Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
With growing awareness and concerns regarding to cloud computing and information security, there is a growing awareness and usage of security algorithms into data systems and processes. Confidentiality means the data is understandable to the receiver only for all others it would be waste; it helps in preventing the unauthorized disclosure of sensitive information. Integrity means data received by receiver should be in the same form, the sender sends it; integrity helps in preventing modification from unauthorized user. Availability refers to assurance that user has access to information anytime and to any network. In the cloud confidentiality is obtained by cryptography. Cryptography is technique of converting data into unreadable form during storage and transmission, so that it appears waste to intruders. In the cloud integrity can be checked using a message authentication code (MAC) algorithm. Also by the help of calculating the hashing value. But both methods are not practically possible for large amount of data. Here symmetric algorithms (like IDEA, Blowfish, and DES) and asymmetric algorithms (like RSA, Homomorphic) are used for cloud based services that require data encryption. While sending data and during storage data is under threat because any unauthorized user can access it, modify it, so there is need to secure data. Any data is secure, if it fulfills three conditions i.e., Confidentiality, Integrity and Availability. There is a need to find a way to check data integrity while saving bandwidth and computation power. Remote data auditing, by which the data integrity or correctness of remotely stored data is investigated, has been given more attention recently.
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
Prevention of Cheating Message based on Block Cipher using Digital Envelopeiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses
on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for
encryption as well as decryption algorithms and also give the sufficient description of key generation, key
expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era,
Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and
they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic
design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multi
encryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the
encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. It
also shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated
analysis of encryption and decryption time for different file formats using a windows application. It describe
feature of application and its process and efficiency as well as calculation of time and throughput.
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
A Comparative Study on Balance and Flexibility between Dancer and Non-Dancer ...IOSR Journals
Abstract: Dance is a form of art that normally involves rhythmic movement of the body and accompanied with
music. Movement of human body while performing dance can become a significant medium for communication,
feelings and emotions. It embraces movement, creation and performance. Dance helps to extend the limits of
human physical ability, expressiveness and spirit. When it comes to health dance can be a very effective way of
establishing a lasting healthy living. Anecdotally it can be said that dance potentially motivate and excite young
people. Dance is a non-competitive form of exercise which has positive effects on physical and mental health.
Young girls can be engaged in physical activity through dance. The author being a dancer in fervor and passion
as well as an aspirant of the profession Physical Education strived to conduct the study bearing the title “A
Comparative Study on Balance and Flexibility between Dancer and Non-Dancer Girls”. The researcher
selected 30 girls who are regularly involved in Dance and 30 girls who are non-dancer or rather sedentary on
the basis of purposive stratified random sampling from Bidhan Govt. Girl’s School, Dist. Nadia West Bengal as
the subjects of her study. She incorporated Sit and Reach test and Stork Stand Balance tests for assessment of
Flexibility and Balance respectively. With respect to data analysis initially descriptive statics like mean SD and
range and further paired sample T test was conducted to ascertain the degree of difference between the means
with the help of SPSS soft ware. Data analysis proved significant difference between the Dancer and NonDancer
girls both with respect to flexibility and Balance. In both the cases the Dancer girls proved to be better
though the differences were not statistically significant. Thus the author arrived at the conclusion that dance
involving passion, strength, stamina, enthusiasm, rhythm, amusement and many more could be a wonderful
fitness activity similar to other fitness activities like jogging, running, cycling, swimming etc.
Key words: Dance, Flexibility, Balance, Dancer, Non-Dancer.
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithmIJECEIAES
Cloud computing is a structure for rendering service to the user for free or paid basis through internet facility where we can access to a bulk of shared resources which results in saving managing cost and time for large companies, The data which are stored in the data center may incur various security, damage and threat issues which may result in data leakage, insecure interface and inside attacks. This paper will demonstrate the implementation of hybrid cryptography security in public cloud by a combination of Elliptical Curve Cryptography and Twofish algorithm, which provides an innovative solution to enhance the security features of the cloud so that we can improve the service thus results in increasing the trust over the technology.
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks
Cloud computing has become an integral part of most of the private and public organizations and being used for data storage and retrieval. There are many usage of cloud computing and widely used in highly confidential national services like military and treasury for storing confidential information. The cloud computing for example Google drive, Amazon Web Service and Microsoft Azure are beneficial for organizations and end-users. Using Cloud computing and its services, organisation/end-users can store their data. There are multiple challenges while saving organisations highly confidential documents in servers. Hence, the objective of this paper is to provide a high level design for a storage system maximising security and personal privacy. Though servers are highly protected against unauthorized access, there are incidents where confidential files stored on servers are accessed by the maintenance staffs. Hence this research paper provides introductory structure for fully protection of files stored in the server by using Hybrid Cryptosystem.
With the growth of cloud technologies, computing
resources and cloud storage have become the most
demanding online services. There are several companies
desiring to outsource their data storage and resources as
well. While storing private and sensitive data on a third
party data center, it is necessary to consider security and
privacy which become major issues. In this paper, a novel
Double Encryption with Single Decryption (DESD) crypto
technique is proposed to secure the data in cloud storage.
The proposed technique comprises of encryption and
decryption phases where in the encryption phase the data is
randomly partitioned into multiple fragments. Double
encryption is done on each fragment by prime numbers, as
well as Invertible Non-linear Function (INF). These
multiple encrypted data are stored at the multiple cloud
storages with the help of cloud service provider (CSP).
