SlideShare a Scribd company logo
1 of 8
Download to read offline
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
DOI: 10.5121/ijci.2015.4212 125
APPLICATION OF CLASSICAL ENCRYPTION
TECHNIQUES FOR SECURING DATA- A THREADED
APPROACH
Raghu M E1
and Ravishankar K C2
1
Department of CSE, Government Engineering College, Hassan, Karnataka, India,
2
Department of CSE, Government Engineering College, Hassan, Karnataka, India,
ABSTRACT
The process of protecting information by transforming (encrypting) it into an unreadable format is called
cryptography. Only those who possess secret key can decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by cryptanalysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable, sometimes they also tend to attack.
As the Internet, big data, cloud data storage and other forms of electronic communication become more
prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail
messages, credit card information, corporate data, cloud data and big data so on... So there is a need for
best and fast cryptographic methods for protecting the data. In this paper a method is proposed to protect
the data in faster way by using classical cryptography. The encryption and decryption are done in parallel
using threads with the help of underlying hardware. The time taken by sequential and parallel method is
analysed.
KEYWORDS
Cloud, Data, Cryptography, Parallel cryptography, Threads.
1. INTRODUCTION
Cryptography (or cryptology) means “hidden secret” is the practice and study of techniques for
secure communication in the presence of third parties (called adversaries). More generally, it is
about constructing and analyzing protocols that overcome the influence of adversaries and which
are related to various aspects in information security such as data confidentiality, data integrity,
authentication, and non-repudiation [5, 6]. Modern cryptography intersects the disciplines of
mathematics, Computer Science and Electrical Engineering. Cryptography prior to the modern
age was effectively synonymous with encryption, the conversion of information from a readable
state to apparent nonsense. The originator of an encrypted message shared the decoding technique
needed to recover the original information only with intended recipients, thereby precluding
unwanted persons to do the same.
Modern cryptography is heavily based on mathematical theory and Computer Science practices.
Cryptographic algorithms are designed around computational hardness assumptions, making such
algorithms hard to break in practice by any adversary.
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
126
It is theoretically possible to break such a system but it is infeasible to do so by any known
practical means. These schemes are therefore termed computationally secure, theoretical
advances. Improvements in integer factorization algorithms and faster computing technology
require these solutions to be continually adapted [6]. There exist theoretically secure schemes that
provably cannot be broken even with unlimited computing power. An example is the one-time
pad. But these schemes are more difficult to implement than the best theoretically breakable but
computationally secure mechanisms.
Cryptography is the discipline, art and science of ensuring that data is secure from possible
attacks, whether these attacks be eavesdropping, impersonation or corruption. Cryptography
provides security through a number of mathematical transformations that can be proven to be
mathematically secure provided some optimum conditions. However there is a need to cognizant
that cryptography on its own is insufficient to ensure a high level of security within an
organization, that is to say that cryptography is not the silver bullet to solve all information
security issues and should be used in conjunction with good security practices. Cryptography, like
the Information Security field itself, is an incredibly broad field involving many existing
disciplines such as abstract algebra to provide mathematical proofs for the guaranteed correctness
of an algorithm, statistics for analysis of cryptographic.
Securing the information is done in sequential way using existing algorithms. It requires more
time to encrypt and decrypt the large data, so there is a need for parallel approach to do the same
in faster and secure manner. This paper proposes a method to secure large data using parallel
approach.
2. MOTIVATION
Why fast processing/parallel processing is so important for cryptography? The reason is that
many applications require fast cryptographic software and that even small speedups justify high
effort. Consider for example Internet content providers running large server farms. Encrypting all
transmitted data requires many computers that do nothing but perform cryptographic operations.
Even a speedup of only 10% of the software saves 10% of hardware and power cost. Also private
users benefit from fast cryptographic software. So there is a need for single computer to do all
work in parallel to provide cost effectiveness in hardware and fast processing of required work.
Here it is performing conversion of plain text to cipher text and vice versa.
The term parallel cryptography used here refers to the design and implementation of secure and
fast cryptographic functions for the present good hardware computers to perform cryptography in
fast and cost effective manner. The use of parallel processing enhances the speed of system when
compared to the traditional crypto systems. As we knew that hardware evolution is faster in
comparison with the present software evolution. It is possible to develop algorithm that make use
of available hardware facilities to perform the crypto operation more faster and cost effective
manner.
3. LITERATURE REVIEW
The literature review introduces and defines concepts relating to cryptography, issues relating to
cryptography need for parallel approach in the cryptography and the development of software
frameworks.
Karthikeyan S, Sairamn, Manikandan G, Sivaguru J [1] proposed a system which combines the
advantages of parallel processing and cryptographic algorithms. The use of parallel processing
enhances the speed of system when compared to the traditional crypto systems. In this approach
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
127
they have divided a file into two slices and have applied a single algorithm with different key for
each slice and the processing of the algorithm is done in a parallel environment. From the
experiments it is found out that the execution time of a cryptographic algorithm is considerably
reduced in a parallel environment when compared to the generic sequential methods.
Osama Khalifa [2] addresses the problem of enhancing the performance of strong cryptographic
algorithms, which are widely used and executed by almost all Internet users. The author used the
parallel computing as a means to improve the performance. Especially nowadays multi-core
computers are commonly available. Since the security level provided by most cryptographic
algorithms depends on the difficulty of solving some computational problems, the developments
in computer systems manufacturing will threaten people’s security. Thus, it is very important to
cope with this development and increase the security level by using stronger cryptographic
algorithms with longer keys which in return will take longer to encrypt and decrypt data but also a
much longer time to hack the cipher text. The resulted parallel algorithm(s) will be assessed by
measuring the scalability and speedup features, moreover, it will be able to adapt to the increasing
number of cores in a dynamic way.
Vinodh Gopal , Jim Guilford, Wajdi Feghali [3] Cryptographic algorithms, such as secure
encryption, occur in networking, storage and other applications. Since the amount of data being
processed is large and increasing at a rapid rate, there is an ever-increasing need for very high
performance implementations of these algorithms. The introduction of the 2nd Generation Intel®
Core™ processor family brings an additional substantial boost in performance on cryptographic
algorithms.
H. Naveen, M. Ramesh [4] By exploring different granularities of data-level and task-level
parallelism, they mapped implementations of an Advanced Encryption Standard (AES) cipher
with both on-line and off-line key expansion on a fine-grained many core system. The smallest
design utilizes only six cores for off-line key expansion and eight cores for on-line key expansion,
while the largest requires 107 and 137 cores, respectively. In comparison with published AES
cipher implementations on general purpose processors, the design has 3.5-15.6 times higher
throughput per unit of chip area and 8.2-18.1 times higher energy efficiency.
According to Salem Sherif Elfard[7] Cryptography is the only practical means to provide
security services and it is becoming a powerful tool in many applications for information security.
The intension of author is to give a parallel algorithm based on the linear Fibonacci forms method
and applying it on a modular reduction on addition machines and also a modular exponentiation
based on linear Fibonacci forms.
The method proposed by K C Ravishankar and M G Venkateshmurthy [8] on region permutation
deals with scrambling the regions of an image based on symmetric key. This is done in order to
introduce the disorderness in the visibility of an image. By doing permutation the regions are
trans-positioned to the new locations. The algorithm introduces the randomness and simple to
retrace back if key is known.
The literature review summarizes the need for fast and efficient crypto algorithm for present
applications. Due to present need it is necessary to have fast algorithm which performs the crypto
process in time efficient and secure manner, for this the best method is performing the crypto
operation in parallel using available hardware technology.
4. DESIGN
The encryption is a process of making plain text to cipher text and decryption is converting cipher
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
128
text to plain text. Doing the same in sequential way is always time consuming. This paper
proposed a method where the encryption and decryption is done in parallel way using threads.
In the proposed system the subdivision method is used. Here the data is divided into number of
small units called chunks using the subdivision algorithm and each chunk is of same size. Now
each chunk is moved to the threads, each thread takes chunk of data as input and encrypt the data
and gives the output. Output of each thread is collected to form the output file. Figure 1 shows the
whole process in the pictorial way.
Figure 1: Parallel Encryption using threads
Figure 2: Parallel Decryption using threads
The decryption is done in the reverse order. The cipher text is taken as input. First input is divided
into number of chunks and each chunk is taken as an input to thread. Thread decrypts the chunk of
cipher data using reverse process of encryption. Output of each thread is collected to form the
output file. Figure 2 shows the whole process in the pictorial way.
Plain Text
Subdivision
algorithm
Chunk1 Chunk2 Chunkn
PE1 PE2 PEn
Encrypted
File
Cipher text
Subdivision
algorithm
Chunk 1 Chunk 2 Chunk n
PE1 PE2 PE n
Decrypted
File
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
129
Here the method is tried on Caesar cipher method and transposition method on text file. The
implementation is done on sequential and parallel way for the same input file. The key selection is
done using user input.
Cp = Plain text + Kc (Key) Eq…. (1) for encryption process.
Plain text = Cp + Kc (Key) Eq… (2) for decryption process.
The above equation (1) and (2) shows how encryption and decryption in done using single key on
the given input text data.
5. IMPLEMENTATION
The implementation is done using python as a programming language. The main reason to select
python is, it open source, supports for parallel programming and easy to implement.
In sequential implementation the whole file is taken as input along with the key. The Caesar cipher
algorithm is applied and result of the same is written to output file. For the same output file
decryption is applied and obtained the plain text output. The time taken for both the processes is
recorded for comparison with parallel method.
The parallel implementation is done for encryption using threads. The implementation steps are as
given bellow.
Step 1: Read the given plaintext file.
Step 2: Split the file into number of chunks.
Step 3: Create the threads and assign each chunks to the created threads.
Step4: All the chunks are encrypted in parallel using threads.
Step5: Write the result to a new file which is an encrypted file.
Given plaintext file is divided into number of chunks and each chunk is assigned to individual
thread. Content of each thread is encrypted separately. Finally, outputs of all the threads are
combined together and the result is written to a new file which is an encrypted file (cipher text).
The parallel implementation is done for decryption using threads. The implementation steps are as
given bellow.
Step 1: Read the given cipher text file.
Step 2: Split the file into number of chunks.
Step 3: Create the threads and assign each chunks to the created threads.
Step 4: All the chunks are decrypted in parallel using threads.
Step 5:Write the result to a new file which is a decrypted file.
The cipher text file is divided into number of chunks and each chunk is assigned to individual
thread. Content of each thread is decrypted separately, finally outputs of all threads are combined
together and the result is written to a new file which is a decrypted file (plain text). Time taken is
recorded for comparison.
The times recorded for sequential and parallel method are compared. The comparison results that,
parallel process is much faster than the sequential process. It is observed that the parallel process
is faster, but it works fine for limited number of threads. If thread number exceeds some limit, it
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
130
gives worst performance when compared with the sequential processing in limited number of
cores. It is possible to overcome this by using more number of cores.
6. RESULTS AND ANALYSIS
The sequential method takes more time as the size of file is increased. When it goes to some
particular stage, it will become constant and it will not change. The same method has been
implemented using threads, where it is observed that performance is improved compared to
sequential method. Using threads execution time can be reduced such that it reduces half of time
compared to the sequential execution up to some extent, but as the number of threads increases
the performance will be degraded. The input text is as shown in the figure 3 and the encrypted
text is as shown in the figure 4 and the figure 5 shows the decrypted text after the decryption.
This is shown in the figure 6 and more threads will leads to thread overhead. The figure 6 shows
the same performance when the numbers of threads are 32 and if threads are 64 it takes more time
than sequential execution.
Figure 3: Plain text
Figure 4 : Cipher text
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
131
Figure 5: Decipher text
Figure 6: Comparison of Sequential vs parallel crypto
7. CONCLUSION
This paper provides implementation of encryption and decryption algorithm for text file using
different cryptographic method using python as programming language. The encryption and
decryption are implemented for Caesar cipher and subdivision algorithm. The time taken by
sequential and parallel methods suggests that, using threads it is possible to achieve parallelism to
improve the performance of encryption algorithms. The same comparison may be done for
different algorithms and for different input formats.
REFERENCES
[1] Karthikeyan .S, Sairamn, Manikandan .G, Sivaguru J, “A Parallel Approach for Improving Data
Security”, Journal of Theoretical and Applied Information Technology , Vol. 39 No.2, 15 May 2012,
p . no 119-125.
[2] Osama Khalifa [2] “ The performance of cryptographic algorithms in the age of Parallel computing”,
M.sc thesis, August-2011, Heriot Watt University School Of Mathematical and Computer Science.
[3] Vinodh Gopal , Jim Guilford, Wajdi Feghali, “Cryptographic Performance on the 2nd Generation
Intel® Core™ processor family”, white paper - 2011.
[4] H. Naveen, M. Ramesh [4] “Parallel AES Encryption Engines for Many-Core Processor Arrays”,
International Journal of Innovative Research in Computer and Communication Engineering, (An ISO
3297: 2007 Certified Organization) Vol.2, Special Issue 1, March 2014
[5] M. Tahghighi, S. Turaev, R. Mahmod, A. Jafaar and M. Md. Said, "The Cryptanalysis and Extension
of the Generalized Golden Cryptography", IEEE conference on open system, September 2011,
Lankawi, Malaysia.
International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015
132
[6] Joseph Raphael, Dr. V. Sundaram, "Secured Communication through Fibonacci Numbers and
Unicode Symbols", International Journal of Scientific & Engineering Research, Volume 3, Issue 4,
April-2012, ISSN 2229-5518.
[7] Salem Sherif Elfard. “University Bulletin – ISSUE “ No.- 15 – Vol . 2- 2013
[8] K C Ravishankar and M G Venkateshmurthy, “ Pixel Compaction and Encryption for Secure Image
Transmission” , National Conference on Intelligent Data Analytics and Pattern Discovery -2007, BIT
Sathyamangalam, March 15-16, 2007.
AUTHORS
Mr. Raghu M E has got B.E. from UBDTCE, Davangere in 1998, M.Tech from JNNCE,
Shivamogga, in 2003. He served at BCE from 2000-2003 and in JNNCE, Shimoga,
Karnataka India from 2003-2010. He is currently serving as Associate Professor of CSE in
GEC, Hassan. His areas of interest include Cryptography, Compiler Designs, Image
Processing and Computer Graphics. He has 3 International and 3 national publications to
his credit.
K. C. Ravishankar has got his B.E. from MCE, Hassan in 1990, M.Tech from IIT,
Delhi in 1998 and Ph.D. from Visvesvaraya Technological University in 2009. He has
served at Malnad College of Engineering, Hassan, and Karnataka India from 1990-2010.
He is currently serving as Professor and Head of CSE in GEC, Hassan. His areas of
interest include Databases, Image Processing and Cryptography. He has 4 International
and 12 national Publications to his credit. He is Guiding 4 PhD students.

More Related Content

What's hot

A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYcsandit
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET Journal
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityEditor IJCATR
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...WilliamY3
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 malaOyeniyi Samuel
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGIJNSA Journal
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEAM Publications,India
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganographyvivatechijri
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computingINFOGAIN PUBLICATION
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...IRJET Journal
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiIAEME Publication
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingIGEEKS TECHNOLOGIES
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyIRJET Journal
 

What's hot (20)

www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHYA SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
A SURVEY ON RECENT APPROACHES COMBINING CRYPTOGRAPHY AND STEGANOGRAPHY
 
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
IRJET- An Implementation of Secured Data Integrity Technique for Cloud Storag...
 
Location Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data SecurityLocation Based Encryption-Decryption Approach for Data Security
Location Based Encryption-Decryption Approach for Data Security
 
IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...Improved Image Encryption for Real-Time Application over Wireless Communicati...
Improved Image Encryption for Real-Time Application over Wireless Communicati...
 
A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...A neural cryptography approach for digital image security using vigenere ciph...
A neural cryptography approach for digital image security using vigenere ciph...
 
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
 
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERINGHYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
HYBRID CHAOTIC METHOD FOR MEDICAL IMAGES CIPHERING
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGEHYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
HYBRID CRYPTOSYSTEM FOR SECURE DATA STORAGE
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
survey paper on cp abe cloud computing
survey paper on cp abe cloud computingsurvey paper on cp abe cloud computing
survey paper on cp abe cloud computing
 
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
A Survey on Secure and Dynamic Multi-Keyword Ranked Search Scheme over Encryp...
 
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUD
 
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunkiTransmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
 
Efficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computingEfficient authentication for mobile and pervasive computing
Efficient authentication for mobile and pervasive computing
 
Cloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve CryptographyCloud Data Security using Elliptic Curve Cryptography
Cloud Data Security using Elliptic Curve Cryptography
 

Viewers also liked

MENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam Ahmad
MENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam AhmadMENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam Ahmad
MENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam AhmadAhmadi Muslim
 
Hands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainSplunk
 
Citrus Vega Brochure - Zricks.com
Citrus Vega Brochure - Zricks.comCitrus Vega Brochure - Zricks.com
Citrus Vega Brochure - Zricks.comZricks.com
 
Factors that can affect your mortgage application
Factors that can affect your mortgage applicationFactors that can affect your mortgage application
Factors that can affect your mortgage applicationAll Western Mortgage
 
công ty thiết kế tvc quảng cáo 3d
công ty thiết kế tvc quảng cáo 3dcông ty thiết kế tvc quảng cáo 3d
công ty thiết kế tvc quảng cáo 3dkarleen209
 
How To Register On Amazon
How To Register On AmazonHow To Register On Amazon
How To Register On Amazonshetobias
 
In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...hollybeaty
 
Barahin e Ahmadiyya Aur Muqadma Azam-Ul-Kalam
Barahin e Ahmadiyya Aur Muqadma Azam-Ul-KalamBarahin e Ahmadiyya Aur Muqadma Azam-Ul-Kalam
Barahin e Ahmadiyya Aur Muqadma Azam-Ul-KalamAhmadi Muslim
 
Tutorial Photoshop Text Berbayang
Tutorial Photoshop Text BerbayangTutorial Photoshop Text Berbayang
Tutorial Photoshop Text BerbayangIkki Steinberg
 
Honda Training Certificate
Honda Training CertificateHonda Training Certificate
Honda Training CertificateAryan Yadav
 
Article: From Best Practice to Success Transfer
Article:  From Best Practice to Success TransferArticle:  From Best Practice to Success Transfer
Article: From Best Practice to Success Transferrepner
 
10 dias para cunha
10 dias para cunha10 dias para cunha
10 dias para cunhaRadar News
 
7 Habits Of Successful Teens
7 Habits Of Successful Teens7 Habits Of Successful Teens
7 Habits Of Successful TeensDevon
 
Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...
Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...
Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...Mikhail Galushko
 

Viewers also liked (18)

MENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam Ahmad
MENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam AhmadMENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam Ahmad
MENGHAPUS SUATU KESALAH PAHAMAN Oleh Hadhrat Mirza Ghulam Ahmad
 
Hands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill ChainHands-On Security - Disrupting the Kill Chain
Hands-On Security - Disrupting the Kill Chain
 
Citrus Vega Brochure - Zricks.com
Citrus Vega Brochure - Zricks.comCitrus Vega Brochure - Zricks.com
Citrus Vega Brochure - Zricks.com
 
Factors that can affect your mortgage application
Factors that can affect your mortgage applicationFactors that can affect your mortgage application
Factors that can affect your mortgage application
 
công ty thiết kế tvc quảng cáo 3d
công ty thiết kế tvc quảng cáo 3dcông ty thiết kế tvc quảng cáo 3d
công ty thiết kế tvc quảng cáo 3d
 
How To Register On Amazon
How To Register On AmazonHow To Register On Amazon
How To Register On Amazon
 
In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...In what ways does your media product use, develop or challenge forms and conv...
In what ways does your media product use, develop or challenge forms and conv...
 
Barahin e Ahmadiyya Aur Muqadma Azam-Ul-Kalam
Barahin e Ahmadiyya Aur Muqadma Azam-Ul-KalamBarahin e Ahmadiyya Aur Muqadma Azam-Ul-Kalam
Barahin e Ahmadiyya Aur Muqadma Azam-Ul-Kalam
 
Tutorial Photoshop Text Berbayang
Tutorial Photoshop Text BerbayangTutorial Photoshop Text Berbayang
Tutorial Photoshop Text Berbayang
 
Honda Training Certificate
Honda Training CertificateHonda Training Certificate
Honda Training Certificate
 
David Guetta
David GuettaDavid Guetta
David Guetta
 
Article: From Best Practice to Success Transfer
Article:  From Best Practice to Success TransferArticle:  From Best Practice to Success Transfer
Article: From Best Practice to Success Transfer
 
Bułgaria
BułgariaBułgaria
Bułgaria
 
10 dias para cunha
10 dias para cunha10 dias para cunha
10 dias para cunha
 
Media Relations For PR Playbook 3rd Edition
Media Relations For PR Playbook 3rd EditionMedia Relations For PR Playbook 3rd Edition
Media Relations For PR Playbook 3rd Edition
 
7 Habits Of Successful Teens
7 Habits Of Successful Teens7 Habits Of Successful Teens
7 Habits Of Successful Teens
 
Yolygambas
YolygambasYolygambas
Yolygambas
 
Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...
Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...
Записная книжка мистера Томпкинса (из книги Тома Демарко "Deadline: роман об ...
 

Similar to A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA - A T HREADED A PPROACH

Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computingijtsrd
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)JIEMS Akkalkuwa
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...dbpublications
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature surveyIJECEIAES
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation ofcaijjournal
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...IOSR Journals
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...IJECEIAES
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmEditor IJMTER
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448IJRAT
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYIRJET Journal
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...AJASTJournal
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentIJNSA Journal
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTIJNSA Journal
 

Similar to A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA - A T HREADED A PPROACH (20)

Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
4.report (cryptography & computer network)
4.report (cryptography & computer network)4.report (cryptography & computer network)
4.report (cryptography & computer network)
 
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
Role Based Access Control Model (RBACM) With Efficient Genetic Algorithm (GA)...
 
Cloud security: literature survey
Cloud security: literature surveyCloud security: literature survey
Cloud security: literature survey
 
N45028390
N45028390N45028390
N45028390
 
Parc4 i parallel implementation of
Parc4 i  parallel implementation ofParc4 i  parallel implementation of
Parc4 i parallel implementation of
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...Comparison of Various Encryption Algorithms and Techniques for improving secu...
Comparison of Various Encryption Algorithms and Techniques for improving secu...
 
L017136269
L017136269L017136269
L017136269
 
Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...Efficient two-stage cryptography scheme for secure distributed data storage i...
Efficient two-stage cryptography scheme for secure distributed data storage i...
 
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin AlgorithmA Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
A Location Based Cryptosystem For Mobile Devices Using Improved Rabin Algorithm
 
Paper id 27201448
Paper id 27201448Paper id 27201448
Paper id 27201448
 
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITYCRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
CRYPTOGRAPHY ALGORITHMS FOR WEB SECURITY
 
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
Mitigating the Integrity Issues in Cloud Computing Utilizing Cryptography Alg...
 
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
IRJET - A Novel Approach Implementing Deduplication using Message Locked Encr...
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
Accessing secured data in cloud computing environment
Accessing secured data in cloud computing environmentAccessing secured data in cloud computing environment
Accessing secured data in cloud computing environment
 
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENTACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
ACCESSING SECURED DATA IN CLOUD COMPUTING ENVIRONMENT
 

Recently uploaded

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 

Recently uploaded (20)

High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 

A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA - A T HREADED A PPROACH

  • 1. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 DOI: 10.5121/ijci.2015.4212 125 APPLICATION OF CLASSICAL ENCRYPTION TECHNIQUES FOR SECURING DATA- A THREADED APPROACH Raghu M E1 and Ravishankar K C2 1 Department of CSE, Government Engineering College, Hassan, Karnataka, India, 2 Department of CSE, Government Engineering College, Hassan, Karnataka, India, ABSTRACT The process of protecting information by transforming (encrypting) it into an unreadable format is called cryptography. Only those who possess secret key can decipher (decrypt) the message into plain text. Encrypted messages can sometimes be broken by cryptanalysis, also called code breaking, so there is a need for strong and fast cryptographic methods for securing the data from attackers. Although modern cryptography techniques are virtually unbreakable, sometimes they also tend to attack. As the Internet, big data, cloud data storage and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, corporate data, cloud data and big data so on... So there is a need for best and fast cryptographic methods for protecting the data. In this paper a method is proposed to protect the data in faster way by using classical cryptography. The encryption and decryption are done in parallel using threads with the help of underlying hardware. The time taken by sequential and parallel method is analysed. KEYWORDS Cloud, Data, Cryptography, Parallel cryptography, Threads. 1. INTRODUCTION Cryptography (or cryptology) means “hidden secret” is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analyzing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation [5, 6]. Modern cryptography intersects the disciplines of mathematics, Computer Science and Electrical Engineering. Cryptography prior to the modern age was effectively synonymous with encryption, the conversion of information from a readable state to apparent nonsense. The originator of an encrypted message shared the decoding technique needed to recover the original information only with intended recipients, thereby precluding unwanted persons to do the same. Modern cryptography is heavily based on mathematical theory and Computer Science practices. Cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary.
  • 2. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 126 It is theoretically possible to break such a system but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure, theoretical advances. Improvements in integer factorization algorithms and faster computing technology require these solutions to be continually adapted [6]. There exist theoretically secure schemes that provably cannot be broken even with unlimited computing power. An example is the one-time pad. But these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms. Cryptography is the discipline, art and science of ensuring that data is secure from possible attacks, whether these attacks be eavesdropping, impersonation or corruption. Cryptography provides security through a number of mathematical transformations that can be proven to be mathematically secure provided some optimum conditions. However there is a need to cognizant that cryptography on its own is insufficient to ensure a high level of security within an organization, that is to say that cryptography is not the silver bullet to solve all information security issues and should be used in conjunction with good security practices. Cryptography, like the Information Security field itself, is an incredibly broad field involving many existing disciplines such as abstract algebra to provide mathematical proofs for the guaranteed correctness of an algorithm, statistics for analysis of cryptographic. Securing the information is done in sequential way using existing algorithms. It requires more time to encrypt and decrypt the large data, so there is a need for parallel approach to do the same in faster and secure manner. This paper proposes a method to secure large data using parallel approach. 2. MOTIVATION Why fast processing/parallel processing is so important for cryptography? The reason is that many applications require fast cryptographic software and that even small speedups justify high effort. Consider for example Internet content providers running large server farms. Encrypting all transmitted data requires many computers that do nothing but perform cryptographic operations. Even a speedup of only 10% of the software saves 10% of hardware and power cost. Also private users benefit from fast cryptographic software. So there is a need for single computer to do all work in parallel to provide cost effectiveness in hardware and fast processing of required work. Here it is performing conversion of plain text to cipher text and vice versa. The term parallel cryptography used here refers to the design and implementation of secure and fast cryptographic functions for the present good hardware computers to perform cryptography in fast and cost effective manner. The use of parallel processing enhances the speed of system when compared to the traditional crypto systems. As we knew that hardware evolution is faster in comparison with the present software evolution. It is possible to develop algorithm that make use of available hardware facilities to perform the crypto operation more faster and cost effective manner. 3. LITERATURE REVIEW The literature review introduces and defines concepts relating to cryptography, issues relating to cryptography need for parallel approach in the cryptography and the development of software frameworks. Karthikeyan S, Sairamn, Manikandan G, Sivaguru J [1] proposed a system which combines the advantages of parallel processing and cryptographic algorithms. The use of parallel processing enhances the speed of system when compared to the traditional crypto systems. In this approach
  • 3. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 127 they have divided a file into two slices and have applied a single algorithm with different key for each slice and the processing of the algorithm is done in a parallel environment. From the experiments it is found out that the execution time of a cryptographic algorithm is considerably reduced in a parallel environment when compared to the generic sequential methods. Osama Khalifa [2] addresses the problem of enhancing the performance of strong cryptographic algorithms, which are widely used and executed by almost all Internet users. The author used the parallel computing as a means to improve the performance. Especially nowadays multi-core computers are commonly available. Since the security level provided by most cryptographic algorithms depends on the difficulty of solving some computational problems, the developments in computer systems manufacturing will threaten people’s security. Thus, it is very important to cope with this development and increase the security level by using stronger cryptographic algorithms with longer keys which in return will take longer to encrypt and decrypt data but also a much longer time to hack the cipher text. The resulted parallel algorithm(s) will be assessed by measuring the scalability and speedup features, moreover, it will be able to adapt to the increasing number of cores in a dynamic way. Vinodh Gopal , Jim Guilford, Wajdi Feghali [3] Cryptographic algorithms, such as secure encryption, occur in networking, storage and other applications. Since the amount of data being processed is large and increasing at a rapid rate, there is an ever-increasing need for very high performance implementations of these algorithms. The introduction of the 2nd Generation Intel® Core™ processor family brings an additional substantial boost in performance on cryptographic algorithms. H. Naveen, M. Ramesh [4] By exploring different granularities of data-level and task-level parallelism, they mapped implementations of an Advanced Encryption Standard (AES) cipher with both on-line and off-line key expansion on a fine-grained many core system. The smallest design utilizes only six cores for off-line key expansion and eight cores for on-line key expansion, while the largest requires 107 and 137 cores, respectively. In comparison with published AES cipher implementations on general purpose processors, the design has 3.5-15.6 times higher throughput per unit of chip area and 8.2-18.1 times higher energy efficiency. According to Salem Sherif Elfard[7] Cryptography is the only practical means to provide security services and it is becoming a powerful tool in many applications for information security. The intension of author is to give a parallel algorithm based on the linear Fibonacci forms method and applying it on a modular reduction on addition machines and also a modular exponentiation based on linear Fibonacci forms. The method proposed by K C Ravishankar and M G Venkateshmurthy [8] on region permutation deals with scrambling the regions of an image based on symmetric key. This is done in order to introduce the disorderness in the visibility of an image. By doing permutation the regions are trans-positioned to the new locations. The algorithm introduces the randomness and simple to retrace back if key is known. The literature review summarizes the need for fast and efficient crypto algorithm for present applications. Due to present need it is necessary to have fast algorithm which performs the crypto process in time efficient and secure manner, for this the best method is performing the crypto operation in parallel using available hardware technology. 4. DESIGN The encryption is a process of making plain text to cipher text and decryption is converting cipher
  • 4. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 128 text to plain text. Doing the same in sequential way is always time consuming. This paper proposed a method where the encryption and decryption is done in parallel way using threads. In the proposed system the subdivision method is used. Here the data is divided into number of small units called chunks using the subdivision algorithm and each chunk is of same size. Now each chunk is moved to the threads, each thread takes chunk of data as input and encrypt the data and gives the output. Output of each thread is collected to form the output file. Figure 1 shows the whole process in the pictorial way. Figure 1: Parallel Encryption using threads Figure 2: Parallel Decryption using threads The decryption is done in the reverse order. The cipher text is taken as input. First input is divided into number of chunks and each chunk is taken as an input to thread. Thread decrypts the chunk of cipher data using reverse process of encryption. Output of each thread is collected to form the output file. Figure 2 shows the whole process in the pictorial way. Plain Text Subdivision algorithm Chunk1 Chunk2 Chunkn PE1 PE2 PEn Encrypted File Cipher text Subdivision algorithm Chunk 1 Chunk 2 Chunk n PE1 PE2 PE n Decrypted File
  • 5. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 129 Here the method is tried on Caesar cipher method and transposition method on text file. The implementation is done on sequential and parallel way for the same input file. The key selection is done using user input. Cp = Plain text + Kc (Key) Eq…. (1) for encryption process. Plain text = Cp + Kc (Key) Eq… (2) for decryption process. The above equation (1) and (2) shows how encryption and decryption in done using single key on the given input text data. 5. IMPLEMENTATION The implementation is done using python as a programming language. The main reason to select python is, it open source, supports for parallel programming and easy to implement. In sequential implementation the whole file is taken as input along with the key. The Caesar cipher algorithm is applied and result of the same is written to output file. For the same output file decryption is applied and obtained the plain text output. The time taken for both the processes is recorded for comparison with parallel method. The parallel implementation is done for encryption using threads. The implementation steps are as given bellow. Step 1: Read the given plaintext file. Step 2: Split the file into number of chunks. Step 3: Create the threads and assign each chunks to the created threads. Step4: All the chunks are encrypted in parallel using threads. Step5: Write the result to a new file which is an encrypted file. Given plaintext file is divided into number of chunks and each chunk is assigned to individual thread. Content of each thread is encrypted separately. Finally, outputs of all the threads are combined together and the result is written to a new file which is an encrypted file (cipher text). The parallel implementation is done for decryption using threads. The implementation steps are as given bellow. Step 1: Read the given cipher text file. Step 2: Split the file into number of chunks. Step 3: Create the threads and assign each chunks to the created threads. Step 4: All the chunks are decrypted in parallel using threads. Step 5:Write the result to a new file which is a decrypted file. The cipher text file is divided into number of chunks and each chunk is assigned to individual thread. Content of each thread is decrypted separately, finally outputs of all threads are combined together and the result is written to a new file which is a decrypted file (plain text). Time taken is recorded for comparison. The times recorded for sequential and parallel method are compared. The comparison results that, parallel process is much faster than the sequential process. It is observed that the parallel process is faster, but it works fine for limited number of threads. If thread number exceeds some limit, it
  • 6. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 130 gives worst performance when compared with the sequential processing in limited number of cores. It is possible to overcome this by using more number of cores. 6. RESULTS AND ANALYSIS The sequential method takes more time as the size of file is increased. When it goes to some particular stage, it will become constant and it will not change. The same method has been implemented using threads, where it is observed that performance is improved compared to sequential method. Using threads execution time can be reduced such that it reduces half of time compared to the sequential execution up to some extent, but as the number of threads increases the performance will be degraded. The input text is as shown in the figure 3 and the encrypted text is as shown in the figure 4 and the figure 5 shows the decrypted text after the decryption. This is shown in the figure 6 and more threads will leads to thread overhead. The figure 6 shows the same performance when the numbers of threads are 32 and if threads are 64 it takes more time than sequential execution. Figure 3: Plain text Figure 4 : Cipher text
  • 7. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 131 Figure 5: Decipher text Figure 6: Comparison of Sequential vs parallel crypto 7. CONCLUSION This paper provides implementation of encryption and decryption algorithm for text file using different cryptographic method using python as programming language. The encryption and decryption are implemented for Caesar cipher and subdivision algorithm. The time taken by sequential and parallel methods suggests that, using threads it is possible to achieve parallelism to improve the performance of encryption algorithms. The same comparison may be done for different algorithms and for different input formats. REFERENCES [1] Karthikeyan .S, Sairamn, Manikandan .G, Sivaguru J, “A Parallel Approach for Improving Data Security”, Journal of Theoretical and Applied Information Technology , Vol. 39 No.2, 15 May 2012, p . no 119-125. [2] Osama Khalifa [2] “ The performance of cryptographic algorithms in the age of Parallel computing”, M.sc thesis, August-2011, Heriot Watt University School Of Mathematical and Computer Science. [3] Vinodh Gopal , Jim Guilford, Wajdi Feghali, “Cryptographic Performance on the 2nd Generation Intel® Core™ processor family”, white paper - 2011. [4] H. Naveen, M. Ramesh [4] “Parallel AES Encryption Engines for Many-Core Processor Arrays”, International Journal of Innovative Research in Computer and Communication Engineering, (An ISO 3297: 2007 Certified Organization) Vol.2, Special Issue 1, March 2014 [5] M. Tahghighi, S. Turaev, R. Mahmod, A. Jafaar and M. Md. Said, "The Cryptanalysis and Extension of the Generalized Golden Cryptography", IEEE conference on open system, September 2011, Lankawi, Malaysia.
  • 8. International Journal on Cybernetics & Informatics (IJCI) Vol. 4, No. 2, April 2015 132 [6] Joseph Raphael, Dr. V. Sundaram, "Secured Communication through Fibonacci Numbers and Unicode Symbols", International Journal of Scientific & Engineering Research, Volume 3, Issue 4, April-2012, ISSN 2229-5518. [7] Salem Sherif Elfard. “University Bulletin – ISSUE “ No.- 15 – Vol . 2- 2013 [8] K C Ravishankar and M G Venkateshmurthy, “ Pixel Compaction and Encryption for Secure Image Transmission” , National Conference on Intelligent Data Analytics and Pattern Discovery -2007, BIT Sathyamangalam, March 15-16, 2007. AUTHORS Mr. Raghu M E has got B.E. from UBDTCE, Davangere in 1998, M.Tech from JNNCE, Shivamogga, in 2003. He served at BCE from 2000-2003 and in JNNCE, Shimoga, Karnataka India from 2003-2010. He is currently serving as Associate Professor of CSE in GEC, Hassan. His areas of interest include Cryptography, Compiler Designs, Image Processing and Computer Graphics. He has 3 International and 3 national publications to his credit. K. C. Ravishankar has got his B.E. from MCE, Hassan in 1990, M.Tech from IIT, Delhi in 1998 and Ph.D. from Visvesvaraya Technological University in 2009. He has served at Malnad College of Engineering, Hassan, and Karnataka India from 1990-2010. He is currently serving as Professor and Head of CSE in GEC, Hassan. His areas of interest include Databases, Image Processing and Cryptography. He has 4 International and 12 national Publications to his credit. He is Guiding 4 PhD students.