The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
1. A PRESENTATION ON
“REPOSITORY FILE TRANSFER: A
NEW COMPOUND FILE ENCYPTION
TECHNIQUE”
SHUBHAM PATIL
patilshubham919@gmail.com
2. ABSTRACT
• Data security and protection is a field that protects digital privacy measures that are
used to prevent unauthorized access to computers and confidential data, databases
and websites. Corruption of data can be also prevented using data security. It is an
essential aspect of IT for organizations of every size and type.
• This paper focuses on how the data is been transferred from one user to another in
convenient and secure method by sing cryptography. Cryptology is the mathematics,
such as number theory, and the application of formulas and algorithms.
Synchronization between the user is been maintained by using the symmetric key for
the purpose of data cryptography.
• Hybridation of the algorithm is been done for purpose of increasing the security and
maintaining the integrity between user.
3. INTRODUCTION
Data security: protecting data, such as those in a database,from the unwanted actions
of unauthorized users.
Fig.1.Basic diagram of cryptography
4. INTRODUCTION (Cont.)
• Encryption is the process of transforming information so it is unintelligible to
anyone but the intended recipient. Decryption is the process of transforming
encrypted information so that it is intelligible again.
• Data security is one of the most important and challenging task around
the world.
• The sections that follow introduce the use of keys for encryption and decryption.
I. Symmetric-Key Encryption
II.Asymmetric-Key Encryption
• The key feature of our system is that the key for the decryption of files is
been converted in QR CODE and being transmitted to the receiver.
5. INTRODUCTION (Cont.)
• Algorithms used in our system:
1. BLOWFISH
2. AES
• Blowfish is a symmetric block cipher that can be used as a drop-in replacement
for DES. Since then it has been analyzed considerably, and it is slowly gaining
acceptance as a strong encryption algorithm.
• The more popular and widely adopted symmetric encryption algorithm likely to
be encountered nowadays is the Advanced Encryption Standard (AES). It is
found at least six time faster than triple DES.
6. LITERATURE SURVEY
PAPER 1:A comparative survey of symmetric and
asymmetric key cryptography
• In this paper they conclude the importance of network security and types
of keys explained in details.
• The concept of Symmetric and Asymmetric key, advantages of
asymmetric key (separate keys for encryption and decryption) and why
the asymmetric key is more effective than symmetric key.
• The concept of symmetric key in system ensure the end to end encryption
between sender and receiver.
7. LITERATURE SURVEY(Cont.)
PAPER 2: DES and AES Performance evalution
• This paper discribes cryptography which plays vital role in the security to
maintain the confidentiality, authentication and integrity.
• Two cryptographic algorithms are commonly used i.e AES and DES
where AES provides encryption to secure the data before transmission
and DES also provides security as AES.
• This paper explains the better throughput than other algorithm and
enhancement in key size.
8. LITERATURE SURVEY(Cont.)
PAPER 3: Enhanced Blowfish Algorithm for Image Encryption and
Decryption with Supplementary Key
• This system is based on blowfish algorithm.
• Encryption of multimedia files in efficient and secured method using
blowfish (128,442bits). The ability of algorithm to encrypt the larger size of
multimedia files such as images, voice clip etc. The variation of key
generation by the bits size available for encryption(32, 64,128,448 bits).
• The algorithm is to used for encrypting tht multimeia file beacuse of its
effective and stronger encryprion tecnique and its key expansion at most
448bits into several subkey arrays totaling 4168 bytes.
9. LITERATURE SURVEY(Cont.)
PAPER 4: Secure QR Code System
•As per this paper[4] the review contains the structure of QR code and
security algorithms for QR codes.
•This paper explains the QR code ( Quick Response Code) and its
trademark for a type of matrix barcode (or two-dimensional barcode) . A
barcode is in a form of machine-readable optical label that contains
information about the item to which it is attached.
•A QR code uses four standardized encoding modes (numeric,
alphanumeric, byte/binary, and kanji) to efficiently store data; extensions
may also be used.
10. Literature survey table
SR.NO TITLE AUTHOR DESCRIPTION
5 Secure File storage in
Cloud Computing using
Hybrid Cryptography
Algorithm (IEEE Wisp
NET 2016 conference.)