After all verification process the data user collects the key
from the data owner and decrypts the gathered data from
the cloud with the knowledge of inverse INF. The proposed
crypto technique provides more security and privacy to
cloud data and any illegitimate users cannot retrieve the
original data. The performance of the proposed DESD
technique is compared with AES and Triple DES
techniques and the experimental results are plotted which
shows the proposed technique is efficient and faster.
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
Simulated Analysis and Enhancement of Blowfish Algorithmiosrjce
This paper represents or analyzes the security of system based on Blowfish. Blowfish mainly focuses
on the encrypt and decrypt techniques and algorithms apply for cryptanalysis. It describe the algorithms for
encryption as well as decryption algorithms and also give the sufficient description of key generation, key
expansion, function and working principle of Blowfish cipher with proper explanations. Taking the current era,
Most of the famous systems which offer security for a network or web or to a data are vulnerability to attacks and
they are broken at some point of time by effective cryptanalysis methods, irrespective of its complex algorithmic
design. In the general, today’s cryptography world is bounded to an interpretive of following any one or multi
encryption scheme and that too for a single iteration on a single file only. This is evident in the maximum of the
encryption-decryption cases. It also describes the comparisons between older blowfish and enhances blowfish. It
also shows enhance Blowfish algorithm for encryption and decryption of data. It is also give the proper simulated
analysis of encryption and decryption time for different file formats using a windows application. It describe
feature of application and its process and efficiency as well as calculation of time and throughput.
Overview on Symmetric Key Encryption AlgorithmsIJERA Editor
In today’s digital communication era sharing of information is increasing significantly. The information being transmitted is vulnerable to various passive and active attacks. Therefore, the information security is one of the most challenging aspects of communication. Cryptography is the one of the main categories of computer security that converts information from its normal form into an unreadable form by using Encryption and Decryption Techniques. The two main characteristics that identify and differentiate one encryption algorithm from another are its ability to secure the protected data against attacks and its speed and efficiency in doing so. There are basically two techniques of cryptography Symmetric and Asymmetric. This paper presents a detailed study of the symmetric encryption techniques.
Control Cloud Data Access Using Attribute-Based Encryptionpaperpublications3
Abstract: Cloud computing is a revolutionary computing paradigm which enables flexible, on-demand and low-cost usage of computing resources. Those advantages, ironically, are the causes of security and privacy problems, which emerge because the data owned by different users are stored in some cloud servers instead of under their own control. To deal with security problems, various schemes based on the Attribute-Based Encryption have been proposed recently. Data access control is an effective way to ensure the data security in the cloud. However, due to data outsourcing and untrusted cloud servers, the data access control becomes a challenging issue in cloud storage systems. Data security is the key concern in the distributed system. Various schemes based on the attribute-based encryption have been proposed to secure the cloud storage. However, most work focuses on the data contents privacy and the access control, while less attention is paid to the privilege control and the identity privacy. In this paper, we present a semianonymous privilege control scheme AnonyControl to address not only the data privacy, but also the user identity privacy in existing access control schemes. AnonyControl decentralizes the central authority to limit the identity leakage and thus achieves semianonymity. Besides, it also generalizes the file access control to the privilege control, by which privileges of all operations on the cloud data can be managed in a fine-grained manner. Subsequently, we present the AnonyControl-F, which fully prevents the identity leakage and achieve the full anonymity. Our security analysis shows that both AnonyControl and AnonyControl-F are secure under the decisional bilinear Diffie–Hellman assumption, and our performance evaluation exhibits the feasibility of our schemes.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
DNA computing based stream cipher for internet of things using MQTT protocol IJECEIAES
Internet of Things (IoT) is a rapidly developing technology that enables “devices” to communicate and share information amongst them without human control. The devices have the features of internet connectivity and networking. Due to the increasing demands of a secure environment in IoT application, security has become a crucial aspect on which researchers have been increasingly focused. Connecting devices to the internet can facilitate intruders to attack devices as they can access the data from anywhere in the globe. In this work, an encryption–decryption process-based stream cipher has been used. The messages between IoT nodes were encrypted using One Time Pad (OTP) and DNA computing. Furthermore, the required key sequence was generated using a linear feedback shift register (LFSR) as a pseudo number key generator. This key sequence was combined to generate a unique key for each message. The algorithm was implemented using source python and tested on a Raspberry pi under Linux open operation system.
A Comparative Study on Balance and Flexibility between Dancer and Non-Dancer ...IOSR Journals
Abstract: Dance is a form of art that normally involves rhythmic movement of the body and accompanied with
music. Movement of human body while performing dance can become a significant medium for communication,
feelings and emotions. It embraces movement, creation and performance. Dance helps to extend the limits of
human physical ability, expressiveness and spirit. When it comes to health dance can be a very effective way of
establishing a lasting healthy living. Anecdotally it can be said that dance potentially motivate and excite young
people. Dance is a non-competitive form of exercise which has positive effects on physical and mental health.
Young girls can be engaged in physical activity through dance. The author being a dancer in fervor and passion
as well as an aspirant of the profession Physical Education strived to conduct the study bearing the title “A
Comparative Study on Balance and Flexibility between Dancer and Non-Dancer Girls”. The researcher
selected 30 girls who are regularly involved in Dance and 30 girls who are non-dancer or rather sedentary on
the basis of purposive stratified random sampling from Bidhan Govt. Girl’s School, Dist. Nadia West Bengal as
the subjects of her study. She incorporated Sit and Reach test and Stork Stand Balance tests for assessment of
Flexibility and Balance respectively. With respect to data analysis initially descriptive statics like mean SD and
range and further paired sample T test was conducted to ascertain the degree of difference between the means
with the help of SPSS soft ware. Data analysis proved significant difference between the Dancer and NonDancer
girls both with respect to flexibility and Balance. In both the cases the Dancer girls proved to be better
though the differences were not statistically significant. Thus the author arrived at the conclusion that dance
involving passion, strength, stamina, enthusiasm, rhythm, amusement and many more could be a wonderful
fitness activity similar to other fitness activities like jogging, running, cycling, swimming etc.
