Submit Search
Upload
Email Encryption using Tri-Cryptosystem Based on Android
•
0 likes
•
39 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i3/IRJET-V4I3469.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 4
Download now
Download to read offline
Recommended
CNS - Unit v
CNS - Unit v
ArthyR3
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Unit 4
Unit 4
Vinod Kumar Gorrepati
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Pretty good privacy
Pretty good privacy
Punnya Babu
Unit 2
Unit 2
Vinod Kumar Gorrepati
Cryptography and network security
Cryptography and network security
Mathan Gopal
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
Recommended
CNS - Unit v
CNS - Unit v
ArthyR3
DES- Data Encryption Standard
DES- Data Encryption Standard
IRJET Journal
Unit 4
Unit 4
Vinod Kumar Gorrepati
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
Kathirvel Ayyaswamy
Pretty good privacy
Pretty good privacy
Punnya Babu
Unit 2
Unit 2
Vinod Kumar Gorrepati
Cryptography and network security
Cryptography and network security
Mathan Gopal
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
IJCSIS Research Publications
Network Security Primer
Network Security Primer
Venkatesh Iyer
Unit 5
Unit 5
Vinod Kumar Gorrepati
Mj3422172221
Mj3422172221
IJERA Editor
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
Security and Cryptography
Security and Cryptography
Presentaionslive.blogspot.com
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
IRJET Journal
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
Tania Agni
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
Ch34508510
Ch34508510
IJERA Editor
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
Pgp
Pgp
Abhishek Kesharwani
pgp s mime
pgp s mime
Chirag Patel
Pgp
Pgp
Reham Maher El-Safarini
Electronic mail security
Electronic mail security
Dr.Florence Dayana
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Unit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
More Related Content
What's hot
Network Security Primer
Network Security Primer
Venkatesh Iyer
Unit 5
Unit 5
Vinod Kumar Gorrepati
Mj3422172221
Mj3422172221
IJERA Editor
Pgp pretty good privacy
Pgp pretty good privacy
Pawan Arya
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Prafull Johri
Security and Cryptography
Security and Cryptography
Presentaionslive.blogspot.com
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
Unit 3(1)
Unit 3(1)
Vinod Kumar Gorrepati
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
IRJET Journal
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
Tania Agni
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Gyanmanjari Institute Of Technology
Ch34508510
Ch34508510
IJERA Editor
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Gyanmanjari Institute Of Technology
Pgp
Pgp
Abhishek Kesharwani
pgp s mime
pgp s mime
Chirag Patel
Pgp
Pgp
Reham Maher El-Safarini
Electronic mail security
Electronic mail security
Dr.Florence Dayana
Network security & cryptography full notes
Network security & cryptography full notes
gangadhar9989166446
Unit 7 : Network Security
Unit 7 : Network Security
Chandan Gupta Bhagat
What's hot
(20)
Network Security Primer
Network Security Primer
Unit 5
Unit 5
Mj3422172221
Mj3422172221
Pgp pretty good privacy
Pgp pretty good privacy
S/MIME & E-mail Security (Network Security)
S/MIME & E-mail Security (Network Security)
Security and Cryptography
Security and Cryptography
Unit 3(1)
Unit 3(1)
Unit 3(1)
Unit 3(1)
Security in Manets using Cryptography Algorithms
Security in Manets using Cryptography Algorithms
State of the art realistic cryptographic
State of the art realistic cryptographic
Celebrity Cricket League 2016 - http://ccl5.com/
Celebrity Cricket League 2016 - http://ccl5.com/
CNS - Unit - 4 - Public Key Cryptosystem
CNS - Unit - 4 - Public Key Cryptosystem
Ch34508510
Ch34508510
CNS - Unit - 1 - Introduction
CNS - Unit - 1 - Introduction
Pgp
Pgp
pgp s mime
pgp s mime
Pgp
Pgp
Electronic mail security
Electronic mail security
Network security & cryptography full notes
Network security & cryptography full notes
Unit 7 : Network Security
Unit 7 : Network Security
Similar to Email Encryption using Tri-Cryptosystem Based on Android
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
IRJET Journal
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
IRJET Journal
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
IRJET Journal
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
IRJET Journal
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
Joe Osborn
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET Journal
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET Journal
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
IJNSA Journal
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
IJNSA Journal
Ijtra150171
Ijtra150171
International Journal of Technical Research & Application
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
IRJET Journal
Encryption in Cryptography
Encryption in Cryptography
Uttara University
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
journalBEEI
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
Brijesh Vishwakarma
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
IJERA Editor
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
IOSR Journals
O017128591
O017128591
IOSR Journals
Similar to Email Encryption using Tri-Cryptosystem Based on Android
(20)
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
A Survey on Generation and Evolution of Various Cryptographic Techniques
A Survey on Generation and Evolution of Various Cryptographic Techniques
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
A Survey On The Cryptographic Encryption Algorithms
A Survey On The Cryptographic Encryption Algorithms
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
Hybrid Encryption for Database Security
Hybrid Encryption for Database Security
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
Analysis of rsa algorithm using gpu
Analysis of rsa algorithm using gpu
Ijtra150171
Ijtra150171
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET- Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
Encryption in Cryptography
Encryption in Cryptography
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Computer System Security (UNIT IV) For AKTU Lucknow
Computer System Security (UNIT IV) For AKTU Lucknow
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
The effect of Encryption algorithms Delay on TCP Traffic over data networks
The effect of Encryption algorithms Delay on TCP Traffic over data networks
O017128591
O017128591
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Anamika Sarkar
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
João Esperancinha
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
Dr SOUNDIRARAJ N
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Asst.prof M.Gokilavani
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
DeepakSakkari2
Internship report on mechanical engineering
Internship report on mechanical engineering
malavadedarshan25
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
Tagore Institute of Engineering And Technology
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Asst.prof M.Gokilavani
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
NikhilNagaraju
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
k795866
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
hassan khalil
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
srsj9000
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
GDSCAESB
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Dr. Gudipudi Nageswara Rao
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
KartikeyaDwivedi3
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
eptoze12
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
RajaP95
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
britheesh05
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
ssuser7cb4ff
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Asst.prof M.Gokilavani
Recently uploaded
(20)
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
Internship report on mechanical engineering
Internship report on mechanical engineering
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
POWER SYSTEMS-1 Complete notes examples
POWER SYSTEMS-1 Complete notes examples
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Email Encryption using Tri-Cryptosystem Based on Android
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1685 Email encryption using Tri-cryptosystem based on android 1 Surendra Seervi; 2 Prem Parmar; 3 Niraj Viadya; 4 Hari Rajai 4Assistant Professor 1-3B.E. Students Department of ComputeEngineering, K.C. College of Engineering & Management studies Research Kopri, Thane (E)-400 603, India Abstract—In the growing era of Digital Technology, a common question arise from digital users whether the digital Application is secure or not. Since the application is designed on a language the attacker always try to find new loop holes and has a result a new type of criminal activities take place. Even best encryption can be breached to corrupt the data, steal information, Cyber fraud, etc. This paper focuses on Email Security on Android Operating System by implementing the Tri-cryptosystem which is a combination of Symmetric cryptosystem, public key cryptosystem and hash function. Keywords– tri-cryptography, symmetric encryption, asymmetric encryption, hash function, secure email I. INTRODUCTION A most popular internet service is e-mail. Email is way to exchange text by using internet connection. Now almost internet services can be enjoyed by using mobile devices such as notebook, smart phone and tablet PC anywhere and anytime. Purposely, or not, the usage of e-mail to exchange information and collaborate, is not only limited to public information, but also confidential information, To certain parties which has a value of confidentiality so that it needs some security controls. By using mobile devices with internet connection, e-mail services can be used widely by many people to exchange information and collaborate, both for individual, enterprise and government. One of the most popular Operating System is Android. In order to prove safety of email sent from Android smart phone, encryption and decryption process have to be installed in an client side. All security systems use cryptographic because it suggest several algorithms and techniques practically unavailable to break because of their entanglement. II. TRI-CRYPTOSYSTEM SYSTEM Symmetric and asymmetric ciphers each have their own merits and demerits. Symmetric ciphers are faster than asymmetric ciphers, but require all parties to somehow share a secret key. But at the cost of speed asymmetric algorithms allow public key infrastructures and key exchange systems [4]. A Tri-cryptosystem is a protocol using multiple ciphers of different types together, each to its best merits. One common approach is to generate a random secret key for a symmetric cipher, and then encrypt this key via an asymmetric cipher using the recipient’s public key. The message itself is then encrypted using the symmetric cipher and the private key. Both the encrypted secret key and the encrypted message are then sent to the recipient. The recipient decrypt the secret key first, using his/her own private key, and then uses that key to decrypt the message. A. SYMMETRIC CRYPTOGRAPHY An encryption system in which the sender and receiver uses a single, common key that is used to encrypt and decrypt the message. In contrast with public key cryptography, this utilizes two keys - a public key to encrypt messages and a private key to decrypt message. Symmetric-key systems are simpler and faster, but the main drawback is that the two parties somehow exchange the key in a secure way. B.ASYMMETRIC CRYPTOGRAPHY Asymmetric cryptography is also known as public key cryptography, uses public and private keys for encryption and decryption of the data. The keys are simply large numbers that have been paired together but are not
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1686 similar(asymmetric). One key in the pair can be shared with the parties; it is called the public key. The other key in the pair is kept secret; it is called the private key. Either of the keys can be used to encrypt a message; the other key from the one used to encrypt the message is used for decryption[3]. C. Hash function the process of transforming input message m into a fixed size string (called a hash value h) is called as hash function and it is denoted by H.here h is the output of hashing function applied on input message m. h=H(m).hash function protect the integrity of the message .if attacker tries to modify the original message then the content of original message may changed it can be identified by applying hashing algorithm. III EXISTING SYSTEM In existing system by using mobile devices with internet connection, email services can be widely used by many people to exchange information and collaborate, both for individual, enterprise and government. One of the most popular Operating System is Android. In order to prove safety of email sent from Android smart phone, encryption and decryption process have to be installed in an client side. All security systems use cryptographic because it suggests several algorithms and techniques practically unavailable to break because of their entanglement Limitation of existing system: More processing time Message digest length is more Less security IV.PROPOSED SYSTEM In this proposed design methodology, the new protocol design using Symmetric cipher (Ping Pong-128) and public key cryptography (RSA) with hash function MD5. This kind of cryptography uses a single key for both encryption and decryption, and it is also called secret key cryptography. The key is a set of rules, and both the sender and the receiver must know the key in order to use the technique. The most commonly known secret key cryptography schemes are stream ciphers and block ciphers[1]. The stream ciphers generate a sequence of bits used as a key called a key stream, and the encryption is achieve by combining the key stream with the plaintext. This is usually done with the bitwise XOR operation. The key stream can be independent of the plaintext and cipher text, in which the stream cipher is synchronous, or it can depend on the data and its encryption, in which the stream cipher is self- synchronizing[2]. The public key cryptographic algorithms are more secure then symmetric algorithms. Because, it has two keys one for encryption and another one for decryption. In this tri- encryption technique we propose symmetric encryption for encryption and decryption and using public key cryptosystems for authentication A hash function offers a way of creating afixed-size blocks of data by using entry data with variable length and the exit data are known as message digest or one-way encryption. . The hash values solve the problem of the integrity of the messages. Fig: encryption process
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1687 Fig: decryption process For email encryption various algorithm is required: 4.1 Ping Pong The advantage of a stream cipher is faster and much more efficient than block ciphers. PingPong-128 is a member of the Ping-Pong family key-stream generator which uses LFSR A (La) and LFSR B (Lb) of size 127 and 129 bits respectively and has a key size of 128 bits. These 128 bits of key and an initial vector of 128 bits are combined to fill up the 256 bits internal state. The Ping-Pong generator produces the output key stream by combining the LFSR sequences and the memory sequence [5] . PingPong-128 uses two primitive polynomials, Pa(x) and Pb(x) which are given below PA(X)=X127⊕ X109⊕ X91⊕ X84⊕ X73⊕ X6⊕ X66⊕ X63⊕ X56⊕ X55⊕ X52⊕ X48⊕ X45⊕ X42⊕ X41⊕ X37⊕ X34⊕ X30⊕ X27⊕ X23⊕ X21⊕ X20⊕ X19⊕ X16⊕ X13⊕ X12⊕ X7⊕ X6⊕ X2⊕ X1⊕ 1 Pb(x)=x129⊕ x125⊕ x121⊕ x117⊕ x113⊕ x109⊕ x105⊕ x101⊕ x97⊕ x93⊕ x89⊕ x85⊕ x81⊕ x77⊕ x73⊕ x69⊕x65⊕ x61⊕ x57⊕ x49⊕ x45⊕ x41⊕ x37⊕ x33⊕ x29⊕ x25⊕ x21⊕ x17⊕ x13⊕ x9⊕ x5⊕ 1 The feedback connection of LFSR A (La) and LFSR B (Lb) is determined by the primitive polynomials, Pa(x) and Pb(x) respectively. Since primitive polynomial is used for the feedback connection, both of the LFSRs generate maximal length sequence. LFSR A (La) has a period of 2^127-1 and LFSR B (Lb) has a period of 2^129 - 1. 4.2RSA RSA is a block cipher which convert plain text into cipher text at sender side and vice versa at receiver side .The security of RSA is considered to be factoring. RSA computation occurs with integers modulo n = a * b, for two random secret primes a, b. To encrypt a message m, public key use a public key exponent e. so cipher text c = me (mod n) computes the multiplicative reverse of d = e- 1 (mod (a-1)*(b-1)) (we require that e is selected suitably for it to exist) and obtains cd = m e * d = m (mod n)[4]. The problem for the attacker is that computing the reverse d of e is assumed to be no easier than factorizing n. The key size should not be less than 1024 bits for a reasonable level of security. Digital signature employ asymmetric cryptography. In many instances they provide a layer of validation and security to messages sent through not secure channel: Properly implemented, a digital signature gives the receiver proof or feedback to believe the message was sent by the claimed sender. To create RSA signature keys, generate an RSA key pair containing a modulus N that is the product of two large primes, along with e and d such that ed=1 (mod φ (n)) ofN and e, and the signer's secret key contains d. To sign a message m, the signer computes σ ≡ md (mod N). To verify, the receiver check that σe ≡ m (mod N). As noted earlier, this basic scheme is not very secure. To prevent attacks, one can first apply a cryptographic hash function to the message m and then apply the RSA algorithm described above to the result[6]. 4.3.MD5 MD5 is a one way hash function, means it takes a message of arbitrary length and converts it into a fixed string of digits which is called as message digest. When using a one way hash function, one can compare the message digest that is decrypted with a public key against the calculated message digest to verify that the message has not been tampered .
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 1688 Conclusion Most of us use smart phone, tablet and computer all day long without realizing it. So, we need to realize the encryption for application of smart phone/Android OS. Tri-cryptosystem makes use of two different cryptographic algorithm. Which removes the drawback of use of any single cryptographic algorithm and provide double security to secret data? It removes key distribution problem. It’s strengths are respectively defined as speed and security. Therefore, we are suggesting the design of tri-cryptographic for secure email based on Android OS. Acknowledgment This work is a part of graduation project done by students of computer engineering. We thank everyone who supported and motivated us. And special thanks to our guide Mr. hari Rajai. [1] William Stallings (2003), Cryptography and Network Security-Principles and Practices, 3rd Edition, Pearson Education Asia [2] Menezes AJ, Oorschot PC, Vanstone SA. Handbook of Applied Cryptography. Florida: CRC PressInc. 1996. [3] Ramaraj E, Karthikeyan S, Hemalatha M. A Design of Security Protocol using Hybrid Encryption Technique (AES- Rijndael and RSA). International Journal of The Computer, the Internet and Management. 2009; 17(1):78-86 [4] Prof.PatrickMcDaniel,NetworkandSecurityResearch CenterDepartmentofComputerScienceandEngineeri ngPennsylvaniaState University, UniversityPark PA – “Public-Key Cryptography andAttacks on RSA”, 2010 [5] Prof.HoonJae Lee, Kevin Chen, 2007 International Conference on Convergence Information Technology “PingPong-128, A New Stream Cipher for Ubiquitous Application” [6] https://en.wikipedia.org/wiki/Digital_signature.
Download now