Punam V. Maitri,
Aruna Verma
Wireless file sharing using hybrid algorithm for
security purpose. The two-way encryption
mechanism explained. Symmetric keys used for
encryption and decryption. Wireless medium
used for key sharing and server as database for
providing security
6 A Performance
Comparison of Data
Encryption Algorithms
(IEEE 2014 conference.)
Aamer Nadeem,
Dr M. Younus
Javed
Detailed explanation of AES, DES, BLOWFISH
Algorithm and working of algorithm and bits
used for encryption. Comparison between AES,
DES, BLOWFISH. The advantage of blowfish
over DES & AES algorithm. The performance
evaluation of AES, BLOWFISH, DES algorithm
with the time complexity explained
7 Enhanced Security using
Hybrid Encryption
Algorithm(International
Journal of Innovative
Research in Compute
Engineering
Vol. 4, Issue 7, July 2016)
Neha, Mandeep
Kaur
M.Tech. Student,
Department of
Computer
Engineering
Variation of technique for more reliability of data
between users (Sender & receiver).
Improvement in security by hybriding of AES
and BLOWFISH Algorithm. Use of AES for Key
Encryption and BLOWFISH for Data or text
encryption. The security enhancement due to
hybridation of algorithm
11. SR
NO.
TITLE AUTHOR DESCRIPTION
8 Security Analysis of
Blowfish algorithm
(IEEE 2014
conference.)
Faudziah Ahmad
Ramlan Mahmod
Universiti Putra
Malaysia
Serdang, Malaysia
Concept of blowfish algorithm and its advantages over
DES algorithm. The detailed working of Blowfish
algorithm and its Encryption the substitution box working
and various combination and permutation done for
encrypting an data is been explained in detail in this
paper. The various bits size available for encrypting the
lager bits of data and how its key is ben generated in
unreadable format explained
9 The New
Cryptography
Algorithm with High
Throughput(2014
International
Conference on
Computer
Communication and
Informatics)
Dudhatra Nilesh,
Prof. Malti Nagle
Advantages of blowfish algorithm over another algorithm.
In this paper at first new cryptography (Encryption and
Decryption) algorithm has been generated and new
cryptography (Encryption and Decryption) algorithm has
been compared by using some components like
throughput of key generation, to generate Encryption text
and to generate Decryption text.
10 Investigating the
Efficiency of Blowfish
and Rejindael (AES)
Algorithms(Internation
al Conference on
Computing,
Communication and
Automation
(ICCCA2015))
M. Anand Kumar,
Dr.S.Karthikeyan
This paper presented the performance evaluation of two
commonly known symmetric cryptographic algorithms.
These algorithms are tested with different performance
metrics.It focuses on two commonly used symmetric
encryption algorithms such as Blowfish and
Rejindael.These algorithms are compared and
performance is evaluated.
12. SR.NO. TITLE AUTHOR DESCRIPTION
11 QR Code Security-How
Secure and Usable Apps
Can Protect Users Against
Malicious QR
Codes(2015 10th
International Conference
on Availability,
Reliability and Security)
Katharina
Krombholz, Peter
Fr¨uhwirt, Thomas
Rieder, Ioannis
Kapsalis, Johanna
Ullrich and Edgar
Weippl
Analysis of QR code security from a
holistic point of view and analysis of
why users are still susceptible to QR
code based attacks and why currently
deployed smartphone applications are
unable to mitigate these attacks. QR
codes have gained popularity as part of
the Internet of Things.
12 Survey on design of
secured AES
algorithm(International
Conference on
Engineering Innovations
and Solutions(ICEIS –
2016) )
Ms. Anu Mohan,
Dr.P.KarthigaiKu
ma
The AES algorithm provide security to
the data when its transmission. This
paper addresses various security
techniques in AES algorithm. The
security in AES can be done through
many ways such as complexity in the
key generation operations, pipelining
structures, iterarations levels, etc.
13. PROBLEM DEFINITION
• In previous studies they used SMS transmission concept but it is not much
efficient. It have some drawbacks like it is not more secure for transferring
the data for end-to-end encryption.
• We try to solve this drawback by using the QR code system which provides
more security. So we will try to improve the efficiency.
15. PROPOSED SYSTEM(Cont.)
As shown in figure 2.1 The system consists of three main components:
1.SENDER: It Selects the file from repository to be shared and sends it to the
server. And waits for the key to be received by the server. Once the key is being
transferred from server to sender it is been converted it in QR code.
2.SERVER: Server is responsible for receiving and storing the files from user1.
Once the key is being received by the sever encrypts the file using
algorithm(Blowfish) and sends the key to the user1(sender).
3.RECEIVER: It gets the key in the form of QR code which is been then decrypted
into reverse manner as used for encryption. Once the key is being decrypted from
QR code to textual form it is able to retrieve the data/file or message from server.
18. EXPECTED RESULTS
• The encryption(hybrid) technique used in proposed system are more secured then
the existing system, which helps to enhance security and confidentiality.
• The comparison of the algorithms is done with the help of following Parameters:
Time required
Performance
Average of data processed per second
[13].
Algorithm Data Time(seconds) Average Megabyte
per/second(approx.)
Performance
DES 256 mb 10-11 22-23 Low
AES 256 mb 5 51.2 Medium
BLOWFISH 256 mb 3.5-5 64 High
20. CONCLUSION
• Thus, in the proposed system we are implementing a secure file transfer
using hybridation of encryption algorithm which in result provides us the
enhanced security for transmission of files for one user to another.
• The drawback of previous system is being overcome and a secured
manner of transferring key by encrypting it into an QR code is been
achieved which increases the security and confidentiality.
21. REFERENCES
[1].Sourabh Chandra, Smita Paira,“A comparative survey of symmetric and
asymmetric key cryptography”, 2014 International Conference on
Electronics, Communication and Computational Engineering
[2].Bawna Bhat,Abdul Wahid Ali,Apurva Gupta,“DES and AES Performance
evaluation”, International Conference on Computing, Communication and
Automation (ICCCA2015)
[3].M. Mekala, K. Kanagalakshm,“Enhanced Blowfish Algorithm for Image
Encryption and Decryption with Supplementary Key”, International Journal of
Computer Applications
[4].Raed M.Bani-Hani,Yarub A,Wahsheh, Mohammad B. Al-Sarhan ,“Secure QR
Code System”, 2014 10th International Conference
[5]. Punam V. Maitri,Aruna Verma,”Secure File storage in Cloud Computing using
Hybrid Cryptography Algorithm”, IEEE WiSPNET 2016 conference
[6].Aamer Nadeem, Dr M. Younus Javed,”A Performance Comparison of Data
Encryption Algorithms”,Information and Communication Technologies,2005.First
International Conference
22. REFERENCES (Cont.)
[7].Neha, Mandeep Kaur,”Enhanced Security using Hybrid Encryption
Algorithm”,International Journal of Innovative Research in Computer and
Communication Engineering
[8].Faudziah Ahmad,Ramlan Mahmod,”Security Analysis of Blowfish
algorithm”,Informatics and Applications (ICIA),2013 Second International
Conference
[9].Dudhatra Nilesh, Prof. Malti Nagle,”The New Cryptography Algorithm with
High Throughput”,2014 International Conference on Computer Communication
and Informatics (ICCCI -2014)
[10].M. Anand Kumar,Dr.S.Karthikeyan,”Investigating the Efficiency of Blowfish
and Rejindael (AES) Algorithms”,2014 10th International Conference
[11]. Katharina Krombholz, Peter Fr¨uhwirt, Thomas Rieder, Ioannis Kapsalis,
Johanna Ullrich and Edgar Weippl,“QR Code Security”, 2015 10th International
Conference on Availability, Reliability and Security
23. REFERENCES (Cont.)
[12]. Ms. Anu Mohan, Dr.P.KarthigaiKuma,“Survey on design of secured AES
algorithm”,International Conference on Engineering Innovations and
Solutions(ICEIS – 2016)
[13].https://www.google.co.in/search?
q=comparison+between+aes+des+and+blowfish&rlz=1C1CHBF_enIN748IN7
48&source=lnms&tbm=isch&sa=X&ved=0ahUKEwiE74rBa-
zWAhXJK48KHedyAT4Q_AUICigB&biw=1242&bih=602#imgrc=_UX
1ZsvKwykBwM: