SlideShare a Scribd company logo
1 of 24
A PRESENTATION ON
“REPOSITORY FILE TRANSFER: A
NEW COMPOUND FILE ENCYPTION
TECHNIQUE”
SHUBHAM PATIL
patilshubham919@gmail.com
ABSTRACT
• Data security and protection is a field that protects digital privacy measures that are
used to prevent unauthorized access to computers and confidential data, databases
and websites. Corruption of data can be also prevented using data security. It is an
essential aspect of IT for organizations of every size and type.
• This paper focuses on how the data is been transferred from one user to another in
convenient and secure method by sing cryptography. Cryptology is the mathematics,
such as number theory, and the application of formulas and algorithms.
Synchronization between the user is been maintained by using the symmetric key for
the purpose of data cryptography.
• Hybridation of the algorithm is been done for purpose of increasing the security and
maintaining the integrity between user.
INTRODUCTION
Data security: protecting data, such as those in a database,from the unwanted actions
of unauthorized users.
Fig.1.Basic diagram of cryptography
INTRODUCTION (Cont.)
• Encryption is the process of transforming information so it is unintelligible to
anyone but the intended recipient. Decryption is the process of transforming
encrypted information so that it is intelligible again.
• Data security is one of the most important and challenging task around
the world.
• The sections that follow introduce the use of keys for encryption and decryption.
I. Symmetric-Key Encryption
II.Asymmetric-Key Encryption
• The key feature of our system is that the key for the decryption of files is
been converted in QR CODE and being transmitted to the receiver.
INTRODUCTION (Cont.)
• Algorithms used in our system:
1. BLOWFISH
2. AES
• Blowfish is a symmetric block cipher that can be used as a drop-in replacement
for DES. Since then it has been analyzed considerably, and it is slowly gaining
acceptance as a strong encryption algorithm.
• The more popular and widely adopted symmetric encryption algorithm likely to
be encountered nowadays is the Advanced Encryption Standard (AES). It is
found at least six time faster than triple DES.
LITERATURE SURVEY
PAPER 1:A comparative survey of symmetric and
asymmetric key cryptography
• In this paper they conclude the importance of network security and types
of keys explained in details.
• The concept of Symmetric and Asymmetric key, advantages of
asymmetric key (separate keys for encryption and decryption) and why
the asymmetric key is more effective than symmetric key.
• The concept of symmetric key in system ensure the end to end encryption
between sender and receiver.
LITERATURE SURVEY(Cont.)
PAPER 2: DES and AES Performance evalution
• This paper discribes cryptography which plays vital role in the security to
maintain the confidentiality, authentication and integrity.
• Two cryptographic algorithms are commonly used i.e AES and DES
where AES provides encryption to secure the data before transmission
and DES also provides security as AES.
• This paper explains the better throughput than other algorithm and
enhancement in key size.
LITERATURE SURVEY(Cont.)
PAPER 3: Enhanced Blowfish Algorithm for Image Encryption and
Decryption with Supplementary Key
• This system is based on blowfish algorithm.
• Encryption of multimedia files in efficient and secured method using
blowfish (128,442bits). The ability of algorithm to encrypt the larger size of
multimedia files such as images, voice clip etc. The variation of key
generation by the bits size available for encryption(32, 64,128,448 bits).
• The algorithm is to used for encrypting tht multimeia file beacuse of its
effective and stronger encryprion tecnique and its key expansion at most
448bits into several subkey arrays totaling 4168 bytes.
LITERATURE SURVEY(Cont.)
PAPER 4: Secure QR Code System
•As per this paper[4] the review contains the structure of QR code and
security algorithms for QR codes.
•This paper explains the QR code ( Quick Response Code) and its
trademark for a type of matrix barcode (or two-dimensional barcode) . A
barcode is in a form of machine-readable optical label that contains
information about the item to which it is attached.
•A QR code uses four standardized encoding modes (numeric,
alphanumeric, byte/binary, and kanji) to efficiently store data; extensions
may also be used.
Literature survey table
SR.NO TITLE AUTHOR DESCRIPTION
5 Secure File storage in
Cloud Computing using
Hybrid Cryptography
Algorithm (IEEE Wisp
NET 2016 conference.)
Punam V. Maitri,
Aruna Verma
Wireless file sharing using hybrid algorithm for
security purpose. The two-way encryption
mechanism explained. Symmetric keys used for
encryption and decryption. Wireless medium
used for key sharing and server as database for
providing security
6 A Performance
Comparison of Data
Encryption Algorithms
(IEEE 2014 conference.)
Aamer Nadeem,
Dr M. Younus
Javed
Detailed explanation of AES, DES, BLOWFISH
Algorithm and working of algorithm and bits
used for encryption. Comparison between AES,
DES, BLOWFISH. The advantage of blowfish
over DES & AES algorithm. The performance
evaluation of AES, BLOWFISH, DES algorithm
with the time complexity explained
7 Enhanced Security using
Hybrid Encryption
Algorithm(International
Journal of Innovative
Research in Compute
Engineering
Vol. 4, Issue 7, July 2016)
Neha, Mandeep
Kaur
M.Tech. Student,
Department of
Computer
Engineering
Variation of technique for more reliability of data
between users (Sender & receiver).
Improvement in security by hybriding of AES
and BLOWFISH Algorithm. Use of AES for Key
Encryption and BLOWFISH for Data or text
encryption. The security enhancement due to
hybridation of algorithm
SR
NO.
TITLE AUTHOR DESCRIPTION
8 Security Analysis of
Blowfish algorithm
(IEEE 2014
conference.)
Faudziah Ahmad
Ramlan Mahmod
Universiti Putra
Malaysia
Serdang, Malaysia
Concept of blowfish algorithm and its advantages over
DES algorithm. The detailed working of Blowfish
algorithm and its Encryption the substitution box working
and various combination and permutation done for
encrypting an data is been explained in detail in this
paper. The various bits size available for encrypting the
lager bits of data and how its key is ben generated in
unreadable format explained
9 The New
Cryptography
Algorithm with High
Throughput(2014
International
Conference on
Computer
Communication and
Informatics)
Dudhatra Nilesh,
Prof. Malti Nagle
Advantages of blowfish algorithm over another algorithm.
In this paper at first new cryptography (Encryption and
Decryption) algorithm has been generated and new
cryptography (Encryption and Decryption) algorithm has
been compared by using some components like
throughput of key generation, to generate Encryption text
and to generate Decryption text.
10 Investigating the
Efficiency of Blowfish
and Rejindael (AES)
Algorithms(Internation
al Conference on
Computing,
Communication and
Automation
(ICCCA2015))
M. Anand Kumar,
Dr.S.Karthikeyan
This paper presented the performance evaluation of two
commonly known symmetric cryptographic algorithms.
These algorithms are tested with different performance
metrics.It focuses on two commonly used symmetric
encryption algorithms such as Blowfish and
Rejindael.These algorithms are compared and
performance is evaluated.
SR.NO. TITLE AUTHOR DESCRIPTION
11 QR Code Security-How
Secure and Usable Apps
Can Protect Users Against
Malicious QR
Codes(2015 10th
International Conference
on Availability,
Reliability and Security)
Katharina
Krombholz, Peter
Fr¨uhwirt, Thomas
Rieder, Ioannis
Kapsalis, Johanna
Ullrich and Edgar
Weippl
Analysis of QR code security from a
holistic point of view and analysis of
why users are still susceptible to QR
code based attacks and why currently
deployed smartphone applications are
unable to mitigate these attacks. QR
codes have gained popularity as part of
the Internet of Things.
12 Survey on design of
secured AES
algorithm(International
Conference on
Engineering Innovations
and Solutions(ICEIS –
2016) )
Ms. Anu Mohan,
Dr.P.KarthigaiKu
ma
The AES algorithm provide security to
the data when its transmission. This
paper addresses various security
techniques in AES algorithm. The
security in AES can be done through
many ways such as complexity in the
key generation operations, pipelining
structures, iterarations levels, etc.
PROBLEM DEFINITION
• In previous studies they used SMS transmission concept but it is not much
efficient. It have some drawbacks like it is not more secure for transferring
the data for end-to-end encryption.
• We try to solve this drawback by using the QR code system which provides
more security. So we will try to improve the efficiency.
PROPOSED SYSTEM
Fig.2.1.State flow diagram
PROPOSED SYSTEM(Cont.)
As shown in figure 2.1 The system consists of three main components:
1.SENDER: It Selects the file from repository to be shared and sends it to the
server. And waits for the key to be received by the server. Once the key is being
transferred from server to sender it is been converted it in QR code.
2.SERVER: Server is responsible for receiving and storing the files from user1.
Once the key is being received by the sever encrypts the file using
algorithm(Blowfish) and sends the key to the user1(sender).
3.RECEIVER: It gets the key in the form of QR code which is been then decrypted
into reverse manner as used for encryption. Once the key is being decrypted from
QR code to textual form it is able to retrieve the data/file or message from server.
PROPOSED SYSTEM(Cont.)
Fig.2.2.Encryption with blowfish algorithm
PROPOSED SYSTEM(Cont.)
Fig.2.3.Encryption of key with AES algorithm
EXPECTED RESULTS
• The encryption(hybrid) technique used in proposed system are more secured then
the existing system, which helps to enhance security and confidentiality.
• The comparison of the algorithms is done with the help of following Parameters:
Time required
 Performance
 Average of data processed per second
[13].
Algorithm Data Time(seconds) Average Megabyte
per/second(approx.)
Performance
DES 256 mb 10-11 22-23 Low
AES 256 mb 5 51.2 Medium
BLOWFISH 256 mb 3.5-5 64 High
EXPECTED RESULT(Cont.)
Fig.3.Structure of the system
CONCLUSION
• Thus, in the proposed system we are implementing a secure file transfer
using hybridation of encryption algorithm which in result provides us the
enhanced security for transmission of files for one user to another.
• The drawback of previous system is being overcome and a secured
manner of transferring key by encrypting it into an QR code is been
achieved which increases the security and confidentiality.
REFERENCES
[1].Sourabh Chandra, Smita Paira,“A comparative survey of symmetric and
asymmetric key cryptography”, 2014 International Conference on
Electronics, Communication and Computational Engineering
[2].Bawna Bhat,Abdul Wahid Ali,Apurva Gupta,“DES and AES Performance
evaluation”, International Conference on Computing, Communication and
Automation (ICCCA2015)
[3].M. Mekala, K. Kanagalakshm,“Enhanced Blowfish Algorithm for Image
Encryption and Decryption with Supplementary Key”, International Journal of
Computer Applications
[4].Raed M.Bani-Hani,Yarub A,Wahsheh, Mohammad B. Al-Sarhan ,“Secure QR
Code System”, 2014 10th International Conference
[5]. Punam V. Maitri,Aruna Verma,”Secure File storage in Cloud Computing using
Hybrid Cryptography Algorithm”, IEEE WiSPNET 2016 conference
[6].Aamer Nadeem, Dr M. Younus Javed,”A Performance Comparison of Data
Encryption Algorithms”,Information and Communication Technologies,2005.First
International Conference
REFERENCES (Cont.)
[7].Neha, Mandeep Kaur,”Enhanced Security using Hybrid Encryption
Algorithm”,International Journal of Innovative Research in Computer and
Communication Engineering
[8].Faudziah Ahmad,Ramlan Mahmod,”Security Analysis of Blowfish
algorithm”,Informatics and Applications (ICIA),2013 Second International
Conference
[9].Dudhatra Nilesh, Prof. Malti Nagle,”The New Cryptography Algorithm with
High Throughput”,2014 International Conference on Computer Communication
and Informatics (ICCCI -2014)
[10].M. Anand Kumar,Dr.S.Karthikeyan,”Investigating the Efficiency of Blowfish
and Rejindael (AES) Algorithms”,2014 10th International Conference
[11]. Katharina Krombholz, Peter Fr¨uhwirt, Thomas Rieder, Ioannis Kapsalis,
Johanna Ullrich and Edgar Weippl,“QR Code Security”, 2015 10th International
Conference on Availability, Reliability and Security
REFERENCES (Cont.)
[12]. Ms. Anu Mohan, Dr.P.KarthigaiKuma,“Survey on design of secured AES
algorithm”,International Conference on Engineering Innovations and
Solutions(ICEIS – 2016)
[13].https://www.google.co.in/search?
q=comparison+between+aes+des+and+blowfish&rlz=1C1CHBF_enIN748IN7
48&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiE74rBa-
zWAhXJK48KHedyAT4Q_AUICigB&biw=1242&bih=602#imgrc=_UX
1ZsvKwykBwM:
THANK YOU

More Related Content

What's hot

File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniquesmiteshkumar82
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture NotesFellowBuddy.com
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric blockijcisjournal
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Templateijircee
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYijcisjournal
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...IJNSA Journal
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAchovatiyabhautik
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Jayanth Dwijesh H P
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
 

What's hot (20)

File transfer using cryptography techniques
File transfer using cryptography techniquesFile transfer using cryptography techniques
File transfer using cryptography techniques
 
Cryptography and Network Lecture Notes
Cryptography and Network Lecture NotesCryptography and Network Lecture Notes
Cryptography and Network Lecture Notes
 
Analysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network SecurityAnalysis of Cryptographic Algorithms for Network Security
Analysis of Cryptographic Algorithms for Network Security
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
82 86
82 8682 86
82 86
 
Implement a novel symmetric block
Implement a novel symmetric blockImplement a novel symmetric block
Implement a novel symmetric block
 
262 265
262 265262 265
262 265
 
ijircee_Template
ijircee_Templateijircee_Template
ijircee_Template
 
Az24339344
Az24339344Az24339344
Az24339344
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
Ew25914917
Ew25914917Ew25914917
Ew25914917
 
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
A NOVEL IMAGE ENCRYPTION SCHEME WITH HUFFMAN ENCODING AND STEGANOGRAPHY TECHN...
 
Mini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVAMini Project on Data Encryption & Decryption in JAVA
Mini Project on Data Encryption & Decryption in JAVA
 
Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..Vtu network security(10 ec832) unit 2 notes..
Vtu network security(10 ec832) unit 2 notes..
 
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...
 

Similar to File transfer with multiple security mechanism

A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET Journal
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionIJERA Editor
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyeSAT Publishing House
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 

Similar to File transfer with multiple security mechanism (20)

A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...A PPLICATION OF  C LASSICAL  E NCRYPTION  T ECHNIQUES FOR  S ECURING  D ATA -...
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...IRJET-  	  Study and Performance Evaluation of Different Symmetric Key Crypto...
IRJET- Study and Performance Evaluation of Different Symmetric Key Crypto...
 
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMIMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
A Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data DecryptionA Modified Technique For Performing Data Encryption & Data Decryption
A Modified Technique For Performing Data Encryption & Data Decryption
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
Comparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a surveyComparative study of private and public key cryptography algorithms a survey
Comparative study of private and public key cryptography algorithms a survey
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 

Recently uploaded

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 

Recently uploaded (20)

VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 

File transfer with multiple security mechanism

  • 1. A PRESENTATION ON “REPOSITORY FILE TRANSFER: A NEW COMPOUND FILE ENCYPTION TECHNIQUE” SHUBHAM PATIL patilshubham919@gmail.com
  • 2. ABSTRACT • Data security and protection is a field that protects digital privacy measures that are used to prevent unauthorized access to computers and confidential data, databases and websites. Corruption of data can be also prevented using data security. It is an essential aspect of IT for organizations of every size and type. • This paper focuses on how the data is been transferred from one user to another in convenient and secure method by sing cryptography. Cryptology is the mathematics, such as number theory, and the application of formulas and algorithms. Synchronization between the user is been maintained by using the symmetric key for the purpose of data cryptography. • Hybridation of the algorithm is been done for purpose of increasing the security and maintaining the integrity between user.
  • 3. INTRODUCTION Data security: protecting data, such as those in a database,from the unwanted actions of unauthorized users. Fig.1.Basic diagram of cryptography
  • 4. INTRODUCTION (Cont.) • Encryption is the process of transforming information so it is unintelligible to anyone but the intended recipient. Decryption is the process of transforming encrypted information so that it is intelligible again. • Data security is one of the most important and challenging task around the world. • The sections that follow introduce the use of keys for encryption and decryption. I. Symmetric-Key Encryption II.Asymmetric-Key Encryption • The key feature of our system is that the key for the decryption of files is been converted in QR CODE and being transmitted to the receiver.
  • 5. INTRODUCTION (Cont.) • Algorithms used in our system: 1. BLOWFISH 2. AES • Blowfish is a symmetric block cipher that can be used as a drop-in replacement for DES. Since then it has been analyzed considerably, and it is slowly gaining acceptance as a strong encryption algorithm. • The more popular and widely adopted symmetric encryption algorithm likely to be encountered nowadays is the Advanced Encryption Standard (AES). It is found at least six time faster than triple DES.
  • 6. LITERATURE SURVEY PAPER 1:A comparative survey of symmetric and asymmetric key cryptography • In this paper they conclude the importance of network security and types of keys explained in details. • The concept of Symmetric and Asymmetric key, advantages of asymmetric key (separate keys for encryption and decryption) and why the asymmetric key is more effective than symmetric key. • The concept of symmetric key in system ensure the end to end encryption between sender and receiver.
  • 7. LITERATURE SURVEY(Cont.) PAPER 2: DES and AES Performance evalution • This paper discribes cryptography which plays vital role in the security to maintain the confidentiality, authentication and integrity. • Two cryptographic algorithms are commonly used i.e AES and DES where AES provides encryption to secure the data before transmission and DES also provides security as AES. • This paper explains the better throughput than other algorithm and enhancement in key size.
  • 8. LITERATURE SURVEY(Cont.) PAPER 3: Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key • This system is based on blowfish algorithm. • Encryption of multimedia files in efficient and secured method using blowfish (128,442bits). The ability of algorithm to encrypt the larger size of multimedia files such as images, voice clip etc. The variation of key generation by the bits size available for encryption(32, 64,128,448 bits). • The algorithm is to used for encrypting tht multimeia file beacuse of its effective and stronger encryprion tecnique and its key expansion at most 448bits into several subkey arrays totaling 4168 bytes.
  • 9. LITERATURE SURVEY(Cont.) PAPER 4: Secure QR Code System •As per this paper[4] the review contains the structure of QR code and security algorithms for QR codes. •This paper explains the QR code ( Quick Response Code) and its trademark for a type of matrix barcode (or two-dimensional barcode) . A barcode is in a form of machine-readable optical label that contains information about the item to which it is attached. •A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used.
  • 10. Literature survey table SR.NO TITLE AUTHOR DESCRIPTION 5 Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm (IEEE Wisp NET 2016 conference.) Punam V. Maitri, Aruna Verma Wireless file sharing using hybrid algorithm for security purpose. The two-way encryption mechanism explained. Symmetric keys used for encryption and decryption. Wireless medium used for key sharing and server as database for providing security 6 A Performance Comparison of Data Encryption Algorithms (IEEE 2014 conference.) Aamer Nadeem, Dr M. Younus Javed Detailed explanation of AES, DES, BLOWFISH Algorithm and working of algorithm and bits used for encryption. Comparison between AES, DES, BLOWFISH. The advantage of blowfish over DES & AES algorithm. The performance evaluation of AES, BLOWFISH, DES algorithm with the time complexity explained 7 Enhanced Security using Hybrid Encryption Algorithm(International Journal of Innovative Research in Compute Engineering Vol. 4, Issue 7, July 2016) Neha, Mandeep Kaur M.Tech. Student, Department of Computer Engineering Variation of technique for more reliability of data between users (Sender & receiver). Improvement in security by hybriding of AES and BLOWFISH Algorithm. Use of AES for Key Encryption and BLOWFISH for Data or text encryption. The security enhancement due to hybridation of algorithm
  • 11. SR NO. TITLE AUTHOR DESCRIPTION 8 Security Analysis of Blowfish algorithm (IEEE 2014 conference.) Faudziah Ahmad Ramlan Mahmod Universiti Putra Malaysia Serdang, Malaysia Concept of blowfish algorithm and its advantages over DES algorithm. The detailed working of Blowfish algorithm and its Encryption the substitution box working and various combination and permutation done for encrypting an data is been explained in detail in this paper. The various bits size available for encrypting the lager bits of data and how its key is ben generated in unreadable format explained 9 The New Cryptography Algorithm with High Throughput(2014 International Conference on Computer Communication and Informatics) Dudhatra Nilesh, Prof. Malti Nagle Advantages of blowfish algorithm over another algorithm. In this paper at first new cryptography (Encryption and Decryption) algorithm has been generated and new cryptography (Encryption and Decryption) algorithm has been compared by using some components like throughput of key generation, to generate Encryption text and to generate Decryption text. 10 Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms(Internation al Conference on Computing, Communication and Automation (ICCCA2015)) M. Anand Kumar, Dr.S.Karthikeyan This paper presented the performance evaluation of two commonly known symmetric cryptographic algorithms. These algorithms are tested with different performance metrics.It focuses on two commonly used symmetric encryption algorithms such as Blowfish and Rejindael.These algorithms are compared and performance is evaluated.
  • 12. SR.NO. TITLE AUTHOR DESCRIPTION 11 QR Code Security-How Secure and Usable Apps Can Protect Users Against Malicious QR Codes(2015 10th International Conference on Availability, Reliability and Security) Katharina Krombholz, Peter Fr¨uhwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich and Edgar Weippl Analysis of QR code security from a holistic point of view and analysis of why users are still susceptible to QR code based attacks and why currently deployed smartphone applications are unable to mitigate these attacks. QR codes have gained popularity as part of the Internet of Things. 12 Survey on design of secured AES algorithm(International Conference on Engineering Innovations and Solutions(ICEIS – 2016) ) Ms. Anu Mohan, Dr.P.KarthigaiKu ma The AES algorithm provide security to the data when its transmission. This paper addresses various security techniques in AES algorithm. The security in AES can be done through many ways such as complexity in the key generation operations, pipelining structures, iterarations levels, etc.
  • 13. PROBLEM DEFINITION • In previous studies they used SMS transmission concept but it is not much efficient. It have some drawbacks like it is not more secure for transferring the data for end-to-end encryption. • We try to solve this drawback by using the QR code system which provides more security. So we will try to improve the efficiency.
  • 15. PROPOSED SYSTEM(Cont.) As shown in figure 2.1 The system consists of three main components: 1.SENDER: It Selects the file from repository to be shared and sends it to the server. And waits for the key to be received by the server. Once the key is being transferred from server to sender it is been converted it in QR code. 2.SERVER: Server is responsible for receiving and storing the files from user1. Once the key is being received by the sever encrypts the file using algorithm(Blowfish) and sends the key to the user1(sender). 3.RECEIVER: It gets the key in the form of QR code which is been then decrypted into reverse manner as used for encryption. Once the key is being decrypted from QR code to textual form it is able to retrieve the data/file or message from server.
  • 18. EXPECTED RESULTS • The encryption(hybrid) technique used in proposed system are more secured then the existing system, which helps to enhance security and confidentiality. • The comparison of the algorithms is done with the help of following Parameters: Time required  Performance  Average of data processed per second [13]. Algorithm Data Time(seconds) Average Megabyte per/second(approx.) Performance DES 256 mb 10-11 22-23 Low AES 256 mb 5 51.2 Medium BLOWFISH 256 mb 3.5-5 64 High
  • 20. CONCLUSION • Thus, in the proposed system we are implementing a secure file transfer using hybridation of encryption algorithm which in result provides us the enhanced security for transmission of files for one user to another. • The drawback of previous system is being overcome and a secured manner of transferring key by encrypting it into an QR code is been achieved which increases the security and confidentiality.
  • 21. REFERENCES [1].Sourabh Chandra, Smita Paira,“A comparative survey of symmetric and asymmetric key cryptography”, 2014 International Conference on Electronics, Communication and Computational Engineering [2].Bawna Bhat,Abdul Wahid Ali,Apurva Gupta,“DES and AES Performance evaluation”, International Conference on Computing, Communication and Automation (ICCCA2015) [3].M. Mekala, K. Kanagalakshm,“Enhanced Blowfish Algorithm for Image Encryption and Decryption with Supplementary Key”, International Journal of Computer Applications [4].Raed M.Bani-Hani,Yarub A,Wahsheh, Mohammad B. Al-Sarhan ,“Secure QR Code System”, 2014 10th International Conference [5]. Punam V. Maitri,Aruna Verma,”Secure File storage in Cloud Computing using Hybrid Cryptography Algorithm”, IEEE WiSPNET 2016 conference [6].Aamer Nadeem, Dr M. Younus Javed,”A Performance Comparison of Data Encryption Algorithms”,Information and Communication Technologies,2005.First International Conference
  • 22. REFERENCES (Cont.) [7].Neha, Mandeep Kaur,”Enhanced Security using Hybrid Encryption Algorithm”,International Journal of Innovative Research in Computer and Communication Engineering [8].Faudziah Ahmad,Ramlan Mahmod,”Security Analysis of Blowfish algorithm”,Informatics and Applications (ICIA),2013 Second International Conference [9].Dudhatra Nilesh, Prof. Malti Nagle,”The New Cryptography Algorithm with High Throughput”,2014 International Conference on Computer Communication and Informatics (ICCCI -2014) [10].M. Anand Kumar,Dr.S.Karthikeyan,”Investigating the Efficiency of Blowfish and Rejindael (AES) Algorithms”,2014 10th International Conference [11]. Katharina Krombholz, Peter Fr¨uhwirt, Thomas Rieder, Ioannis Kapsalis, Johanna Ullrich and Edgar Weippl,“QR Code Security”, 2015 10th International Conference on Availability, Reliability and Security
  • 23. REFERENCES (Cont.) [12]. Ms. Anu Mohan, Dr.P.KarthigaiKuma,“Survey on design of secured AES algorithm”,International Conference on Engineering Innovations and Solutions(ICEIS – 2016) [13].https://www.google.co.in/search? q=comparison+between+aes+des+and+blowfish&rlz=1C1CHBF_enIN748IN7 48&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiE74rBa- zWAhXJK48KHedyAT4Q_AUICigB&biw=1242&bih=602#imgrc=_UX 1ZsvKwykBwM: