SlideShare a Scribd company logo
1 of 6
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2851
ENCIPHERING AND DECIPHERING THE COOKIE DATA USING
RECTANGULAR ARRAY
Akkimsetti Mohana Sai Chandra
Student, Dept of Electronics and Communication Engineering, School of SEEE, SASTRA University, Thanjavur,
Tamil Nadu, INDIA
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract- Cookies contain sensitive information and also,
they are being stored and transferred to web servers
through public channels, there is a high risk of stealing and
manipulating cookies. So, in this paper a new way of
encrypting cookies and decrypting of cookies is analyzed.
Since, all cookies are in the form of text, encryption and
decryption is made easier by this new algorithm/new way.
This algorithm uses the concepts of mathematics and in
particular about matrices and their properties. This paper
describes an algorithm which encrypts the cookiedata(text)
into a matrix and decrypts the encrypted matrix back into
text.
Key Words: Cookie data encryption, Cookie data
decryption, Key generation algorithm, Matrices
1. INTRODUCTION
Now a days surfing the internet is the most common
thing everywhere. So, intentionally or unintentionally we
may open new websites or apps every day. Most of the
websites uses cookies for better user experience and better
security measures, Joon S. Park and Ravi Sindhu [3].
Generally, cookies are used to authenticate the user and
monitor the user. Different websites have different cookies,
means that one website cookie can’t be accessed or used by
another website [5]. Cookie is a text file which is stored on
our device hard disk. Cookie transfer occurs every time the
website has been used between the user and server. Since
cookies being transferredthroughpublic channelsorservers
there is a high risk of hijacking and manipulatingcookiedata
[7]. Generally, cookies contain information like user
credentials, how much time has the user is on that website,
User preferences, wish lists and payment methods and
preferences, credit card numbers etc. This indicates that the
cookie data must be secured. The cookie size is restricted to
4 kilobytes and a maximum of 50 cookies are allowed for a
particular website and the cookies are different for different
devices.[9]. There is need to encrypt the cookies [4].
Encryption of cookies is somewhat reliable because the size
of a cookie is restricted to 4KB, which allows a maximum of
4093 characters [9].
The proposed algorithm ensures the safe propagation
of cookies from user to server without revealing the original
data to public. Since COOKIE is text file, we can encrypt the
cookie with text encryptions. Hill Cipher algorithm encrypts
the data using linear algebra. Hill cipher algorithm is a
polygraphic substitutioncipher,which wasdevelopedby Hill
cipher in 1929 [23] in which each letter of the text is
substituted with a number in Z26 [11]. Polyalphabetic
Substitution ciphers which were developed by LeonBattista
Alberti,1467 also are used for encryption in whichthetextis
partitioned and then substituted with the key related
numbers [12]. This polyalphabetic cipher includes methods
like Vigenere Cipher, One-timepadetc.[13].Largesized data
will be at risk by these Substitution ciphers as the
substitution occurs only related to Z26.Ancient Greeks
developed transposition cipher which encrypts the data by
shifting the text bits based on the key [14]. The general
cookie flown is shown in Fig 1.
Fig 1. A typical Cookie transmission and reception
through server
Source: Adapted from [1]
Apart from these the most popular one is the Data
Encryption Standard (DES) which is a Block cipher
developed by IBM in 1970.[15], and encrypts the data in 16
Feistel rounds using permutation and combinations. It was
the most used encryption algorithmandalsoacceptedbythe
US government. But the DES uses 56-bit key and was used
only to encrypt 64-bit data, whichwasconvertedintoblocks.
The successor of DES is Triple DES whichencryptsthe64-bit
data using 3 different 56-bit keys byIBM,1977[16].Later on,
Rivet, Shamir and Adleman developed an encryption
algorithm which uses different keys which initiated the
Asymmetric key Cryptography[17].Rivest-Shamir-Adleman
(RSA) algorithm is a very powerful algorithm at that time
when it came into existence. RSA algorithm involves
Algebraic functions and modulo operators [18]. Another
revolution is made in cryptography is Hashing which was
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2852
developed by Ron Rivest in 1989. Hashing is different from
Encryption and decryption. In encryption and decryption,
the original data is obtained back whereas in hashing the
original data cannot be obtained back. Hashing uses hash
algorithm which produces a unique hash value for each data
[19]. But in cookie encryption the data should beobtainedat
the website server or client to review the user data. Hashing
plays an important role in block chains and exclusively in
payment related operations in today’s world [20]. Hashing
algorithm is very fast compared to encryption and
decryption algorithms. In 1990, a new cryptographic
technique called Quantum Cryptography has seen a rise in
encryption cryptography field which was the work by
Stephen Wiesner and Gilles Brassad,1970 [21]. This
particular concept is inspired from quantum mechanics and
it is extended to secure messages. The present known
Quantum encryption method is Quantum key distribution
(QKD) where the information encoded on single photons
[24].
2. NEED OF COOKIE ENCRYPTION:
Since our sensitive information is being stored in a
cookie, it’s an important thing to protect the cookie data. In
today’s modern world the data or information is most
important thing. For years many of the developers worked
on the concept called SECURE COOKIES [22]butrecently the
cookies faced MIM attacks (Man-in-the-middle attack),
Session hijacking [2] and also faced attacks called as Cookie
Poisoning [22]. Cross-site Scripting (XSS attack) is the most
common method to steal cookies. Also, cookies are prone to
attacks like brute force attack, replicating authentication
cookie [22]. So, the data in the cookie should be protected
from being exposed to the attackers. Some of the cookies
may also contain our creditcardnumberswhichposesmajor
concern about the security. So, clearly there is a need of
encrypting our data which is in the form of cookie [8]. As
mentioned above in today’s world many algorithms are
available for encryption, but the thing is for any encryption
we have to declare a key (either private/public key)inorder
to encrypt/decrypt the data. But when it comes to cookies it
is not possible to give a separate key for each and every
cookie and memorizing in order to decrypt them. So, the
cookie needs to be encrypted by itself and also decrypted
automatically (Encryption and decryption should be done
automatically) without allowing any attacker to decrypt
them if they even hijacked.
3. ALGORITHM
Mathematics is the fieldwherecryptographyisborn
and the principles of mathematics can be used very
effectively in building a powerful encryption anddecryption
algorithm [6]. Cryptography using arrays is a unique
approach in the field of cryptography [6]. This algorithm is
purely based on mathematics, highly on matrices concepts.
Every letter or element is encrypted into a matrix element.
The order of the matrix is determined by thesizeoftheinput
data, and also the transformation makes useofthe American
Standard Code for Information Interchange (ASCII) value in
computer language in order to transform alphabets to
numbers. We know that there are 256ASCIIvalues.So, every
value can be encrypted and decrypted using this algorithm.
For encryption and decryption of data the basic property of
matrices is used here. Since the data is transformed into
ASCII values this can be referred as Transformative
Cryptography.
So, this can be written as,
Where, I is the Identity matrix
|A| is determinant of matrix
[A] is a matrix of order n
Adj(A) is Adjoint matrix of A
We also know that,
Encryption Algorithm,
In this Encryption algorithm the ASCII equivalent
matrix is multiplied with the identity matrix which was
multiplied with the determinant value. So, the resultant
matrix is an encrypted form of our data (string). Here, the
key used is the identity matrix which is multiplied with the
determinant value.
Decryption Algorithm,
For decryption we have to multiply the coded data
(encrypted matrix) with the inverse of the keymatrixand its
adjoint matrix (Adj(key)). Here the key is the key matrix not
the identity matrix. Message ASCII Matrix is the equivalent
ASCII elements of each alphabet in the data. Note that the
key used for encryption is different the key used for
decryption. So, this can be classified as Public-key
encryption. This algorithm uses ASCII values for
transformation of text to decimal values. The equivalent
ASCII values of characters can be determined from Fig 2.
The order of the matrix is fixed by the length of the data
(input string). By taking square root of the size of the string
and adding 1 to the result will give us the order.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2853
Fig 2. ASCII Chart [10]
Source: Adapted from [10]
Example:
Let us encrypt and decrypt a data using this algorithm.
Consider the word COOKIE. It is of the length 6 so the
nearest square matrix is of order 3. The code given below
choses automatically the order of the matrix based upon the
size of the data. The ASCII Matrix of the word COOKIE is
The remaining elements are filled by the default number
“32” because ASCII 32 represent a “Blank Space”. Let the
key matrix be
The Encrypted Matrix is,
We didn’t use the Key Matrix directly for encryption, we
have used only the determinant value of the key matrix. So,
to get the Message matrix back
But as mentioned above the key should be automatically
generated and the process of encryption and decryption of
data should be done automatically. For that purpose, we
have to build an algorithm which produces a matrix of a
given determinant value
The KEY MATRIXGENERATIONALGORITHM:TheGeneral
Structure of the matrix is
Table 1: Structure of Key Matrix
2 1 D D D D ----- D
2 2 1 D D D ----- D
2 2 2 1 D D ----- D
2 2 2 2 1 D ----- D
2 2 2 2 2 1 ----- D
| | | | | | | |
x x x x x X x x+1
x+3 x+3 x+3 x+3 x+3 x+3 x+3 x+5
D-Don’t care (Any number can be inserted)
For a given determinant value this algorithm produces a
Matrix of equal determinantvalueSincethecookie maximum
size allowed is 4KB (4093 bytes) the maximum possible
matrix order is 64 which can be processed easily by modern
processors or computers.
THE MATLAB CODE FOR THE ABOVE ALGORITHM (KEY
GENERATION INCLUDED):
%ENCRYPTION
msg=input ('Enter your message','s’)
%Taking Input
l=strlength(msg);
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2854
x = l;
n=floor(sqrt(x))+1;
message=0;
for i=1:n,j=1:n;
message(i,j)=32;
end
k=1;
for i=1:n
for j=1:n
if(k<=l)
message(i,j)=double(msg(k)); %Formation of ASCII
Matrix
end
k=k+1;
end
end
order=n
key=randi(230)
%Random Determinant value
encrypt=0;
disp("Your Encrypted message is :")
encrypt=message*key*eye(n,n) %Encryption Algorithm
%%DECRYPTION
dec=input('Do you want to decrypt [press d]','s')
%Asking for decryption
if(dec=='d')
disp('Your msg is decrypting')
dett=key
order=n
if(order==2)
m=dett+3;
matt=[m m+1;m+3 m+5]
elseif(order==3)
m=dett+3;
matt=[2 1 6;m m m+1; m+3 m+3 m+5]
elseif(order==4)
m=dett+3;
matt=[2 1 6 9;2 2 1 5;m m m m+1;m+3 m+3 m+3 m+5]
elseif(order==5)
m=dett+3;
matt=[2 1 6 9 2;2 2 1 5 4;2 2 2 1 15;m m m m m+1;m+3
m+3 m+3 m+3 m+5]
elseif(order==6)
m=dett+3;
matt=[2 1 6 9 2 17;2 2 1 5 4 23;2 2 2 1 15 12;2 2 2 2 1
19;m m m m m m+1;m+3 m+3 m+3 m+3 m+3 m+5]
elseif(order==7)
m=dett+3;
matt=[2 1 6 9 2 17 26;2 2 1 5 4 23 57;2 2 2 1 15 12 38;2 2
2 2 1 19 41;2 2 2 2 2 1 62;m m m m m m m+1;m+3 m+3 m+3
m+3 m+3 m+3 m+5]
end
keyver=matt;
adjkeyver=det(keyver)*inv(keyver);
decrypt=0;
decrypt=encrypt*inv(keyver)*inv(adjkeyver)
%Decryption Algorithm
MSG=1:l;
t=1;
for i=1:n
for j=1:n
if(t<=l)
MSG(t)=decrypt(i,j);
t=t+1;
end
end
end
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2855
c=blanks(l);
d=blanks(l);
u=1;
my_string = native2unicode(MSG,'ASCII')
else
disp('Thank you,your message is encrypted')
%Message String
end
The above code is compiled using MATLAB R2019b Online
Version and the following are the outputs
Fig 3. ENCRYPTION
“encrypt” represents the encrypted matrix in the above
figure.
Fig 4. DECRYPTION
“my string” represents the decrypted string or data and
“decrypt” represents the equivalent ASCII matrix of the give
data (“Cookie Encryption”)
4. RESULTS:
By using this algorithm, we have encryptedthedata
into a nxn order matrix. The result of the encryption is a
matrix whose order is based upon the size of the text or
given input. The resultant matrix of the encryption contains
the ASCII character values of thedata multipliedwiththe key
elements. For decryption of data, encrypted matrix is
converted into text based upon the decryption algorithm
which uses a key related to the encryption key. For key
generation this algorithm uses a general format to produce
required order of the matrix. The encrypted matrix can’t be
decoded without the function of encryption key. The key
generation function in encryption uses a random value
generator function which cannot be predicted by anyone.
DISCUSSIONS: As mentioned above cookie encryption
should be done automatically without the user interference,
and also the cookies should get encrypted very quickly to
avoid time delay for accessing website. Since so many
advanced algorithms exists, the main thing in them is that
they are that much complex which takes time for the whole
process i.e., encryption and decryption to complete. The
resultant ciphertext should also be of a maximum size of
4kB, which fails for some methods or algorithms as they
produce higher sized ciphertext than plaintext. This
algorithm is fast enough because it produces the ciphertext
or encrypted matrix size based on the data, and the
maximum order of the matrix can be up to 64 (since 4096
bytes) which can be handled easily by toady’s modern-day
processors, and also the key used here is also data size
dependent and the key size varies from data to data.
Substitutions encryptionsandtransposition encryptionsfails
in Case-Sensitive text as they based on Z26, whereas this
method can handle even Case-Sensitive text because it is
based on ASCII values as ASCII values are valid for all
characters (256 characters). In addition to this, this
algorithm produces both encryption and decryption key by
itself and doesn’t depend on the user for manual input. This
also enables the server or client to review the data of the
user which improves their services to user. This gives an
additional layer of protection in website security.
5. CONCLUSION
A new algorithm or a new way to encrypt and
decrypt the data has been developed and analyzed in this
paper, and observed that it could be used effectively and
efficiently for encryption and decryption of cookie data
.Since there is a possibility of cookies being hacked and get
manipulated, this algorithmisbetterinavoidingthosethings
as it involved different keys and matrix properties which
makes hard to decrypt for an attacker. It involves matrix
multiplication process it become very hard to decrypt. By
encrypting and decrypting the cookie data provides
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072
© 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2856
additional layer of protection against attackers and can be
helpful for secure browsing.
V.REFERENCES
[1].Fig1.Imagelink:https://micro.medium.com/max/1530/1
*Hg1gUTXN5E3Nrk u0jWCRow, png
[2]. “Detecting Third-partUserTrackerswithCookieFiles”in
proceedings of Valery Dudykevych, Vitalii Nechypor in
October 4-6,2016 IEEE Conference.
[3]. R. Tirtea, C. Castelluccia and Ikonomou, Bittersweet
cookies. Some security and privacy considerations Greece:
European Network and Information Security Agency,2011
[4]. “Analysis and Compliance Evaluation of Cookies-Setting
Websites with Privacy Protection Laws” by Adeyemi
Aladeokin, Pavol Zavarsky,NeelamMemoninproceedingsof
IEEE,2017
[5]. “Using Browser Cookies for Event Monitoring and User
Verification of an account” in proceedings of IEEE,2018
[6]. “A Study on Data Encryption and Decryption using HILL
CIPHR Algorithm” by Maheshwari, A. Kaushika, A. Jenifer in
International Journal of Technical Innovation in Modern
Engineering & Science (IJTIMES).
[7]. “Secure Cookies on the Web” by Joon S. Park and Ravi
Sandhu in proceeding of IEEE,2000
[8]. Securing HTTP cookies by Camilo Reyes in jscrambler
blog, August 07,2017
[9]. Browser cookie limits by squawky,net
[10]. Fig 2. Image link: https://theasciicode,com/ar
[11]. Practical Cryptography, practicalcryptography.com,
[Online]Available:
http://practicalcryptography.com/ciphers/hill-cipher/
[12]. Polyalphabetic Substitution Ciphers, Crypto corner
Available at: https://crypto.interactive-
maths.com/polyalphabetic-substitution-ciphers.html
[13]. Cryptography and Network Security by Prakash
C.Gupta, Dept of Information Technology, Maharashtra
Institute of Technology, Pune
[14]. Transposition cipher, En.wikipedia.org, [Online]
Available:
https://en.wikipedia.org/wiki/Transposition_cipher
[15]. DataEncryptionAlgorithm, Umsl.edu.[Online]Availble:
http;//www.umsl.edu/~siegelj/information_theory/project
s/des.netau.net/Dataencryptionalgorithm.html
[16]. TripleDES, Tutorialspoint.Available:
https://www.tutorialspoint.com/cryptography/triple_des.ht
m
[17]. RSA (cryptosystem), Available:
https://en.wikipedia.org/wiki/RSA_(cryptosystem)
[18]. Eddie Woo,25 January 2020, The RSA Encryption
Algorithm (1 of 2: Computing an Example).Available:
https://youtu.be/4zahvcJ9glg
[19]. Cryptographic Hashing, Hackernoon.com. [Online].
Available: https://hackernoon.com/cryptographic-hashing-
c25da23609c3
[20]. Introduction to Cryptography in Block chain
technology, crushcrypto.com. Available:
https://crushcrypto.com/cryptography-in-blockchain/
[21]. David Cardinal, Quantum Cryptography Demystified:
How It Works in Plain Language,[Online]
Available:https://www.extremetech.com/extreme/287094-
quantum-cryptography
[22]. What are Cookie poising attacks, venafi.com. Available:
https://www.venafi.com/blog/what-are-cookie-poisoing-
attacks-0
[23]. Cryptology: Polygraphic Substitution,
Staff.uni-mainz.de, Available: https://www.staff.uni-
mainz.de/pommeren/Cryptology/Classic/1_Monoalph/Poly
graph.html
[24]. Quantum Key Distribution (QKD) - Quantum
Technology,Available:
https://qt.eu/understand/underlying-principles/quantum-
key-distribution-qkd/

More Related Content

What's hot

IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using CryptographyIRJET Journal
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...IOSRjournaljce
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...AM Publications
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
Text hiding in text using invisible character
Text hiding in text using invisible character Text hiding in text using invisible character
Text hiding in text using invisible character IJECEIAES
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted dataSELASI OCANSEY
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentIJERD Editor
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption TechniquesIRJET Journal
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...eSAT Publishing House
 

What's hot (18)

IRJET- Secure File Storage on Cloud using Cryptography
IRJET-  	  Secure File Storage on Cloud using CryptographyIRJET-  	  Secure File Storage on Cloud using Cryptography
IRJET- Secure File Storage on Cloud using Cryptography
 
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
Secure Data Sharing and Search in Cloud Based Data Using Authoritywise Dynami...
 
Encryption
EncryptionEncryption
Encryption
 
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
COLLOBORATIVE APPROACH for SECURING DATA RETRIEVAL SCHEME BASED On TRIPPLE DE...
 
19_2
19_219_2
19_2
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Text hiding in text using invisible character
Text hiding in text using invisible character Text hiding in text using invisible character
Text hiding in text using invisible character
 
Report dna
Report dnaReport dna
Report dna
 
Search on encrypted data
Search on encrypted dataSearch on encrypted data
Search on encrypted data
 
Overview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption AlgorithmsOverview on Symmetric Key Encryption Algorithms
Overview on Symmetric Key Encryption Algorithms
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
D018141922
D018141922D018141922
D018141922
 
How encryption works
How encryption worksHow encryption works
How encryption works
 
P01813101103
P01813101103P01813101103
P01813101103
 
IRJET- Comparative Analysis of Encryption Techniques
IRJET-  	  Comparative Analysis of Encryption TechniquesIRJET-  	  Comparative Analysis of Encryption Techniques
IRJET- Comparative Analysis of Encryption Techniques
 
82 86
82 8682 86
82 86
 
Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...Data security for any organization by using public key infrastructure compone...
Data security for any organization by using public key infrastructure compone...
 

Similar to IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array

IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security IssuesEditor IJCATR
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET Journal
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET Journal
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmIAEME Publication
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingIRJET Journal
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptographyijtsrd
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...IJCNCJournal
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueMahmuda Rahman
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET Journal
 

Similar to IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array (20)

IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Solve Big Data Security Issues
Solve Big Data Security IssuesSolve Big Data Security Issues
Solve Big Data Security Issues
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...IRJET-  	  Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
 
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...IRJET-  	  Privacy Preserving Cloud Storage based on a Three Layer Security M...
IRJET- Privacy Preserving Cloud Storage based on a Three Layer Security M...
 
J017667582
J017667582J017667582
J017667582
 
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital EnvelopePrevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithmImage encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmHybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
L017136269
L017136269L017136269
L017136269
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
IJARCCE 20
IJARCCE 20IJARCCE 20
IJARCCE 20
 
Cloud Cryptography
Cloud CryptographyCloud Cryptography
Cloud Cryptography
 
Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...Different date block size using to evaluate the performance between different...
Different date block size using to evaluate the performance between different...
 
Cloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption techniqueCloud computing and a new approach in data encryption technique
Cloud computing and a new approach in data encryption technique
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud StorageIRJET-  	  Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
IRJET- Key-Aggregate Cryptosystem for Scalable Data Sharing in Cloud Storage
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZTE
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 

Recently uploaded (20)

Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
ZXCTN 5804 / ZTE PTN / ZTE POTN / ZTE 5804 PTN / ZTE POTN 5804 ( 100/200 GE Z...
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
VICTOR MAESTRE RAMIREZ - Planetary Defender on NASA's Double Asteroid Redirec...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 

IRJET - Enciphering and Deciphering the Cookie Data using Rectangular Array

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2851 ENCIPHERING AND DECIPHERING THE COOKIE DATA USING RECTANGULAR ARRAY Akkimsetti Mohana Sai Chandra Student, Dept of Electronics and Communication Engineering, School of SEEE, SASTRA University, Thanjavur, Tamil Nadu, INDIA ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract- Cookies contain sensitive information and also, they are being stored and transferred to web servers through public channels, there is a high risk of stealing and manipulating cookies. So, in this paper a new way of encrypting cookies and decrypting of cookies is analyzed. Since, all cookies are in the form of text, encryption and decryption is made easier by this new algorithm/new way. This algorithm uses the concepts of mathematics and in particular about matrices and their properties. This paper describes an algorithm which encrypts the cookiedata(text) into a matrix and decrypts the encrypted matrix back into text. Key Words: Cookie data encryption, Cookie data decryption, Key generation algorithm, Matrices 1. INTRODUCTION Now a days surfing the internet is the most common thing everywhere. So, intentionally or unintentionally we may open new websites or apps every day. Most of the websites uses cookies for better user experience and better security measures, Joon S. Park and Ravi Sindhu [3]. Generally, cookies are used to authenticate the user and monitor the user. Different websites have different cookies, means that one website cookie can’t be accessed or used by another website [5]. Cookie is a text file which is stored on our device hard disk. Cookie transfer occurs every time the website has been used between the user and server. Since cookies being transferredthroughpublic channelsorservers there is a high risk of hijacking and manipulatingcookiedata [7]. Generally, cookies contain information like user credentials, how much time has the user is on that website, User preferences, wish lists and payment methods and preferences, credit card numbers etc. This indicates that the cookie data must be secured. The cookie size is restricted to 4 kilobytes and a maximum of 50 cookies are allowed for a particular website and the cookies are different for different devices.[9]. There is need to encrypt the cookies [4]. Encryption of cookies is somewhat reliable because the size of a cookie is restricted to 4KB, which allows a maximum of 4093 characters [9]. The proposed algorithm ensures the safe propagation of cookies from user to server without revealing the original data to public. Since COOKIE is text file, we can encrypt the cookie with text encryptions. Hill Cipher algorithm encrypts the data using linear algebra. Hill cipher algorithm is a polygraphic substitutioncipher,which wasdevelopedby Hill cipher in 1929 [23] in which each letter of the text is substituted with a number in Z26 [11]. Polyalphabetic Substitution ciphers which were developed by LeonBattista Alberti,1467 also are used for encryption in whichthetextis partitioned and then substituted with the key related numbers [12]. This polyalphabetic cipher includes methods like Vigenere Cipher, One-timepadetc.[13].Largesized data will be at risk by these Substitution ciphers as the substitution occurs only related to Z26.Ancient Greeks developed transposition cipher which encrypts the data by shifting the text bits based on the key [14]. The general cookie flown is shown in Fig 1. Fig 1. A typical Cookie transmission and reception through server Source: Adapted from [1] Apart from these the most popular one is the Data Encryption Standard (DES) which is a Block cipher developed by IBM in 1970.[15], and encrypts the data in 16 Feistel rounds using permutation and combinations. It was the most used encryption algorithmandalsoacceptedbythe US government. But the DES uses 56-bit key and was used only to encrypt 64-bit data, whichwasconvertedintoblocks. The successor of DES is Triple DES whichencryptsthe64-bit data using 3 different 56-bit keys byIBM,1977[16].Later on, Rivet, Shamir and Adleman developed an encryption algorithm which uses different keys which initiated the Asymmetric key Cryptography[17].Rivest-Shamir-Adleman (RSA) algorithm is a very powerful algorithm at that time when it came into existence. RSA algorithm involves Algebraic functions and modulo operators [18]. Another revolution is made in cryptography is Hashing which was
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2852 developed by Ron Rivest in 1989. Hashing is different from Encryption and decryption. In encryption and decryption, the original data is obtained back whereas in hashing the original data cannot be obtained back. Hashing uses hash algorithm which produces a unique hash value for each data [19]. But in cookie encryption the data should beobtainedat the website server or client to review the user data. Hashing plays an important role in block chains and exclusively in payment related operations in today’s world [20]. Hashing algorithm is very fast compared to encryption and decryption algorithms. In 1990, a new cryptographic technique called Quantum Cryptography has seen a rise in encryption cryptography field which was the work by Stephen Wiesner and Gilles Brassad,1970 [21]. This particular concept is inspired from quantum mechanics and it is extended to secure messages. The present known Quantum encryption method is Quantum key distribution (QKD) where the information encoded on single photons [24]. 2. NEED OF COOKIE ENCRYPTION: Since our sensitive information is being stored in a cookie, it’s an important thing to protect the cookie data. In today’s modern world the data or information is most important thing. For years many of the developers worked on the concept called SECURE COOKIES [22]butrecently the cookies faced MIM attacks (Man-in-the-middle attack), Session hijacking [2] and also faced attacks called as Cookie Poisoning [22]. Cross-site Scripting (XSS attack) is the most common method to steal cookies. Also, cookies are prone to attacks like brute force attack, replicating authentication cookie [22]. So, the data in the cookie should be protected from being exposed to the attackers. Some of the cookies may also contain our creditcardnumberswhichposesmajor concern about the security. So, clearly there is a need of encrypting our data which is in the form of cookie [8]. As mentioned above in today’s world many algorithms are available for encryption, but the thing is for any encryption we have to declare a key (either private/public key)inorder to encrypt/decrypt the data. But when it comes to cookies it is not possible to give a separate key for each and every cookie and memorizing in order to decrypt them. So, the cookie needs to be encrypted by itself and also decrypted automatically (Encryption and decryption should be done automatically) without allowing any attacker to decrypt them if they even hijacked. 3. ALGORITHM Mathematics is the fieldwherecryptographyisborn and the principles of mathematics can be used very effectively in building a powerful encryption anddecryption algorithm [6]. Cryptography using arrays is a unique approach in the field of cryptography [6]. This algorithm is purely based on mathematics, highly on matrices concepts. Every letter or element is encrypted into a matrix element. The order of the matrix is determined by thesizeoftheinput data, and also the transformation makes useofthe American Standard Code for Information Interchange (ASCII) value in computer language in order to transform alphabets to numbers. We know that there are 256ASCIIvalues.So, every value can be encrypted and decrypted using this algorithm. For encryption and decryption of data the basic property of matrices is used here. Since the data is transformed into ASCII values this can be referred as Transformative Cryptography. So, this can be written as, Where, I is the Identity matrix |A| is determinant of matrix [A] is a matrix of order n Adj(A) is Adjoint matrix of A We also know that, Encryption Algorithm, In this Encryption algorithm the ASCII equivalent matrix is multiplied with the identity matrix which was multiplied with the determinant value. So, the resultant matrix is an encrypted form of our data (string). Here, the key used is the identity matrix which is multiplied with the determinant value. Decryption Algorithm, For decryption we have to multiply the coded data (encrypted matrix) with the inverse of the keymatrixand its adjoint matrix (Adj(key)). Here the key is the key matrix not the identity matrix. Message ASCII Matrix is the equivalent ASCII elements of each alphabet in the data. Note that the key used for encryption is different the key used for decryption. So, this can be classified as Public-key encryption. This algorithm uses ASCII values for transformation of text to decimal values. The equivalent ASCII values of characters can be determined from Fig 2. The order of the matrix is fixed by the length of the data (input string). By taking square root of the size of the string and adding 1 to the result will give us the order.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2853 Fig 2. ASCII Chart [10] Source: Adapted from [10] Example: Let us encrypt and decrypt a data using this algorithm. Consider the word COOKIE. It is of the length 6 so the nearest square matrix is of order 3. The code given below choses automatically the order of the matrix based upon the size of the data. The ASCII Matrix of the word COOKIE is The remaining elements are filled by the default number “32” because ASCII 32 represent a “Blank Space”. Let the key matrix be The Encrypted Matrix is, We didn’t use the Key Matrix directly for encryption, we have used only the determinant value of the key matrix. So, to get the Message matrix back But as mentioned above the key should be automatically generated and the process of encryption and decryption of data should be done automatically. For that purpose, we have to build an algorithm which produces a matrix of a given determinant value The KEY MATRIXGENERATIONALGORITHM:TheGeneral Structure of the matrix is Table 1: Structure of Key Matrix 2 1 D D D D ----- D 2 2 1 D D D ----- D 2 2 2 1 D D ----- D 2 2 2 2 1 D ----- D 2 2 2 2 2 1 ----- D | | | | | | | | x x x x x X x x+1 x+3 x+3 x+3 x+3 x+3 x+3 x+3 x+5 D-Don’t care (Any number can be inserted) For a given determinant value this algorithm produces a Matrix of equal determinantvalueSincethecookie maximum size allowed is 4KB (4093 bytes) the maximum possible matrix order is 64 which can be processed easily by modern processors or computers. THE MATLAB CODE FOR THE ABOVE ALGORITHM (KEY GENERATION INCLUDED): %ENCRYPTION msg=input ('Enter your message','s’) %Taking Input l=strlength(msg);
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2854 x = l; n=floor(sqrt(x))+1; message=0; for i=1:n,j=1:n; message(i,j)=32; end k=1; for i=1:n for j=1:n if(k<=l) message(i,j)=double(msg(k)); %Formation of ASCII Matrix end k=k+1; end end order=n key=randi(230) %Random Determinant value encrypt=0; disp("Your Encrypted message is :") encrypt=message*key*eye(n,n) %Encryption Algorithm %%DECRYPTION dec=input('Do you want to decrypt [press d]','s') %Asking for decryption if(dec=='d') disp('Your msg is decrypting') dett=key order=n if(order==2) m=dett+3; matt=[m m+1;m+3 m+5] elseif(order==3) m=dett+3; matt=[2 1 6;m m m+1; m+3 m+3 m+5] elseif(order==4) m=dett+3; matt=[2 1 6 9;2 2 1 5;m m m m+1;m+3 m+3 m+3 m+5] elseif(order==5) m=dett+3; matt=[2 1 6 9 2;2 2 1 5 4;2 2 2 1 15;m m m m m+1;m+3 m+3 m+3 m+3 m+5] elseif(order==6) m=dett+3; matt=[2 1 6 9 2 17;2 2 1 5 4 23;2 2 2 1 15 12;2 2 2 2 1 19;m m m m m m+1;m+3 m+3 m+3 m+3 m+3 m+5] elseif(order==7) m=dett+3; matt=[2 1 6 9 2 17 26;2 2 1 5 4 23 57;2 2 2 1 15 12 38;2 2 2 2 1 19 41;2 2 2 2 2 1 62;m m m m m m m+1;m+3 m+3 m+3 m+3 m+3 m+3 m+5] end keyver=matt; adjkeyver=det(keyver)*inv(keyver); decrypt=0; decrypt=encrypt*inv(keyver)*inv(adjkeyver) %Decryption Algorithm MSG=1:l; t=1; for i=1:n for j=1:n if(t<=l) MSG(t)=decrypt(i,j); t=t+1; end end end
  • 5. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2855 c=blanks(l); d=blanks(l); u=1; my_string = native2unicode(MSG,'ASCII') else disp('Thank you,your message is encrypted') %Message String end The above code is compiled using MATLAB R2019b Online Version and the following are the outputs Fig 3. ENCRYPTION “encrypt” represents the encrypted matrix in the above figure. Fig 4. DECRYPTION “my string” represents the decrypted string or data and “decrypt” represents the equivalent ASCII matrix of the give data (“Cookie Encryption”) 4. RESULTS: By using this algorithm, we have encryptedthedata into a nxn order matrix. The result of the encryption is a matrix whose order is based upon the size of the text or given input. The resultant matrix of the encryption contains the ASCII character values of thedata multipliedwiththe key elements. For decryption of data, encrypted matrix is converted into text based upon the decryption algorithm which uses a key related to the encryption key. For key generation this algorithm uses a general format to produce required order of the matrix. The encrypted matrix can’t be decoded without the function of encryption key. The key generation function in encryption uses a random value generator function which cannot be predicted by anyone. DISCUSSIONS: As mentioned above cookie encryption should be done automatically without the user interference, and also the cookies should get encrypted very quickly to avoid time delay for accessing website. Since so many advanced algorithms exists, the main thing in them is that they are that much complex which takes time for the whole process i.e., encryption and decryption to complete. The resultant ciphertext should also be of a maximum size of 4kB, which fails for some methods or algorithms as they produce higher sized ciphertext than plaintext. This algorithm is fast enough because it produces the ciphertext or encrypted matrix size based on the data, and the maximum order of the matrix can be up to 64 (since 4096 bytes) which can be handled easily by toady’s modern-day processors, and also the key used here is also data size dependent and the key size varies from data to data. Substitutions encryptionsandtransposition encryptionsfails in Case-Sensitive text as they based on Z26, whereas this method can handle even Case-Sensitive text because it is based on ASCII values as ASCII values are valid for all characters (256 characters). In addition to this, this algorithm produces both encryption and decryption key by itself and doesn’t depend on the user for manual input. This also enables the server or client to review the data of the user which improves their services to user. This gives an additional layer of protection in website security. 5. CONCLUSION A new algorithm or a new way to encrypt and decrypt the data has been developed and analyzed in this paper, and observed that it could be used effectively and efficiently for encryption and decryption of cookie data .Since there is a possibility of cookies being hacked and get manipulated, this algorithmisbetterinavoidingthosethings as it involved different keys and matrix properties which makes hard to decrypt for an attacker. It involves matrix multiplication process it become very hard to decrypt. By encrypting and decrypting the cookie data provides
  • 6. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 07 Issue: 03 | Mar 2020 www.irjet.net p-ISSN: 2395-0072 © 2020, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 2856 additional layer of protection against attackers and can be helpful for secure browsing. V.REFERENCES [1].Fig1.Imagelink:https://micro.medium.com/max/1530/1 *Hg1gUTXN5E3Nrk u0jWCRow, png [2]. “Detecting Third-partUserTrackerswithCookieFiles”in proceedings of Valery Dudykevych, Vitalii Nechypor in October 4-6,2016 IEEE Conference. [3]. R. Tirtea, C. Castelluccia and Ikonomou, Bittersweet cookies. Some security and privacy considerations Greece: European Network and Information Security Agency,2011 [4]. “Analysis and Compliance Evaluation of Cookies-Setting Websites with Privacy Protection Laws” by Adeyemi Aladeokin, Pavol Zavarsky,NeelamMemoninproceedingsof IEEE,2017 [5]. “Using Browser Cookies for Event Monitoring and User Verification of an account” in proceedings of IEEE,2018 [6]. “A Study on Data Encryption and Decryption using HILL CIPHR Algorithm” by Maheshwari, A. Kaushika, A. Jenifer in International Journal of Technical Innovation in Modern Engineering & Science (IJTIMES). [7]. “Secure Cookies on the Web” by Joon S. Park and Ravi Sandhu in proceeding of IEEE,2000 [8]. Securing HTTP cookies by Camilo Reyes in jscrambler blog, August 07,2017 [9]. Browser cookie limits by squawky,net [10]. Fig 2. Image link: https://theasciicode,com/ar [11]. Practical Cryptography, practicalcryptography.com, [Online]Available: http://practicalcryptography.com/ciphers/hill-cipher/ [12]. Polyalphabetic Substitution Ciphers, Crypto corner Available at: https://crypto.interactive- maths.com/polyalphabetic-substitution-ciphers.html [13]. Cryptography and Network Security by Prakash C.Gupta, Dept of Information Technology, Maharashtra Institute of Technology, Pune [14]. Transposition cipher, En.wikipedia.org, [Online] Available: https://en.wikipedia.org/wiki/Transposition_cipher [15]. DataEncryptionAlgorithm, Umsl.edu.[Online]Availble: http;//www.umsl.edu/~siegelj/information_theory/project s/des.netau.net/Dataencryptionalgorithm.html [16]. TripleDES, Tutorialspoint.Available: https://www.tutorialspoint.com/cryptography/triple_des.ht m [17]. RSA (cryptosystem), Available: https://en.wikipedia.org/wiki/RSA_(cryptosystem) [18]. Eddie Woo,25 January 2020, The RSA Encryption Algorithm (1 of 2: Computing an Example).Available: https://youtu.be/4zahvcJ9glg [19]. Cryptographic Hashing, Hackernoon.com. [Online]. Available: https://hackernoon.com/cryptographic-hashing- c25da23609c3 [20]. Introduction to Cryptography in Block chain technology, crushcrypto.com. Available: https://crushcrypto.com/cryptography-in-blockchain/ [21]. David Cardinal, Quantum Cryptography Demystified: How It Works in Plain Language,[Online] Available:https://www.extremetech.com/extreme/287094- quantum-cryptography [22]. What are Cookie poising attacks, venafi.com. Available: https://www.venafi.com/blog/what-are-cookie-poisoing- attacks-0 [23]. Cryptology: Polygraphic Substitution, Staff.uni-mainz.de, Available: https://www.staff.uni- mainz.de/pommeren/Cryptology/Classic/1_Monoalph/Poly graph.html [24]. Quantum Key Distribution (QKD) - Quantum Technology,Available: https://qt.eu/understand/underlying-principles/quantum- key-distribution-qkd/