auto -  Retífica de Cabeçote e MotorJD Auto -  Retífica de Cabeçote e Motor
JD Auto - Retífica de Cabeçote e MotorJD Clínica de Auto
 
ใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1page
ใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1pageใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1page
ใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1pagePrachoom Rangkasikorn
 
ใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4page
ใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4pageใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4page
ใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4pagePrachoom Rangkasikorn
 
Llibres escola Pompeu Fabra curs 16 17
Llibres escola Pompeu Fabra curs 16 17Llibres escola Pompeu Fabra curs 16 17
Llibres escola Pompeu Fabra curs 16 17pompeufabramollerussa
 

Viewers also liked (13)

불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...
불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...
불면증 - 스틸녹스 졸피뎀 "EVO.OW.TO" 카톡:DDF11 졸피뎀 처방전,졸피뎀 구입,졸피뎀 직구,졸피뎀 사용후기,졸피뎀 복용후기,졸...
 
ใบความรู้ มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4page
ใบความรู้  มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4pageใบความรู้  มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4page
ใบความรู้ มารู้จักพลังงานไฟฟ้า1 ป.2+229+dltvscip2+55t2sci p02 f26-4page
 
Iaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anprIaetsd fpga implementation of various security based tollgate system using anpr
Iaetsd fpga implementation of various security based tollgate system using anpr
 
MBS About US
MBS About USMBS About US
MBS About US
 
ใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4page
ใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4pageใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4page
ใบความรู้+พลังงานไฟฟ้าได้มาอย่างไร2+ป.3+245+dltvscip3+55t2sci p03 f04-4page
 
La fundamentación
La fundamentaciónLa fundamentación
La fundamentación
 
Reference J .White (1)
Reference J .White (1)Reference J .White (1)
Reference J .White (1)
 
Horari cinquè
Horari cinquèHorari cinquè
Horari cinquè
 
JD Auto - Retífica de Cabeçote e Motor
JD Auto -  Retífica de Cabeçote e MotorJD Auto -  Retífica de Cabeçote e Motor
JD Auto - Retífica de Cabeçote e Motor
 
Música
MúsicaMúsica
Música
 
ใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1page
ใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1pageใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1page
ใบความรู้+พลังงานหมุนเวียน+3+ป.3+245+dltvscip3+55t2sci p03 f06-1page
 
ใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4page
ใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4pageใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4page
ใบความรู้+แรงดึงดูดของโลก+ป.3+248+dltvscip3+55t2sci p03 f26-4page
 
Llibres escola Pompeu Fabra curs 16 17
Llibres escola Pompeu Fabra curs 16 17Llibres escola Pompeu Fabra curs 16 17
Llibres escola Pompeu Fabra curs 16 17
 

Similar to Iaetsd enhanced cryptography algorithm for providing

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryptionmdhar123
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric keymdhar123
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmKhubaib Ahmad Kunjahi
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsSeddiq Q. Abd Al-Rahman
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12Arindam Paul
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...Editor IJCATR
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2Hamed Moghaddam
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptxGIT
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueijcsit
 

Similar to Iaetsd enhanced cryptography algorithm for providing (20)

Symmetric key encryption
Symmetric key encryptionSymmetric key encryption
Symmetric key encryption
 
Encryption symmetric key
Encryption symmetric keyEncryption symmetric key
Encryption symmetric key
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption Algorithm
 
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of ThingsProposed Lightweight Block Cipher Algorithm for Securing Internet of Things
Proposed Lightweight Block Cipher Algorithm for Securing Internet of Things
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
Nt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm PaperNt1330 Unit 4 Dthm Paper
Nt1330 Unit 4 Dthm Paper
 
10.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.1210.11648.j.ijdst.20160204.12
10.11648.j.ijdst.20160204.12
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
A New Security Level for Elliptic Curve Cryptosystem Using Cellular Automata ...
 
CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2CISSP Certification Security Engineering-Part2
CISSP Certification Security Engineering-Part2
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Information System Security.pptx
Information System  Security.pptxInformation System  Security.pptx
Information System Security.pptx
 
New approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical techniqueNew approach in symmetric block cipher security using a new cubical technique
New approach in symmetric block cipher security using a new cubical technique
 

More from Iaetsd Iaetsd

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissionIaetsd Iaetsd
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdlIaetsd Iaetsd
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmIaetsd Iaetsd
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...Iaetsd Iaetsd
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatIaetsd Iaetsd
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationIaetsd Iaetsd
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSIaetsd Iaetsd
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...Iaetsd Iaetsd
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bikeIaetsd Iaetsd
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technologyIaetsd Iaetsd
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...Iaetsd Iaetsd
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdIaetsd Iaetsd
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid GrowthIaetsd Iaetsd
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT AlgorithmIaetsd Iaetsd
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...Iaetsd Iaetsd
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...Iaetsd Iaetsd
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesIaetsd Iaetsd
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesIaetsd Iaetsd
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolicIaetsd Iaetsd
 

More from Iaetsd Iaetsd (20)

iaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmissioniaetsd Survey on cooperative relay based data transmission
iaetsd Survey on cooperative relay based data transmission
 
iaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdliaetsd Software defined am transmitter using vhdl
iaetsd Software defined am transmitter using vhdl
 
iaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarmiaetsd Health monitoring system with wireless alarm
iaetsd Health monitoring system with wireless alarm
 
iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...iaetsd Equalizing channel and power based on cognitive radio system over mult...
iaetsd Equalizing channel and power based on cognitive radio system over mult...
 
iaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seatiaetsd Economic analysis and re design of driver’s car seat
iaetsd Economic analysis and re design of driver’s car seat
 
iaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan applicationiaetsd Design of slotted microstrip patch antenna for wlan application
iaetsd Design of slotted microstrip patch antenna for wlan application
 
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBSREVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
REVIEW PAPER- ON ENHANCEMENT OF HEAT TRANSFER USING RIBS
 
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
A HYBRID AC/DC SOLAR POWERED STANDALONE SYSTEM WITHOUT INVERTER BASED ON LOAD...
 
Fabrication of dual power bike
Fabrication of dual power bikeFabrication of dual power bike
Fabrication of dual power bike
 
Blue brain technology
Blue brain technologyBlue brain technology
Blue brain technology
 
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
iirdem The Livable Planet – A Revolutionary Concept through Innovative Street...
 
iirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic birdiirdem Surveillance aided robotic bird
iirdem Surveillance aided robotic bird
 
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growthiirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
iirdem Growing India Time Monopoly – The Key to Initiate Long Term Rapid Growth
 
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithmiirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
iirdem Design of Efficient Solar Energy Collector using MPPT Algorithm
 
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
iirdem CRASH IMPACT ATTENUATOR (CIA) FOR AUTOMOBILES WITH THE ADVOCATION OF M...
 
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
iirdem ADVANCING OF POWER MANAGEMENT IN HOME WITH SMART GRID TECHNOLOGY AND S...
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
iaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databasesiaetsd Secured multiple keyword ranked search over encrypted databases
iaetsd Secured multiple keyword ranked search over encrypted databases
 
iaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineriesiaetsd Robots in oil and gas refineries
iaetsd Robots in oil and gas refineries
 
iaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using paraboliciaetsd Modeling of solar steam engine system using parabolic
iaetsd Modeling of solar steam engine system using parabolic
 

Recently uploaded

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 

Iaetsd enhanced cryptography algorithm for providing

  • 1. Enhanced Cryptography Algorithm for Providing Data Security Dr. K.Kiran Kumar, K.Kusuma Kavya, K.R.L.Sindhura Department of Information Technology, Bapatla Engineering College, Bapatla. Abstract: Information security is the process of protecting information. Due to enormous development in internet technology the security of data has now become a very important challenge in data communication network. One cannot send any confidential data in raw form from one machine to another machine as any hacker can intercept the confidential message. In this paper we have developed a new cryptography algorithm which is based on block cipher concept. In this algorithm we have used logical operations like XOR and shift operations which is used to increase security. Keywords:Information security, Encryption, Decryption, Cryptography. 1. Introduction The main feature of the encryption/ decryption program implementation is the generation of the encryption key. Now a days, cryptography has many commercial applications. The main purpose of the cryptography is used not only to provide confidentiality, but also to provide solutions for other problems like:  data integrity,  authentication,  non-repudiation. Cryptography is the method that allows information to be sent in a secure form in such a way that the only receiver able to retrieve the information. However, it is very difficult to find out the specific algorithm, because we have already known that they must consider many factors like: security, time and space complexity. A Simplified Model of Conventional Encryption This paper is further divided into three sections. In section 2, we are presenting detailed description of Information security using cryptography and various algorithms. In section 3, we are presenting our proposed algorithm. In section 4, we have explained the proposed algorithm by taking an example of 128 bits (16 characters) and in section 5 we have conclusion. 2. Information security using cryptography Here a newly developed technique named, “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” is discussed. In this a symmetric key method where we have used a random key generator for generating the initial key and the key is used for encrypting the give source file and we are using substitution method where we take 4 characters from any input file and then search the corresponding characters in the random key matrix file after getting the 76 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 2. encrypted message they store the encrypted data in another file. To decrypt any file one has to know exactly what is the key and to find the random matrix theoretically. They apply method on possible files such as executable file, Microsoft word file, excel file, access database, FoxProfile, text file, image file, pdf file, video file, audio file, oracle database and they have found in all cases it giving 100% correct solution while encrypting a file and decrypting a file. In the following section we are going in detail. Here another newly developed technique named, “Effect of Security Increment to Symmetric Data Encryption through AES Methodology” is discussed. In this method they describe about symmetric cipher algorithm which is much more similar. The difference is that, Rijndael algorithm start with 128 bits block size, and then increase the block size by appending columns[10], whereas his algorithm start with 200 bits. 3. Proposed Algorithm In this section we are presenting a new block based symmetric cryptography algorithm, and using a random number for generating the initial key, where this key will use for encrypting the given source file using proposed encryption algorithm. Basically In this technique a block based substitution method will use. In the present technique I will provide for encrypting message multiple times. The proposed key blocks contains all possible words comprising of number of characters whose ASCII code is from 0 to 255 in a random order. The pattern of the key blocks will depend on text key entered by the user. To decrypt any file one has to know exactly what the key blocks is and to find the random blocks theoretically one has to apply 2^256 trial run and which is intractable. Encryption Approach Used Here we are using symmetric encryption approach, and already we know that symmetric encryption approach is divided into two types: 1. Block cipher symmetric cryptography technique 2. Stream cipher symmetric cryptography. But here we are choosing block cipher type because its efficiency and security. In the proposed technique we have a common key between sender and receiver, which is known as private key. Basically private key concept is the symmetric key concepts where plain text is converting into encrypted text known as cipher text and is decrypted by same private key into plane text. The keys, in practice, represent a shared secret between two or more parties that can be used to maintain private information. Proposed Key Generation Steps 1. Create any private key of Size 16 characters. It will be varying from 16 to 64 characters. 2. We can choose any character from 0 to 255 ASCII code. 3. Use of 16*8 key that means 128 bits in length. 4. Divide 16 bytes into 4 blocks of KB1, KB2, KB3 and KB4. 5. Apply XOR operation between KB1 and KB3.Results will store in new KB13. 6. Apply XOR operation between KB2 and KB13.Results will store in new KB213. 7. Apply XOR operation between KB213 and KB4. Results will store in new KB4213. ( KB:KEY BLOCK) Steps for proposed Algorithm 1. Initially select plain text of 16 bytes. 77 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 3. 2. Apply XOR operation between key (KB4213) and plain text block. Result will store in CB1. 3. Apply right circular shift with 3 values. Result will store in CB2. 4. Apply XOR operation between CB2 and KB2. 5. Result will store in new CB3. 6. Apply XOR operation between CB3 and KB4. Result will store in CB4. (CB:CIPHER BLOCK) 4. Implementation example of the Proposed Algorithm Encryption Method Key Generation: Step:1 1.Take the 16 characters plain text 2.Plain text: BAPATLAENGINEERS 3. Divide the key in to 4 blocks BAPA TLAE NGIN EERS KB 1 KB2 KB 3 KB 4 Step:2 Apply the EX-OR operation between KB1 & KB3 BAPA NGIN KB1 KB3 BAPA- 66 65 80 65 NGIN- 78 71 73 78 KB1: 01100110 01100101 10000000 01100101 KB3: 01111000 01110001 01110011 01111000 KB 13: 00011110 00010100 11110011 00011100 Step:3 Apply the EX-OR operation between KB2 & KB13 KB2: 10000100 01110110 01100101 01101001 KB13:00011110 00010100 11110011 00011101 KB213: 10011010 01100010 10010110 01110100 Step:4 Apply the EX-OR operation between KB4 & KB213: KB213:10011010 01100010 10010110 01110100 KB4: 01101001 01101001 10000010 10000011 KB4213: 11110011 00001011 00010100 11110111 The obtained key is: 11110011 00001011 00010100 11110111 Encryption: Step:1 Apply the EX-OR operation between KB 4213 & KB1: KB4213: 11110011 00001011 00010100 11110111 KB1: 01100110 01100101 10000000 01100101 CB1: 10010101 01101110 10010100 10010010 Step:2 78 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 4. Apply right circular shift with 3bits of CB1. Result will store in new CB2. CB2: 01010010 10101101 11010010 10010010 Step:3 Apply the EX-OR operation between CB2 & KB2: CB2: 01010010 10101101 11010010 10010010 KB2: 10000100 01110110 01100101 01101001 CB3: 11010110 11011011 10110111 11111011 Step:4 Apply the EX-OR operation between CB3 & KB4: CB3: 11010110 11011011 10110111 11111011 KB4: 01101001 01101001 10000010 10000011 CB4: 10111111 10110010 00110101 01111000 Now CB1, CB2, CB3, CB4 are the cipher blocks respected to KEY1, KEY2, KEY3, KEY4 Decryption Method: Step:1 Apply the EX-OR operation between KB4213 & CB1 KB4213: 11110011 00001011 00010100 11110111 CB1: 10010101 01101110 10010100 10010010 P1: 01100110 01100101 10000000 01100101 Step:2 Apply the EX-OR operation between CB2& CB3: CB 2: 01010010 10101101 11010010 10010010 CB 3: 11010110 11011011 10110111 11111011 P2: 10000100 01110110 01100101 01101001 Step:3 Apply the EX-OR operation between CB3 & CB4: CB3: 11010110 11011011 10110111 11111011 CB4: 10111111 10110010 00110101 01111000 P4: 01101001 01101001 10000010 10000011 Step:4 Plain text 3 is : Apply the EX-OR operation between KB4321 & P4 KB4213: 11110011 00001011 00010100 11110111 P4: 01101001 01101001 10000010 10000011 X1: 10011010 1100010 10010110 01110100 Step:5 Apply the EX-OR operation between X1 & P2 X1: 110011010 01100010 10010110 01110100 79 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in
  • 5. P2: 10000100 01110110 01100101 01101001 X2: 00011110 00010100 11110011 00011101 Step:6 Apply the EX-OR operation between X2 & P1 X2: 00011110 00010100 11110011 00011101 P1: 01100110 01100101 10000000 01100101 P3: 01111000 01110001 01110011 01111001 Here P1,P2,P3,P4 are the plain text’s with respect to key blocks KB1,KB2,KB3,KB4. If we want to get P3, we are going to use KB4321,P4,P2,P1. Decrypted Text is: BAPATLAENGINEERS 5. Conclusion In this paper we have specified a new algorithm based on block cipher principle. In this algorithm we have used logical operations like XOR and shift operations which is used to increase security. The algorithm is explained with the help of an example clearly. Our method is essentially block cipher method and it will take less time if the file size is large. The important thing of our proposed method is that it is almost impossible to break the encryption algorithm without knowing the exact key value. We propose that this encryption method can be applied for data encryption and decryption in any type of public application for sending confidential data. 6. References [1] Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on Communication Systems and Network Technologies, 978-0- 7695-4437-3/11 $26.00 © 2011 IEEE. [2] Yan Wang and Ming Hu “Timing evaluation of the known cryptographic algorithms “2009 International Conference on Computational Intelligence and Security 978-0-7695-3931-7/09 $26.00 © 2009 IEEE DOI 10.1109/CIS.2009.81. [3] Symmetric key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12-15 July,2010, Vol-2,P-239- 244. [4] Data Hiding and Retrieval, A.Nath, S.Das, A.Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010. [5] Neal Koblitz “A Course in Number Theory and Cryptography” Second Edition Published by Springer-Verlag. [6] T Morkel, JHP Eloff “ ENCRYPTION TECHNIQUES: A TIMELINE APPROACH” published in Information and Computer Security Architecture (ICSA) Research Group proceeding. [7] Text book William Stallings, Data and Computer Communications, 6eWilliam 6e 2005. [8] [Rijn99]Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, Version 2, September 1999. 80 INTERNATIONAL CONFERENCE ON CURRENT INNOVATIONS IN ENGINEERING AND TECHNOLOGY INTERNATIONAL ASSOCIATION OF ENGINEERING & TECHNOLOGY FOR SKILL DEVELOPMENT ISBN: 378 - 26 - 138420 - 5 www.iaetsd.in