Key words: Dance, Flexibility, Balance, Dancer, Non-Dancer.
Unified V- Model Approach of Re-Engineering to reinforce Web Application Deve...IOSR Journals
Abstract: The diverse and dynamic nature of elements and techniques used to develop Web Application, due to
the lack of testing technique and effective programming principles which are used for implementing
basic software engineering principles, and undisciplined development processes insure by the high pressure
of a very short time to satisfy market request to develop Web application. This paper represent approaches of
reengineering in web that how reengineering process can be carried out to evolution activities in legacy
system as well we propose the V-model for re-engineering process. This paper presents the need of the
technologies and approaches for building new web-services from existing web-applications. In this
paper we present the processing of V-model for Reengineering in web application which is the extension of Vmodel
used in software domain. In our approach V-model incorporates with the methodology
throughout the phases of web development process to re-engineer the web system.
Keywords:Re-engineering, reverse engineering, forward engineering, V-model, application migration.
Effect of Regular Exercise on Prolactin Secretion: A Pilot StudyIOSR Journals
Abstract:
Introduction: Evidence suggested that exercise may affects release of prolactin hormone. Participation in
exercise may increase secretion of prolactin hormone and may give sharp decrease in secretion of prolactin and
not only that published work demanded that there is no effect of exercise on secretion of prolactin. In this
context the researcher intend to know whether exercise affects positively or negatively or not on the release of
prolactin hormone. Aim: Determine whether participation in exercise may increase the level of secretion of
prolactine hormone or not. Method: Only two female students 29 years aged were participated in this study.
They were regularly practiced yogic asana and pranayam for 1 hour per day in the evening, 6 days per week,
for 8 weeks. The level of prolactin hormone was assessed by CLI method. In the present study all the
measurements were done at the baseline and 8 weeks of exercise training. Simple percentage calculated from
the mean value to see the quantitative changes in secretion of prolactin due to participation in the exercise
training. Result: Pre test mean was 5.80 and post test mean was 17.63 which imply that 203.96% increase in
secretion of prolactin significantly. Discussion and Conclusion: Level of secretion increased may be due to
multiple neural pathways that influence PRL secretion converges on the hypothalamus from other parts of the
brain; the effect of exercise on the secretion of PRL may also reflect the action of different neural inputs on the
activity of the hypothalamic–pituitary axis.
Key word: Exercise; Prolactin.
Neural Network For The Estimation Of Ammonia Concentration In Breath Of Kidne...IOSR Journals
Neural networks are an extremely powerful tool for data mining. They are especially useful in cases
involving data classification where it is difficult to establish a pattern in the search space. In an era when
artificial intelligence is increasingly being utilised in industrial and medical applications throughout the world,
it is becoming evident that this is an emerging trend. This paper explores the idea of artificial intelligence by
employing the use of a feed-forward neural network with two process layers to determine the concentration of
ammonia in exhaled human breath. The human mouth contains many kinds of substances both in liquid and
gaseous form. The individual concentrations of each of these substances could provide useful insight to the
health condition of the entire body. Ammonia is one of such substances whose concentration in the mouth has
revealed the presence or absence of diseases in the body. Kidney failure is one diesease which is identified by
an extremely high ammonia content in human breath. This disease is as a result of the kidneys’ inability to
process the body’s liquid waste. The result of this is the release of urea throughout the body which is dissipated
in the form of ammonia through oral breath. The neural simulation is carried out using NeuroSolutions version
5 software. The neural network correctly identified the concentration of oral ammonia as an indication of
kidney failure with an accuracy of 85%.
Cutting Strategies for Casting Die Manufacturing on CNC Milling MachineIOSR Journals
Manufacturing of dies has been presenting greater requirements of geometrical accuracy,
dimensional precision and surface quality as well as decrease in costs and manufacturing times. Although
proper cutting parameter values are utilized to obtain high geometrical accuracy and surface quality, there may
exist geometrical discrepancy between the designed and the manufactured surface profile of the die cavities. In
milling process; cutting speed, step over and feed are the main cutting parameters and these parameters affect
geometrical accuracy and surface quality of the casting die cavities. In this paper, effects of the cutting
parameters on geometrical error have been examined on a representative die cavity profile. To remove
undesired volume in the die cavities, available cutting strategies are investigated. Finish option for roughing
and finish option for finishing are optimized to reduce the Machining time of the cutting process thereby
decreasing the cost of cutting process. The cutting parameters considered are Cut Feed, Step Depth, Spindle
Speed for both roughing and finishing, scan type for roughing and lace type for finishing.3D model and
manufacturing process is done in parametric modeling software Pro/Engineer wildfire5.0.
Different date block size using to evaluate the performance between different...IJCNCJournal
The different computer networks whether wired or wireless are becoming more popular with its high
security aspect. Different security algorithms and technique are using to avoid any aforementioned attacks.
One of these technique is a cryptography technique that makes the data as unreadable during the transfer
hence; there is no chance to reclaim the information. Presently, most of the users are using various media
types and internet to transfer the data but, it has the chance to retrieve the data by using these media types.
The perfect solution for this problem is to provide security on time-to-time basis; this stage is always
significant to the security related community discussions. This paper explains the comparison between the
run time of three different encryption algorithms which are DES, AES and Blowfish The compression
includes using different modes, data block size and different operation modes. As a result, Blowfish
algorithm followed by AES take less time for running compared to DES.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
File transfer with multiple security mechanismShubham Patil
The system enhances the security and the data confidentiality between the users and receiver by the two-layer encryption mechanism and the QR code for verification. The system consists of three main components which are very important to providing the security between sender and receiver while transmitting the data
A Review on Various Most Common Symmetric Encryptions Algorithmsijsrd.com
Security is the most challenging aspects in the internet and network application. Internet and networks applications are growing very fast, so the importance and the value of the exchanged data over the internet or other media types are increasing. Information security has been very important issue in data communication. Any loss or threat to information can prove to be great loss to the organization. Encryption technique plays a main role in information security system. This paper gives a comparison of various encryption algorithms and then finds best available one algorithm for the network security.
This is the Fourth Chapter of Cisco Cyber Security Essentials course Which discusses the implementation aspects of Confidentiality via Encryption, Access Control Techniques
Cloud computing is the emerging trend in todays world. Cloud computing is not a separate technology, it is platform which provides platform as a service, Infrastructure as a service and Software as a service. The most important thing with cloud is that we hire everything from a third party or store our important datas in a third parties place .Here comes the major issue of how our datas are secured. In this paper, we discuss about how to protect our datas in the cloud with various cryptographic techniques. Padmapriya I | Ragini H "Cloud Cryptography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-2 , February 2019, URL: https://www.ijtsrd.com/papers/ijtsrd21547.pdf
Paper URL: https://www.ijtsrd.com/computer-science/computer-network/21547/cloud-cryptography/padmapriya-i
A PPLICATION OF C LASSICAL E NCRYPTION T ECHNIQUES FOR S ECURING D ATA -...IJCI JOURNAL
The process of protecting information by transformi
ng (encrypting) it into an unreadable format is cal
led
cryptography. Only those who possess secret key can
decipher (decrypt) the message into plain text.
Encrypted messages can sometimes be broken by crypt
analysis, also called code breaking, so there is a
need for strong and fast cryptographic methods for
securing the data from attackers. Although modern
cryptography techniques are virtually unbreakable,
sometimes they also tend to attack.
As the Internet, big data, cloud data storage and
other forms of electronic communication become more
prevalent, electronic security is becoming increasi
ngly important. Cryptography is used to protect e-m
ail
messages, credit card information, corporate data,
cloud data and big data so on... So there is a need
for
best and fast cryptographic methods for protecting
the data. In this paper a method is proposed to pro
tect
the data in faster way by using classical cryptogra
phy. The encryption and decryption are done in par
allel
using threads with the help of underlying hardware.
The time taken by sequential and parallel method i
s
analysed
Enhancing the Techniques to Secure Grid Computingijtsrd
Security is important issue in every aspect in todays world if you are using the networks. Various algorithms are there to secure your network so that unauthorized user cant breach into your accounts. SO for this authentication and authorization plays an important role but apart from these use of various encryption algorithms are there for grid data security. By using these algorithms you can easily secure your network and it will also enhance the performance of our grid networks. In this paper model has been designed for grid security that is been implemented on network Simulator and the performance has been measured with the previous models. By using various cryptographic algorithms the efficiency and the packed delivery ratio is increased incredibly. Simranjeet Kaur"Enhancing the Techniques to Secure Grid Computing" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-6 , October 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2531.pdf http://www.ijtsrd.com/computer-science/computer-network/2531/enhancing-the-techniques-to-secure-grid-computing/simranjeet-kaur
Similar to Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication (17)
CFD Simulation of By-pass Flow in a HRSG module by R&R Consult.pptxR&R Consult
CFD analysis is incredibly effective at solving mysteries and improving the performance of complex systems!
Here's a great example: At a large natural gas-fired power plant, where they use waste heat to generate steam and energy, they were puzzled that their boiler wasn't producing as much steam as expected.
R&R and Tetra Engineering Group Inc. were asked to solve the issue with reduced steam production.
An inspection had shown that a significant amount of hot flue gas was bypassing the boiler tubes, where the heat was supposed to be transferred.
R&R Consult conducted a CFD analysis, which revealed that 6.3% of the flue gas was bypassing the boiler tubes without transferring heat. The analysis also showed that the flue gas was instead being directed along the sides of the boiler and between the modules that were supposed to capture the heat. This was the cause of the reduced performance.
Based on our results, Tetra Engineering installed covering plates to reduce the bypass flow. This improved the boiler's performance and increased electricity production.
It is always satisfying when we can help solve complex challenges like this. Do your systems also need a check-up or optimization? Give us a call!
Work done in cooperation with James Malloy and David Moelling from Tetra Engineering.
More examples of our work https://www.r-r-consult.dk/en/cases-en/
Final project report on grocery store management system..pdfKamal Acharya
In today’s fast-changing business environment, it’s extremely important to be able to respond to client needs in the most effective and timely manner. If your customers wish to see your business online and have instant access to your products or services.
Online Grocery Store is an e-commerce website, which retails various grocery products. This project allows viewing various products available enables registered users to purchase desired products instantly using Paytm, UPI payment processor (Instant Pay) and also can place order by using Cash on Delivery (Pay Later) option. This project provides an easy access to Administrators and Managers to view orders placed using Pay Later and Instant Pay options.
In order to develop an e-commerce website, a number of Technologies must be studied and understood. These include multi-tiered architecture, server and client-side scripting techniques, implementation technologies, programming language (such as PHP, HTML, CSS, JavaScript) and MySQL relational databases. This is a project with the objective to develop a basic website where a consumer is provided with a shopping cart website and also to know about the technologies used to develop such a website.
This document will discuss each of the underlying technologies to create and implement an e- commerce website.
Forklift Classes Overview by Intella PartsIntella Parts
Discover the different forklift classes and their specific applications. Learn how to choose the right forklift for your needs to ensure safety, efficiency, and compliance in your operations.
For more technical information, visit our website https://intellaparts.com
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Comparison of Various Encryption Algorithms and Techniques for improving secured data Communication
1. IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 1, Ver. III (Jan – Feb. 2015), PP 62-69
www.iosrjournals.org
DOI: 10.9790/0661-17136269 www.iosrjournals.org 62 | Page
Comparison of Various Encryption Algorithms and Techniques
for improving secured data Communication
1
Soheila Omer AL Faroog Mohammed Koko, 2
Dr.Amin Babiker A/Nabi Mustafa
1
AL Neelain University, Faculty of Engineering . Khartoum,Sudan
2
Dean of Faculty of Engineerning , AL Neelain University, Khartoum, Sudan
Abstract: Information security is the process of protecting information. It protects its availability, privacy and
integrity. Access to stored information on computer databases has increased greatly. More companies store
business and individual information on computer than ever before. Much of the information stored is highly
confidential and not for public viewing.
To write this paper we have Study about information security using cryptography technique. After the detailed
study of Network security using cryptography, I am presenting my proposed work. This paper is dividing in four
sections contain of basic introduction about Information Security using cryptography, detailed description of
Information security using cryptography and various algorithms, also; we are presenting proposed algorithm,
Presenting summary and references where we have completed my research. The proposed algorithm has the
batter speed compared with the comparing encryption algorithm. Nevertheless, the proposed algorithm
improves encryption security by inserting the symmetric layer. The proposed algorithm will be useful to the
applications which require the same procedure of encryption and decryption.
In this paper also, we have developed a new cryptography algorithm which is based on block cipher concept. In
this algorithm we have used logical operation like XOR and shifting operation. Experimental results show that
proposed algorithm are very efficient and secured, and this paper covers the various techniques and algorithms
used for the data security.
Keywords: Information security, Encryption, Decryption, Cryptography
I. Introduction
Data security is an essential part of an organization; it can be achieved by the using various methods.
That to maintain and upgrade the model still efforts are required and increase the marginally overheads. The
encrypted data is safe for some time but never think it is permanently safe. After the time goes on there is
chance of hacking the data by the hacker. Fake files are transmitted in the same manner as one can sends the
encrypted data. The information about the key is present in the encrypt data which solves the problem of secure
transport of keys from the transmitter to receiver . In case of practical system encrypted data is passed through
the various stations which are capable to re-encrypt the data by their own key. At the time the previous keys are
discarded, this will make the system more secure. There are many algorithms available in the market for
encrypting the data. Encryption is the process in which plaintext has been converted into the encoded format
cipher text with the help of key.
II. Methodology
In this paper, we have considered Various Encryption Algorithms and Techniques for improving
secured data Communication, Information Security using cryptography, detailed description of Information
security using cryptography and various algorithms; also, we have developed a new cryptography algorithm
which is based on block cipher concept, like XOR and shifting operation.
III. Results
Summary of algorithms
We compare measured speed of encryption with various algorithms available as standard in Sun's JDK,
and then give a summary of various other characteristics of those algorithms. The encryption algorithms is
consider here are AES (with 128 and 256-bit keys), DES, Triple DES, RC4 (with a 256-bit key) and Blowfish
(with a 256-bit key).
Performance
First, the easy bit. Figure 1 shows the time taken to encrypt various numbers of 16-byte blocks of data using the
algorithms mentioned.
2. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 63 | Page
Fig4 Comparison of encryption times for various common symmetric encryption algorithms
It's important to note right from the beginning that beyond some ridiculous point, it's not worth
sacrificing speed for security. However, the measurements will still help us make certain decisions.
Characteristics
Table 1: gives a summary of the main features of each encryption algorithm, with what I believe is a fair
overview of the algorithm's current security status.
Table 1: Characteristics of commonly used encryption algorithms
IV. Discussion
4.1 Cryptography
Cryptography, it's the idea of storing and transmitting data in a form that only the authorized parties
can interpret. The conversion of data into a secret code for transmission over a public network. Today, most
cryptography is digital, and the original text ("plaintext") is turned into a coded equivalent called "cipher text"
via an encryption algorithm. The cipher text is decrypted at the receiving end and turned back into plaintext and
for secured data communications It is a technique used to avoid unauthorized access of data. The encryption
process consists of single or multiple keys to hide the data from the intruders. The original text before the
encryption process is known as Plaintext.The text obtain after encoding the data with the help of a key is known
as cipher text. For the encryption Process has the power to change/upgrade the key at any time and information
of changed or upgraded key has been made known to both the parties. The encryption, decryption, and key are
shown in the figure 1.
3. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 64 | Page
Figure 1: block diagram of cryptographic model
4.2 Types Of Cryptography
The cryptography techniques are classified on the basis of their key selection. The section shows the merits and
merits of various cryptographic techniques.
4.2.1 Symmetric (Private) Cryptography
Symmetric (also called private-key encryption or secret-key encryption) involves using the same key
for encryption and decryption.
