SlideShare a Scribd company logo
1 of 7
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1139
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC
ALGORITHM: A NOVEL APPROACH
Akkimsetti Purna Veera Manindra
Dept. of Computer Science Engineering, School of SOC SASTRA University, Thanjavur, Tamil Nadu, INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - Electronic mail contains confidential
information such as transaction details, fund transfer
information, personal details, security numbers, etc. There is
a high chance that the data can be well exposed during
transmission over the internet, so there exists always the
possibility of theft or manipulating the data. In this paper, A
new mathematical algorithm of public-key encryption
which encrypts the data using mathematical concepts like
matrix properties is developed and analyzed to ensure
secure electronic mail communication. This algorithm
enciphers the email data into a matrix and retrieves the
original data by decrypting the encrypted data. The
performance of algorithms and data ciphering is also
evaluated.
Key Words: - Electronic mail, enciphering, deciphering,
Matrix, key generation
1. INTRODUCTION
In the modern-day world, E-Mail has become the most
common way of communication between the user and
clients over public channels. With an exponential increase
in emails, there is a high risk of getting into unintended
recipients. Cryptography can be defined as a methodology
that ciphers the data, using different mathematical
algorithms that make the data indecipherable unless
deciphered by an intended user. By default, emails are not
end-to-end encrypted [9].
There are majorly two types of ciphering algorithms,
symmetric and asymmetric ciphering. In symmetric
ciphering keys for both encryption and decryption
processes are the same whereas asymmetric ciphering of
different keys are used i.e., the public key and private key
where both are related mathematically [7]. Asymmetric
encryption is also known as public-key encryption. Block
cipher and Stream cipher are most popular in data
encryption affiliated to Symmetric key cipher. Block
ciphers were first developed by Claude Shannon in 1949
[17], improving security using replacements and
permutations using 64 bits. It works on transposition
approaches like columnar transposition technique, rail-
fence cipher. Electronic Code Book (ECB), Cipher Block
Chaining (CBC) are the algorithm modes used by block
cipher [18]. Gilbert Sandford Vernam 1917, developed an
additive polyalphabetic stream cipher in which key is
combined character by character with the text to produce
the ciphertext [19]. It toils on substitutions approaches
like Polygram substitution cipher and Caesar cipher.
Cipher Feedback and Output Feedback are some
algorithms used in stream ciphers. Twofish algorithm uses
symmetric encryption, considered as one of the fastest
ciphering algorithms, requires 256-bit keys for encryption
used for both Software and Hardware environments.
Diffie-Hellman key exchange was one of the popular key
exchange protocols is a method of exchanging the public
keys over a public server as it is a non-authenticated key
agreement protocol ,used to serve forward secrecy[8],
Elliptical curve cryptograph (ECC) is a key based
technique for ciphering the data often discussed in the
context of RSA Algorithm developed in 1977 [12], Rivest –
Shamir-Adleman (RSA) one way enciphering of things like
electronic-mail, data, software using factorization, El
Gamal, DSA developed by Ron Rivest and Adi Shamir et al
[13] are some encryption algorithms. Apart from these
another popular technique is hashing developed by Ron
Rivest in 1989. A unique way of ciphering which is
different from encryption and decryption. Hashing is an
irreversible process (the original data cannot be retrieved
back), uses a hash algorithm to store the data with a
unique hash value .it plays an important role in Banking
applications like password management and other block
chain applications [20].
A SEGPX distributed search engine was developed by Lu
and Geva [18] for secure email communication. It uses
X.50 public key attribute frameworks which utilizes email
channels for data transmission. Jain, Gosavi [22] encrypted
using variable key and compress the data using code book,
compressed messages must be encrypted to maintain
secure email. With compression of messages the overload
of traffic over the channel will get reduced. A proxy based
secure electronic mail system using IBE Cryptography was
developed by Chen and Ma [11]. In Linux platform for
secure email communication Madi [20] proposed a simple
implementation that uses local based email transfer agent.
To improve security in email infrastructure Choukse and
others explain weakness in immanent methodologies and
highlighted good and weak practices in email design. A
point-to-point email ciphering protocol and an identity
based on one-way key agreement was introduced by Yeh
[26]. For secure email communication Ojamaa and Lind
[21] developed a solution based on public key ciphering
and OpenPGP to the users. Hill cipher developed a
substitution cipher in 1929, in which each element in the
text is substituted with a number in Z26 [14]. Leon Battista
Alberti ,1947 developed a polyalphabetic cipher for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1140
encryption in which text is segregated and then
substituted with suitable keys. He also presented Cipher
disk for encryption. Vigenère cipher also uses the simple
form of polyalphabetic substitution, encryption is done
using Vigenère table in which letters written out 26 times
in divergent rows.
Public key cryptography was developed by Martin
Hellman, Ralph Merkle, and Whitfield Diffie at Stanford
University in 1976 [16]. In Public key encryption, public
key is public to everyone and private key belongs to the
recipient who create these keys. Initially recipient
generates the public and private key pair in which public
key public to everyone and the sender use the public key
for encryption and send the data over the server, on the
other end receiver uses the private key for decipher the
data. Authentication helps in securing the keys from
hackers.
End-to end encryption uses public key cryptography as
data is enciphered and deciphered only at the end points.
when the sent an email with an it enciphered at the source
and again it deciphered at its end point, and it is
unreadable in during transmission in public servers [10].
The prime solutions are available now that provides end
to end encryption for electronic mail are Secure Internet
Mail Extension (SIME), pretty good privacy (PGP), are
using public key encryption [11].
Fig 1. working of public key encryption and decryption
In this paper a new key generation algorithm in public key
encryption is developed and analyzed to encrypt and
decrypt the data.
Fig 2. E-mail transmission through public server
2. EXIGENCY OF EMAIL CIPHERING:
Since our sensitive information is being communicated
through email, it's a cardinal thing to secure the data. In
recent years, security has become the main concern for
everyone, there are so many ways for a third-party
recipient for bypassing the data. Attacks like phishing,
Man-in-the-middle are the most common email hacking
techniques and other attacks like Spyware, Spam, Adware,
are some E-mail attacks [14], and also E-mails exposed to
both passive and active threats. passive threats like traffic
analysis, snooping and exposing the data while the active
threats include mitigating the data and Denial of service
(DoS & DDoS) etc. So, the data should be protected from
being exposed to the attackers So, clearly there is a need of
ciphering the data from its original form. Though there so
many advanced algorithms exist today for encryption, but
for any algorithm we have input the key in order to cipher
the data. But in case of emails declaring keys every time is
not possible.in this algorithm with the key generation
algorithm random keys will generate automatically.so the
emails get enciphered and deciphered automatically
without user interference.
3. ALGORITHM
Mathematics plays important role in Cryptography. We
can say Cryptography is the science of using mathematics
to camouflage the data behind cyphertext. It entails
stowing secret information with a pair of public key and
private key that recipient must have, so has to access the
original message.[4]
Using matrices for cyphering is a distinctive way in the
field of cryptography [6]. This algorithm is related to
mathematics in which matrix concepts are used. every
element in the electronic mail is ciphered into numerical
value based on the (American standard code for
information interchange) ASCII values.
The numerical values will be stowed in the N*N message
matrix where the order of N depends on the size of the
electronic mail.
Order of the matrix=√Size of the data + 1
The Matrix should be a square matrix hence the remaining
elements in the message matrix is filled with ASCII value
32 i.e., Blank Space. This process of adding blank space is
called padding.
3.1 Key Generation Algorithm
[K]-1 =Adjoint(K) * 1/|K|
[K]=Matrix of order N
|K|=determinant of matrix
Adjoint(K)=Adjoint matrix of K
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1141
This equivalent to,
|K|=[K]*Adjoint(K)
We will obtain the private key using the determinant value
that is K.
From the properties of matrix, the determinant of a
lower triangular matrix (or an upper triangular
matrix) is the product of the diagonal entries. [6] fact7
Structure of private Key Matrix: -
X 0 0 0 0
D 1 0 0 0
D D 1 0 0
D D D 1 0
D D D D 1
Here X represent Determinant value which is the public
key
D is Don’t care (Any random number)
We can arrange the diagonal elements differently in such a
way that the sum of all elements in the diagonal should
equal to the determinant value.
This algorithm produces a Matrix whose determinant
value is equal to public key. And this secret key is used for
deciphering by the recipient
3.2Enciphering Algorithm
[Ciphered Matrix] = [Message Matrix] *|K|
In this Enciphering Algorithm we multiply the Message
ASCII matrix with the determinant value that is public key.
The obtained matrix is the encrypted matrix from the
email data. Public key is multiplied with identity matrix
which is used a key for encryption
Flow Diagram for Enciphering
3.3 Deciphering Algorithm: -
[Message Matrix] = [ciphered Matrix] *[Key Matrix] -1 *
[Adjoint (Key Matrix)] -1
In deciphering Algorithm to obtain the message matrix
from its enciphered matrix we should multiply the
ciphered matrix with the inverse of key matrix and with
the inverse of adjoint key matrix in which the key matrix is
obtained by the key generation algorithm with the help of
the determinant value. We used different key value to
enciphering and deciphering So this is public key
encryption.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1142
Flow Diagram for Deciphering
Precedent:
Let us deliberate an example with enciphering and
deciphering a message “E-Mail”, the size of this message is
6 so the minimum square matrix required is 3*3 the
message is converted to ASCII matrix as follows and the
remaining 3 blocks in matrix is filled with ASCII value 32
that is Blank Space.
ASCII Matrix = [ ]
Let us consider the pubic key value also determinant value
as 23
Ciphered matrix= [ASCII matrix] *(key)
Ciphered Matrix = [ ]*[ ]
Ciphered Matrix = [ ]
Obtaining key matrix from its determinant value using key
generation Algorithm
Key matrix = [ ]
(Key Matrix)-1 = [ ]
(Adjoint (Key Matrix))-1 =
[ ]
Deciphered Matrix= [ciphered Matrix] * (Key Matrix)-1 *
(Adjoint (Key Matrix))-1
[ ]
[ ] *
[ ]
Deciphered Matrix = [ ]
Message=” E-Mail"
This deciphered matrix is converted to message using
ASCII chart and the original message is obtained
3.4 Algorithm Implementation
1. x=input ("input E-mail message:")
2. Key=int (input ("input Public Key:"))
3. final= []
4. ascii= []
5. messageKey= []
6. for character in x:
7. ascii. append(ord(character))
8. size=math. floor (math. sqrt(len(ascii))) +1
9. messageKey = [element * Key for element in ascii]
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1143
10. n, m = size, size
11. k = 0
12. msgMatrix = []
13. while n*m! = len(ascii):
14. ascii. append (32)
15. for idx in range (0, n):
16. sub = []
17. for jdx in range (0, m):
18. sub. append(ascii[k])
19. k += 1
20. msgMatrix.append(sub)
21. while n*m! = len(messageKey):
22. messageKey.append(32*Key)
23. n, m = size, size
24. l=0
25. keyMsg= []
26. for idx1 in range (0, n):
27. sub1 = []
28. for jdx1 in range (0, m):
29. sub1.append(messageKey[l])
30. l += 1
31. keyMsg.append(sub1)
32. print ("Enciphered Matrix")
33. print(keyMsg)
34.
Code 1. Message Encryption Implementation
1. random_matrix = [[random. random () for e in
range(len(keyMsg))] for e in range(len(keyMsg))]
2. convert random matrix into lower triangular
matrix
3. Assign all diagonal elements in random matrix to
1
4. random_matrix [0][0] =Key
5. det = np.linalg.det(random_matrix)
6. round(det)
7. adj_random= []
8. inverse_random_Matrix= []
9. inverse_adj_random= []
10. adj_random=adjoint_matrix(random_matrix)
11. inverse_random_Matrix=np.linalg.inv(random_ma
trix)
12. inverse_adj_random=np.linalg.inv(adj_random)
13. Product_rand_adjrand=[]
14. Product_rand_adjrand=np.dot(inverse_random_M
atrix,inverse_adj_random)
15. decoded_matrix= []
16. decoded_matrix=np.dot (keyMsg,
Product_rand_adjrand)
17. dec_list=[]
18. dec_list=decoded_matrix. flatten ()
19. dec_list = [int(round(x)) for x in dec_list]
20. print(dec_list)
21. decrepted_Message = "". join([chr(value) for value
in dec_list])
22. final. append(decrepted_Message)
23. print ("deciphered message:")
24. print (''. join(final))
Code 2. Message Decryption Implementation
The above code is developed using Visual studio code,
python version 3.9.7. Following is the output of the above
implemented code
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1144
Size of
the
Messag
e
Key Execution time
5 1234 7.271491708
29 98754 10.50398475
64 12345678909876543
2
9.574130458
131 78 10.51734062500000
1
395 3456 7.507566458
Table1. Execution time taken for above code with
different inputs
Results:
With the help of this algorithm, we enciphered and
deciphered the electronic mail data. Initially, we
enciphered the message into ASCII matrix with the help of
ASCII table whose order depends on the size of the data
given as input and to encrypt the message, the ASCII
Matrix is multiplied by a public key generated by the key
generation algorithm. for obtaining the original data from
enciphered matrix we used the deciphering algorithm and
key generation algorithm which is the only way to
decipher the data from its enciphered one.as the key
generation is random, and also it uses different algorithms
for encrypting and decrypting it is impossible to predict by
any 3rd person. In email we integrate the encryption
algorithm in the backend of the client as the public key
from the server will be available publicly to everyone and
for decryption integration is done at the server side which
uses the private key of the server to retrieve the data.
Discussions:
The electronic mail ciphering should be done instinctively
without user and recipient intervene and also mails should
get ciphered swiftly to shun time delay. Now a days no one
wants to send uncyphered electronic email due to variety
of threats. As there are so many state-of-the-art algorithms
these days but many of these are complex and time taking
process as the ciphered text is larger than the original
message. but in this algorithm the size of the ciphered
matrix depends on the given input so this is fast enough
when compared to other algorithms. Maximum size of
electronic mail is 25 MB so it can be handled easily by
modern devices and we are using ASCII values as they are
valid for all characters and we are using key generation
algorithm for enciphering and deciphering we get a
random key every time also the size of the key is differing
from data to data. As there are 2 different keys as public
and private key for enciphering and deciphering produced
by itself provides extra salvation.
Conclusion:
In this paper a modified version of public key encryption
has been developed and analyzed for enciphering and
deciphering the data. A unique technique /algorithm to
encipher and decipher the material. Since there is a
possibility of electronic mail hacking techniques like
keylogging and phishing this algorithm Avoid those things
with key generation algorithm and as it included of matrix
inversion and multiplication concepts and other
mathematics applications, hacking the data is very hard.in
Cryptographic process among all the methods using
matrices is the strongest method because it uses
mathematical concepts. An additional layer of security will
be added to the data by encrypting and decrypting it.
References:
1- “Email Encryption using RC4 algorithm” in proceeding
of Meltem Kurth Pehlivanoglu and Nevcihan Duru in
November 2015 International Journal of Computer
Applications
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072
© 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1145
2- “Public Key Cryptography” by Dwi Liestyowati in
proceedings of Journal of physics 2019
3- “The Role of Mathematics in Emergence of
Cryptography” by Savkirat Kaur in proceedings of
International Journal of Advanced Research in Science and
Engineering
4- image 1 source from:
https://privacycanada.net/mathematics/
5.image 2 source from -
https://docs.oracle.com/cd/E19656-01/821-
1507/aakfv/index.html
6- “Symmetric and Asymmetric Encryption” by Gustavus j.
Simmon proceeding of Priceton university
7-” Secure Communication over insecure Channels” by
Ralph C and Merkle in April 1978 proceeding of
communication of the ACM
8- "Enable hosted S/MIME for enhanced message
security". GSuite Admin Help. Google. Retrieved 2020-06-
15.
9- "End-to-end encryption". How To Geek. Retrieved 9
April 2015.
10- “Network Security Applications and Standards” by W.
Stallings in 2000, Prentice Hall.
11- “Public key Cryptography” by S L Garfinkel Oreilly and
Associates in proceeding of Institute of Electrical and
Electronics Engineers (IEEE) in 1996
12- “Hill Cipher and Vigenère Cipher” by Munir, Rinaldi,
Dikat in 2006 IF5054 Cryptography
13-” classification of Email Attacks” Link-
https://www.geeksforgeeks.org/types-of-email-attacks/
14- "Communication Theory of Secrecy Systems" by
Shannon, Claude, 1949 in Bell System Technical Journal
15- “Securing Record Communication” by Klein, Melville in
October 2012 retrieved in April 2012.
16-Ojamaa, A. and Lind, U. R. 2013. Securing Customer
Email Communication in E-Commerce. Sixth International
Conference on Developments in E-Systems Engineering.
17- Email Security using Encryption and Compression.
Computational Intelligence for Automation International
Conference & Modelling Control by Yogendra Kumar Jain
Pramod B. Gosavi in proceedings of IEEE 2008.
18-Secure email-based peer to peer information retrieval,
(ICC) International Conference on Cyberworlds by Lu, C.
and Geva, S in 2005.
19-A Secure Email Encryption Proxy Based on Identity-
based Cryptography by T Chen and Shilong Ma in 2008.
And conference on Information Technology and
Multimedia
20-Implementation of Secure Email Server in Cloud
Environment. Conference on Computer and
Communication Engineering (ICCCE) by Madi, NKM.,
Solmaz,S., Farzaneh,M., and Azizol, A in 2012.

More Related Content

Similar to ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL APPROACH

DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET Journal
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...IRJET Journal
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointJanet Robinson
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmIAEME Publication
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystemsijtsrd
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesIRJET Journal
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET Journal
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGIJNSA Journal
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuIJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationIJTET Journal
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGIJNSA Journal
 

Similar to ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL APPROACH (20)

DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
IRJET- FPGA Implementation of Image Encryption and Decryption using Fully Hom...
 
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...IRJET-  	  Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
 
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 PowerpointNt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
C0281010016
C0281010016C0281010016
C0281010016
 
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key CryptosystemsTime Performance Analysis of RSA and Elgamal Public Key Cryptosystems
Time Performance Analysis of RSA and Elgamal Public Key Cryptosystems
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic TechniquesA Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
 
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular ArrayIRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array
 
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMINGANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpuAnalysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
 
D018141922
D018141922D018141922
D018141922
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message AuthenticationPairing Based Elliptic Curve Cryptosystem for Message Authentication
Pairing Based Elliptic Curve Cryptosystem for Message Authentication
 
Ijtra150171
Ijtra150171Ijtra150171
Ijtra150171
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODINGDATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
DATA SECURITY USING PRIVATE KEY ENCRYPTION SYSTEM BASED ON ARITHMETIC CODING
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
Call Us ≽ 8377877756 ≼ Call Girls In Shastri Nagar (Delhi)
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 

ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL APPROACH

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1139 ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL APPROACH Akkimsetti Purna Veera Manindra Dept. of Computer Science Engineering, School of SOC SASTRA University, Thanjavur, Tamil Nadu, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - Electronic mail contains confidential information such as transaction details, fund transfer information, personal details, security numbers, etc. There is a high chance that the data can be well exposed during transmission over the internet, so there exists always the possibility of theft or manipulating the data. In this paper, A new mathematical algorithm of public-key encryption which encrypts the data using mathematical concepts like matrix properties is developed and analyzed to ensure secure electronic mail communication. This algorithm enciphers the email data into a matrix and retrieves the original data by decrypting the encrypted data. The performance of algorithms and data ciphering is also evaluated. Key Words: - Electronic mail, enciphering, deciphering, Matrix, key generation 1. INTRODUCTION In the modern-day world, E-Mail has become the most common way of communication between the user and clients over public channels. With an exponential increase in emails, there is a high risk of getting into unintended recipients. Cryptography can be defined as a methodology that ciphers the data, using different mathematical algorithms that make the data indecipherable unless deciphered by an intended user. By default, emails are not end-to-end encrypted [9]. There are majorly two types of ciphering algorithms, symmetric and asymmetric ciphering. In symmetric ciphering keys for both encryption and decryption processes are the same whereas asymmetric ciphering of different keys are used i.e., the public key and private key where both are related mathematically [7]. Asymmetric encryption is also known as public-key encryption. Block cipher and Stream cipher are most popular in data encryption affiliated to Symmetric key cipher. Block ciphers were first developed by Claude Shannon in 1949 [17], improving security using replacements and permutations using 64 bits. It works on transposition approaches like columnar transposition technique, rail- fence cipher. Electronic Code Book (ECB), Cipher Block Chaining (CBC) are the algorithm modes used by block cipher [18]. Gilbert Sandford Vernam 1917, developed an additive polyalphabetic stream cipher in which key is combined character by character with the text to produce the ciphertext [19]. It toils on substitutions approaches like Polygram substitution cipher and Caesar cipher. Cipher Feedback and Output Feedback are some algorithms used in stream ciphers. Twofish algorithm uses symmetric encryption, considered as one of the fastest ciphering algorithms, requires 256-bit keys for encryption used for both Software and Hardware environments. Diffie-Hellman key exchange was one of the popular key exchange protocols is a method of exchanging the public keys over a public server as it is a non-authenticated key agreement protocol ,used to serve forward secrecy[8], Elliptical curve cryptograph (ECC) is a key based technique for ciphering the data often discussed in the context of RSA Algorithm developed in 1977 [12], Rivest – Shamir-Adleman (RSA) one way enciphering of things like electronic-mail, data, software using factorization, El Gamal, DSA developed by Ron Rivest and Adi Shamir et al [13] are some encryption algorithms. Apart from these another popular technique is hashing developed by Ron Rivest in 1989. A unique way of ciphering which is different from encryption and decryption. Hashing is an irreversible process (the original data cannot be retrieved back), uses a hash algorithm to store the data with a unique hash value .it plays an important role in Banking applications like password management and other block chain applications [20]. A SEGPX distributed search engine was developed by Lu and Geva [18] for secure email communication. It uses X.50 public key attribute frameworks which utilizes email channels for data transmission. Jain, Gosavi [22] encrypted using variable key and compress the data using code book, compressed messages must be encrypted to maintain secure email. With compression of messages the overload of traffic over the channel will get reduced. A proxy based secure electronic mail system using IBE Cryptography was developed by Chen and Ma [11]. In Linux platform for secure email communication Madi [20] proposed a simple implementation that uses local based email transfer agent. To improve security in email infrastructure Choukse and others explain weakness in immanent methodologies and highlighted good and weak practices in email design. A point-to-point email ciphering protocol and an identity based on one-way key agreement was introduced by Yeh [26]. For secure email communication Ojamaa and Lind [21] developed a solution based on public key ciphering and OpenPGP to the users. Hill cipher developed a substitution cipher in 1929, in which each element in the text is substituted with a number in Z26 [14]. Leon Battista Alberti ,1947 developed a polyalphabetic cipher for
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1140 encryption in which text is segregated and then substituted with suitable keys. He also presented Cipher disk for encryption. Vigenère cipher also uses the simple form of polyalphabetic substitution, encryption is done using Vigenère table in which letters written out 26 times in divergent rows. Public key cryptography was developed by Martin Hellman, Ralph Merkle, and Whitfield Diffie at Stanford University in 1976 [16]. In Public key encryption, public key is public to everyone and private key belongs to the recipient who create these keys. Initially recipient generates the public and private key pair in which public key public to everyone and the sender use the public key for encryption and send the data over the server, on the other end receiver uses the private key for decipher the data. Authentication helps in securing the keys from hackers. End-to end encryption uses public key cryptography as data is enciphered and deciphered only at the end points. when the sent an email with an it enciphered at the source and again it deciphered at its end point, and it is unreadable in during transmission in public servers [10]. The prime solutions are available now that provides end to end encryption for electronic mail are Secure Internet Mail Extension (SIME), pretty good privacy (PGP), are using public key encryption [11]. Fig 1. working of public key encryption and decryption In this paper a new key generation algorithm in public key encryption is developed and analyzed to encrypt and decrypt the data. Fig 2. E-mail transmission through public server 2. EXIGENCY OF EMAIL CIPHERING: Since our sensitive information is being communicated through email, it's a cardinal thing to secure the data. In recent years, security has become the main concern for everyone, there are so many ways for a third-party recipient for bypassing the data. Attacks like phishing, Man-in-the-middle are the most common email hacking techniques and other attacks like Spyware, Spam, Adware, are some E-mail attacks [14], and also E-mails exposed to both passive and active threats. passive threats like traffic analysis, snooping and exposing the data while the active threats include mitigating the data and Denial of service (DoS & DDoS) etc. So, the data should be protected from being exposed to the attackers So, clearly there is a need of ciphering the data from its original form. Though there so many advanced algorithms exist today for encryption, but for any algorithm we have input the key in order to cipher the data. But in case of emails declaring keys every time is not possible.in this algorithm with the key generation algorithm random keys will generate automatically.so the emails get enciphered and deciphered automatically without user interference. 3. ALGORITHM Mathematics plays important role in Cryptography. We can say Cryptography is the science of using mathematics to camouflage the data behind cyphertext. It entails stowing secret information with a pair of public key and private key that recipient must have, so has to access the original message.[4] Using matrices for cyphering is a distinctive way in the field of cryptography [6]. This algorithm is related to mathematics in which matrix concepts are used. every element in the electronic mail is ciphered into numerical value based on the (American standard code for information interchange) ASCII values. The numerical values will be stowed in the N*N message matrix where the order of N depends on the size of the electronic mail. Order of the matrix=√Size of the data + 1 The Matrix should be a square matrix hence the remaining elements in the message matrix is filled with ASCII value 32 i.e., Blank Space. This process of adding blank space is called padding. 3.1 Key Generation Algorithm [K]-1 =Adjoint(K) * 1/|K| [K]=Matrix of order N |K|=determinant of matrix Adjoint(K)=Adjoint matrix of K
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1141 This equivalent to, |K|=[K]*Adjoint(K) We will obtain the private key using the determinant value that is K. From the properties of matrix, the determinant of a lower triangular matrix (or an upper triangular matrix) is the product of the diagonal entries. [6] fact7 Structure of private Key Matrix: - X 0 0 0 0 D 1 0 0 0 D D 1 0 0 D D D 1 0 D D D D 1 Here X represent Determinant value which is the public key D is Don’t care (Any random number) We can arrange the diagonal elements differently in such a way that the sum of all elements in the diagonal should equal to the determinant value. This algorithm produces a Matrix whose determinant value is equal to public key. And this secret key is used for deciphering by the recipient 3.2Enciphering Algorithm [Ciphered Matrix] = [Message Matrix] *|K| In this Enciphering Algorithm we multiply the Message ASCII matrix with the determinant value that is public key. The obtained matrix is the encrypted matrix from the email data. Public key is multiplied with identity matrix which is used a key for encryption Flow Diagram for Enciphering 3.3 Deciphering Algorithm: - [Message Matrix] = [ciphered Matrix] *[Key Matrix] -1 * [Adjoint (Key Matrix)] -1 In deciphering Algorithm to obtain the message matrix from its enciphered matrix we should multiply the ciphered matrix with the inverse of key matrix and with the inverse of adjoint key matrix in which the key matrix is obtained by the key generation algorithm with the help of the determinant value. We used different key value to enciphering and deciphering So this is public key encryption.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1142 Flow Diagram for Deciphering Precedent: Let us deliberate an example with enciphering and deciphering a message “E-Mail”, the size of this message is 6 so the minimum square matrix required is 3*3 the message is converted to ASCII matrix as follows and the remaining 3 blocks in matrix is filled with ASCII value 32 that is Blank Space. ASCII Matrix = [ ] Let us consider the pubic key value also determinant value as 23 Ciphered matrix= [ASCII matrix] *(key) Ciphered Matrix = [ ]*[ ] Ciphered Matrix = [ ] Obtaining key matrix from its determinant value using key generation Algorithm Key matrix = [ ] (Key Matrix)-1 = [ ] (Adjoint (Key Matrix))-1 = [ ] Deciphered Matrix= [ciphered Matrix] * (Key Matrix)-1 * (Adjoint (Key Matrix))-1 [ ] [ ] * [ ] Deciphered Matrix = [ ] Message=” E-Mail" This deciphered matrix is converted to message using ASCII chart and the original message is obtained 3.4 Algorithm Implementation 1. x=input ("input E-mail message:") 2. Key=int (input ("input Public Key:")) 3. final= [] 4. ascii= [] 5. messageKey= [] 6. for character in x: 7. ascii. append(ord(character)) 8. size=math. floor (math. sqrt(len(ascii))) +1 9. messageKey = [element * Key for element in ascii]
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1143 10. n, m = size, size 11. k = 0 12. msgMatrix = [] 13. while n*m! = len(ascii): 14. ascii. append (32) 15. for idx in range (0, n): 16. sub = [] 17. for jdx in range (0, m): 18. sub. append(ascii[k]) 19. k += 1 20. msgMatrix.append(sub) 21. while n*m! = len(messageKey): 22. messageKey.append(32*Key) 23. n, m = size, size 24. l=0 25. keyMsg= [] 26. for idx1 in range (0, n): 27. sub1 = [] 28. for jdx1 in range (0, m): 29. sub1.append(messageKey[l]) 30. l += 1 31. keyMsg.append(sub1) 32. print ("Enciphered Matrix") 33. print(keyMsg) 34. Code 1. Message Encryption Implementation 1. random_matrix = [[random. random () for e in range(len(keyMsg))] for e in range(len(keyMsg))] 2. convert random matrix into lower triangular matrix 3. Assign all diagonal elements in random matrix to 1 4. random_matrix [0][0] =Key 5. det = np.linalg.det(random_matrix) 6. round(det) 7. adj_random= [] 8. inverse_random_Matrix= [] 9. inverse_adj_random= [] 10. adj_random=adjoint_matrix(random_matrix) 11. inverse_random_Matrix=np.linalg.inv(random_ma trix) 12. inverse_adj_random=np.linalg.inv(adj_random) 13. Product_rand_adjrand=[] 14. Product_rand_adjrand=np.dot(inverse_random_M atrix,inverse_adj_random) 15. decoded_matrix= [] 16. decoded_matrix=np.dot (keyMsg, Product_rand_adjrand) 17. dec_list=[] 18. dec_list=decoded_matrix. flatten () 19. dec_list = [int(round(x)) for x in dec_list] 20. print(dec_list) 21. decrepted_Message = "". join([chr(value) for value in dec_list]) 22. final. append(decrepted_Message) 23. print ("deciphered message:") 24. print (''. join(final)) Code 2. Message Decryption Implementation The above code is developed using Visual studio code, python version 3.9.7. Following is the output of the above implemented code
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1144 Size of the Messag e Key Execution time 5 1234 7.271491708 29 98754 10.50398475 64 12345678909876543 2 9.574130458 131 78 10.51734062500000 1 395 3456 7.507566458 Table1. Execution time taken for above code with different inputs Results: With the help of this algorithm, we enciphered and deciphered the electronic mail data. Initially, we enciphered the message into ASCII matrix with the help of ASCII table whose order depends on the size of the data given as input and to encrypt the message, the ASCII Matrix is multiplied by a public key generated by the key generation algorithm. for obtaining the original data from enciphered matrix we used the deciphering algorithm and key generation algorithm which is the only way to decipher the data from its enciphered one.as the key generation is random, and also it uses different algorithms for encrypting and decrypting it is impossible to predict by any 3rd person. In email we integrate the encryption algorithm in the backend of the client as the public key from the server will be available publicly to everyone and for decryption integration is done at the server side which uses the private key of the server to retrieve the data. Discussions: The electronic mail ciphering should be done instinctively without user and recipient intervene and also mails should get ciphered swiftly to shun time delay. Now a days no one wants to send uncyphered electronic email due to variety of threats. As there are so many state-of-the-art algorithms these days but many of these are complex and time taking process as the ciphered text is larger than the original message. but in this algorithm the size of the ciphered matrix depends on the given input so this is fast enough when compared to other algorithms. Maximum size of electronic mail is 25 MB so it can be handled easily by modern devices and we are using ASCII values as they are valid for all characters and we are using key generation algorithm for enciphering and deciphering we get a random key every time also the size of the key is differing from data to data. As there are 2 different keys as public and private key for enciphering and deciphering produced by itself provides extra salvation. Conclusion: In this paper a modified version of public key encryption has been developed and analyzed for enciphering and deciphering the data. A unique technique /algorithm to encipher and decipher the material. Since there is a possibility of electronic mail hacking techniques like keylogging and phishing this algorithm Avoid those things with key generation algorithm and as it included of matrix inversion and multiplication concepts and other mathematics applications, hacking the data is very hard.in Cryptographic process among all the methods using matrices is the strongest method because it uses mathematical concepts. An additional layer of security will be added to the data by encrypting and decrypting it. References: 1- “Email Encryption using RC4 algorithm” in proceeding of Meltem Kurth Pehlivanoglu and Nevcihan Duru in November 2015 International Journal of Computer Applications
  • 7. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 09 Issue: 03 | Mar 2022 www.irjet.net p-ISSN: 2395-0072 © 2022, IRJET | Impact Factor value: 7.529 | ISO 9001:2008 Certified Journal | Page 1145 2- “Public Key Cryptography” by Dwi Liestyowati in proceedings of Journal of physics 2019 3- “The Role of Mathematics in Emergence of Cryptography” by Savkirat Kaur in proceedings of International Journal of Advanced Research in Science and Engineering 4- image 1 source from: https://privacycanada.net/mathematics/ 5.image 2 source from - https://docs.oracle.com/cd/E19656-01/821- 1507/aakfv/index.html 6- “Symmetric and Asymmetric Encryption” by Gustavus j. Simmon proceeding of Priceton university 7-” Secure Communication over insecure Channels” by Ralph C and Merkle in April 1978 proceeding of communication of the ACM 8- "Enable hosted S/MIME for enhanced message security". GSuite Admin Help. Google. Retrieved 2020-06- 15. 9- "End-to-end encryption". How To Geek. Retrieved 9 April 2015. 10- “Network Security Applications and Standards” by W. Stallings in 2000, Prentice Hall. 11- “Public key Cryptography” by S L Garfinkel Oreilly and Associates in proceeding of Institute of Electrical and Electronics Engineers (IEEE) in 1996 12- “Hill Cipher and Vigenère Cipher” by Munir, Rinaldi, Dikat in 2006 IF5054 Cryptography 13-” classification of Email Attacks” Link- https://www.geeksforgeeks.org/types-of-email-attacks/ 14- "Communication Theory of Secrecy Systems" by Shannon, Claude, 1949 in Bell System Technical Journal 15- “Securing Record Communication” by Klein, Melville in October 2012 retrieved in April 2012. 16-Ojamaa, A. and Lind, U. R. 2013. Securing Customer Email Communication in E-Commerce. Sixth International Conference on Developments in E-Systems Engineering. 17- Email Security using Encryption and Compression. Computational Intelligence for Automation International Conference & Modelling Control by Yogendra Kumar Jain Pramod B. Gosavi in proceedings of IEEE 2008. 18-Secure email-based peer to peer information retrieval, (ICC) International Conference on Cyberworlds by Lu, C. and Geva, S in 2005. 19-A Secure Email Encryption Proxy Based on Identity- based Cryptography by T Chen and Shilong Ma in 2008. And conference on Information Technology and Multimedia 20-Implementation of Secure Email Server in Cloud Environment. Conference on Computer and Communication Engineering (ICCCE) by Madi, NKM., Solmaz,S., Farzaneh,M., and Azizol, A in 2012.