Encryption involves applying an operation (an algorithm) to the data to be encrypted using the private
key to make them unintelligible. The slightest algorithm (such as an exclusive OR) can make the system nearly
tamper proof (there being so such thing as absolute security).
users have the provision to update the keys and use them to derive the sub keys. It is much effective
and fast approach as compared to asymmetrical key cryptography. In symmetrical key cryptography; key has
been generated by the encryption algorithm and then send it to the receiver section and decryption takes place.
4.2.2 Asymmetric (Public) Cryptography
Asymmetric cryptography is cryptography in which a pair of keys is used to encrypt and decrypt a
message so that it arrives securely. Initially, a network user requests a public and private key pair. A user who
wants to send an encrypted message can get the intended recipient's public key from a public administrator . The
method is more secured as compared to private key cryptography but it consumes more power and takes more
processing time therefore extra hardware is required. Due to increase in the computational unit the overheads are
high in public key cryptography.
4.3 Modern Cryptography
A combination of both public key and private key cryptography is known as modern cryptography. A
pair of public and private keys has been used to encrypt and decrypt the data. The technique has the salient
features of private key; fast speed, easy to process and features of public key such as secured, avoid key
transportation, provide the power to the users to generate their own keys of variable length. Users also have the
flexibility to upgrade the key at any interval of time. In this technique; certification authority has been used to
keep the track of the entire system and keys.
4.4 Cryptographic Algorithm
The generation, modification and transportation of keys have been done by the encryption algorithm. It
is also named as cryptographic algorithm. There are many cryptographic algorithms available in the market to
encrypt the data. Their strengths depend upon the cryptographic system. Any computer system which involves
cryptography is known as cryptographic system, the strength of encryption algorithm heavily relay on the
computer system used for the generation of keys. The computer systems take the responsibilities sending the
secret information over the web with the help of cryptographic hash functions, key management and digital
signatures. Crypto systems are composed from cryptographic primitives such as encryption algorithm, number
of keys, hash and round functions, memory elements, real time operating system, etc.
4. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 65 | Page
Fig 2: Diagram show Cryptographic Algorithm
4.5 Some important encryption algorithms are discussed here:
4.5.1 Data Encryption Standard (DES)
It is one of the most widely accepted, publicly available cryptographic systems today. It was developed
by IBM in the 1970s but was later adopted by the US government as a national bureau of standards as an official
Federal Information Processing Standard (FIPS) for the United States in 1976. It uses a 56-bit key to encrypt the
64 bit block size data. It processes 64-bit inputs into 64-bit cipher-text and algorithm performs 16 iterations.
4.5.2 International Data Encryption Algorithm (IDEA)
IDEA is a block cipher designed by James Massey and Xuejia Lai and was first described in 1991. It
uses 128 bit key length which operates on 64 bit blocks. It consists of a series of eight identical transformations
based upon bitwise exclusive-or, addition and multiplication modules. It is based upon symmetric cipher and has
very weak key design method therefore security level of the algorithm is very poor as compared to the DES.
IDEA not becomes so much popular due to its complex structure.
4.5.3 Blowfish
Blowfish is a symmetric-key block cipher, designed in 1993 by Bruce Schneier and included in a large
number of cipher suites and encryption products. Blowfish provides a good encryption rate in software and no
effective cryptanalysis of it has been found to date. However, the Advanced Encryption Standard (AES) now
receives more attention.
Schneier designed Blowfish as a general-purpose algorithm, intended as an alternative to the
aging DES and free of the problems and constraints associated with other algorithms. At the time Blowfish was
released, many other designs were proprietary, encumbered by patents or were commercial or government
secrets. Schneier has stated that, "Blowfish is unpatented, and will remain so in all countries. The algorithm is
hereby placed in the public, and can be freely used by anyone."
Notable features of the design include key-dependent S-boxes and a highly complex key schedule.
Fig 3: Blowfish Cryptographic Algorithm
4.5.4 Triple DES (TDES)
It was developed in 1998 and derived from DES. It applies the DES cipher algorithm three times to
each of the data blocks. Triple Data Encryption Standard (DES) is a type of computerized cryptography where
block cipher algorithms are applied three times to each data block. The key size is increased in Triple DES to
ensure additional security through encryption capabilities. Each block contains 64 bits of data. Three keys are
referred to as bundle keys with 56 bits per key. There are three keying options in data encryption standards:
All keys being independent Key 1 and key 2 being independent keys All three keys being identical
5. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 66 | Page
Key option #3 is known as triple DES. The triple DES key length contains 168 bits but the key security falls to
112 bits.
4.5.5 Advanced Encryption Standard (AES)
It is a symmetric 128-bitblock data encryption technique developed by Belgian cryptographers Joan
Daemen and Vincent Rijmen. The U.S government adopted the algorithm as its encryption technique in October
2000, replacing the DES encryption it used. AES works at multiple network layers simultaneously. The National
Institute of Standards and Technology (NIST) of the U.S. Department of Commerce selected the algorithm,
called Rijndael (pronounced Rhine Dahl or Rain Doll), out of a group of five algorithms under consideration,
including one called MARS from a large research team at IBM.
While the terms AES and Rijndael are used interchangeably, there are some differences between the
two. AES has a fixed block size of 128-bits and a key size of 128, 192, or 256-bits, whereas Rijndael can be
specified with any key and block sizes in a multiple of 32-bits, with a minimum of 128-bits and a maximum of
256-bits.
4.5.6 Twofish
It was derived from blowfish by Bruce Schneier in 1998. It is freely available in the public domain as it
has not been patented. It is a symmetric key block cipher having key sizes 128,192 and 256 bits used to encrypt
the 128 bit block size data in 16 rounds. The algorithm making use of S- Boxes and makes the key generation
process very complex and secured.
4.5.7 RSA
RSA is a public key system designed by Ron Rivest, Adi Shamir, and Leonard Adleman in 1978. The
RSA operations can be decomposed in three broad steps; key generation, encryption and decryption. Two
distinct prime number say p&q has been selected randomly and then
by using the mathematical properties such as Euler's function, Chinese remainder theorem, hamming
weight and exponential functions key has been generated and then encryption process takes place. Decryption
has been done in the receiver section by using the public key concept.
RSA have many flaws in its design therefore not preferred for the commercial use. When the small
values of p&q are selected for the designing of key then the encryption process becomes too weak and one can
be able to decrypt the data by using random probability theory and side channel attacks. On the other hand if
large p&q lengths are selected then it consumes more time and the performance gets degraded in comparison
with DES.
Further, the algorithm also requires of similar lengths for p&q, practically this is very tough conditions
to satisfy. Padding techniques are required in such cases increases the systems overheads by taking more
processing time.
4.5.8 Diffie-Hellman
Whitfield Diffie and Martin Hellman introduce the key exchange technique in 1976. In 2002, Ralph
Merkle's contributed his work in the key exchange program and the technique named as Diffie Hellman Merkle
key exchange.
In order to tackle man in the middle attacks the Diffie Hellman introduces password authenticated key
agreement (PAKE) which was based on generating matrix.
When hacker uses single password attack in the iteration; immediately the key structure becomes
changed, thus allows only maximum of single password attack in the each iteration by the hacker. This
technique helps in achieving better security even in the presence of weak password.
4.5.9 Elliptic Curve Cryptography (ECC)
In 1985, Neal Koblitz and Victor S. Miller suggested the use of ECC for the encryption of data. There
are four ECC techniques and stated as: the elliptic curve Diffie Hellman key agreement scheme which uses the
key exchange approach suggested by Diffie Hellman scheme and based
Upon the public key cryptography. Second, the Elliptic Curve Integrated Encryption Scheme (ECIES)
in which encryption and key generation takes place in one step.
Third scheme was based upon the digital signature algorithm and is known as Elliptic Curve Digital
Signature Algorithm. MQV key agreement scheme has been used in the ECMQV. The security pattern of ECC
is quite remarkable and does not affect by the side channel attacks
Variable key lengths have been used for the encryption and are varied in accordance with the data
blocks to provide sufficient amount of cover the data.
6. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 67 | Page
4.5.10 Pretty Good Privacy (PGP)
In 1991 the Philip Zimmermann developed Pretty Good Privacy (PGP) public key cryptography
programs. The algorithm was supported by Linux and Window operating systems. It combines the private and
public key cryptography to maintain the appropriate confidential level. The technique can be used to encrypt the
e-mail messages with the help of hash and MD5.
4.5.11 Public key infrastructure (PKI)
It is an unsymmetrical cryptography technique used to encrypt the e- mails. The public keys of the
users are covered up with the certificates created by trusted third party. From the root level different keys were
designed for different users and are always kept unknown from each other. The first key was generated by the
algorithm for the encryption and always kept secret; the second key was generated by the CA on the request of
the users and publicly circulated. The user can update their keys and the duplicate copy of the new key was
stored at CA.
V. Aesaes
Stands for Advanced Encryption Standard and is actually an algorithm that was originally called Rijndael, after
its anything else:
it is a politically safe decision: the encryption standard of the US National Institute of Standards and
Technology (NIST), and the US government reportedly approves AES with 192 or 256-bit keys for
encrypting top secret documents (or put
another way, your boss won't sack you for choosing AES...);
it is largely considered secure, though with some reservations:
nobody yet has (publicly) a full attack on AES, or a partial attack that is practical (though some impractical
partial attacks exist5);
however, AES is algebraically simpler than other block ciphers: effectively, it can be written as a series of
mathematical equations, and there is a worry that somebody could demonstrate a way to solve those
equations (see Ferguson & Schneier, Practical Cryptography, pp. 57-58);
the NSA may have chosen Rijndael as they secretly know how to break it, or secretly estimated that they
could develop a way to break it.
It is fast (Ferguson & Schneier (op cit), p. 59, argue that this is the reason it was picked over Serpent as the
AES standard).
VI. Criteria of a cryptographic algorithm
The security of the model has been analysis on the basis of their encryption algorithm and the key
management. It has been observed that the encryption algorithm have their own characteristics; one algorithm
provides security at the cost of hardware, other is reliable but uses more number of keys, one takes more
processing time. This section shows the various parameters which plays an important role while selecting the
cryptographic algorithm.
6.1 Level of Protection
The techniques have been compared on the basis of that how much:
CPU time would be required by a machine for a given processing speed to generate the key, encrypt
and decrypt the data.
The amount of memory required to hold the data in encryption process.
Number of users accommodated by the model.
Time required by the model to recover the data in case of key failure.
Time available to the hacker to produce various types of attacks.
6.2 Complexity
Key generation and encryption techniques are usually based upon the mathematical properties of
numbers and functions. Higher order polynomial cause complex system as a result the probability of error is
increased. If the keys are based upon orthogonal principle then same key must be selected at the receiver to
recover the data. Let us take a case in which A is the data stream which has been encrypted by the key B. At the
receiver side same key has used to decrypt the data; if key has been changed from B to ' B then one cannot
recover the data as shown in case-2.
7. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 68 | Page
Figure 5. Encryption and decryption by using same key
Case-1: Using same key B for encryption and decryption
Case-2: Using different key for encryption B and decryption
This is not equal to the original data, Y ≠A
The selection of algorithm also depends upon the requirement of security level. If short data sequences are
present within the organization and moderate security level is required then one can make use of symmetrical
key cryptography, On the other hand if average security level is needed over the web then pretty good privacy
maybe selected. For highly secured model one can make use of DES or AES having more number of round
functions. The known numbers of attacks up to 2006 are given as: 7 rounds for 128-bit keys, 8 rounds for 192-
bit keys, and 9 rounds for 256-bit keys therefore DES and AES can be used to sufficient amount of security
level.
6.4 Available Algorithms
Few encryption algorithms are patented and are not freely publicly available. Moreover, there are some
legal liabilities are also associated with these encryption algorithms. While selecting an encryption algorithm it
has been taken care that which algorithm is suitable and publicly available for the encryption purpose.
6.5 Overheads
Cryptography requires continuous efforts to achieve security; initially efforts are required in the generation of
keys. Once the keys have been generated the next step is to encrypt the data and send it over the web. There are
various overheads which are associated with in the cryptography and are given as:
Financial overheads: a lot of money has been invested to keep the documents secured from the enemy.
Less Channel bandwidth: the users have been able to utilize only limited bandwidth due the presence of
additional bits caused by keys.
More Heat Dissipation: While encrypting the data with multiple keys having large lengths results in
significant amount of heat dissipation has been observed. This will put up a limitation on the use of On-
chip components which are highly desirable for the fast encryption process.
Power consumption: the powerful processors consume more power in the key generation process as a
result node capacitance, charge sharing and leakage current exist in the model. These parameters are
responsible for the loss of data and cause station failure.
Delay: the encryption process takes time to convert the plain text into cipher text which causes delay
and increases latency. Few encryption algorithms also require additional padding techniques which also
consumes more power and time.
6.6 Key management
In modern key cryptography every user wants to send or receive secured electronic mail. Users have
their own keys and it is required to keep their keys and information about their data must be kept secret from
each other. In practice, the keys used by the individual user are different from each other. But in a networked
environment, the user might need to use an e-mail from multiple computers having different operating systems.
The padding techniques are also the main cause of delay which results in timing collisions in dynamic multiuser
8. Comparison of Various Encryption Algorithms and Techniques for improving secured …..
DOI: 10.9790/0661-17136269 www.iosrjournals.org 69 | Page
system. It creates the need of key sharing scheme. Number of keys, length of keys and their generation and
transportation are concerned with security level of data. The aim is to make the entire model secured; all the
nodes should be monitored continuously in order to make the combination secured. During the attacks there are
few possible outcomes, hacker can be
Able to break the other node,
attacks the other nodes but does not get succeeded; at this time the attacked node get failed due to the
efforts done by the hacker,
Attacks the node and succeeded to break it but not able to access the data (due to presence of second
key), in such case the hacker corrupts the data as a result the accuracy and reliability of data decreases.
The best method to encounter the problem is that to use multiple keys for individual nodes. When the
failure rate of the first key is increased then use the second key for the re-encryption the data. At the same time
generate the new key as a replacement of the first key. The probability of failure of both key is very less, in rare
cases it exits and such cases are handled; either by employing more number of keys or data sequences is divided
into small sequences. In such cases the short length data sequences are used in order to provide sufficient time to
the algorithm to generate the new keys.
VII. Conclusion
The study of various techniques and algorithms used for the secured communication in MN has been
done. From the related work it has been observed that the strength of model depends upon the key management,
type of cryptography, number of keys, number of bits used in a key. Longer key length and data length
consumes more power and results in more heat dissipation. So, it is not advisable to use short data sequence and
key lengths because by using powerful software's one can hack the short keys very easily and able to break the
system. Once one can determine the failure rate of keys then encryption process takes place. All the keys are
based upon the mathematical properties and their strength decreases. So, basically it is a tradeoff between key
length and security level. For the task the optimal selection of keys makes the model optimized. The keys
having more number of bits requires more computation time which simply indicates that the system takes more
time to encrypt the data.
References
[1]. Ajay Kakkar, Dr. M. L. Singh, Dr. P. K. Bansal, “Efficient Key Mechanisms in Multinode Network for Secured Data
Transmission”, International Journal of 92 Engineering Science and Technology, Vol. 2, Issue 5, 2010, pp.787-795.
[2]. Davis, R, “The data encryption standard in perspective”, Communications Society Magazine, IEEE, 2003, pp. 5-9.
[3]. Ajay Kakkar, M. L. Singh, P.K. Bansal," Comparison of Various Encryption Algorithms and Techniques for Secured Data
Communication in Multinode Network", International Journal of Engineering and Technology Volume 2 No. 1, January, 2012.
[4]. Diffiee, W., and Hellman, M., “New Directions in Cryptography”, IEEE Transaction Information Theory IT-22, (Nov. 1976), pp.
644-654.
[5]. Vishwa gupta, Gajendra Singh ,.Ravindra Gupta," Advance cryptography algorithm for improving data security", International
Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 1, January 2012 ISSN: 2277 128X.
[6]. Suyash Verma, Rajnish Choubey,Roopali soni, "An Efficient Developed New Symmetric Key Cryptography Algorithm for
Information Security", International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN
2250-2459, Volume 2, Issue 7, July 2012) 18 .