The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round -robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man -in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Performance Comparison of File Security System using TEA and Blowfish Algorithmsijtsrd
With the progress in data exchange by the electronic system, the need for information security has become a necessity. Due to the growth of multimedia application, security becomes an important issue of communication and storage of different files. To make its reality, cryptographic algorithms are widely used as essential tools. Cryptographic algorithms provide security services such as confidentiality, authentication, data integrity and secrecy by encryption. Different cryptographic algorithms are commonly used for information security in many research areas. Although there are two encryption techniques, asymmetric and symmetric, the simpler symmetric encryption technique is employed for testing file security system. In this study, the performance evaluation of the most common two symmetric encryption algorithms such as TEA and Blowfish algorithm is focused on the execution time intervals. Simulation has been conducted with many types of file encryption like .pdf, .txt, .doc, .docx, .xlsx, .pptx, .ppt, .xls, .jpg, .png and most common video file formats by using Java Programming Language. Win Myat Thu | Tin Lai Win | Su Mu Tyar "Performance Comparison of File Security System using TEA and Blowfish Algorithms" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26462.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/26462/performance-comparison-of-file-security-system-using-tea-and-blowfish-algorithms/win-myat-thu
Literature Survey: Secure transmitting of data using RSA public key implement...Editor IJCATR
In the military devices there is need to transmission of data security and fast. These proposed technique presents the secure,
efficient and fast way to send images using Identity Based Cryptography and Visual Cryptography. In this application Identity Based
Cryptography is used with Visual cryptography. In Identity based cryptography the RSA Cryptosystem is used to generate public and
private key by using Ancient Indian Mathematics for fast mathematical calculation. RSA is the safest and standard algorithm. Vedic
method is so efficient in multiplication terms of area, speed compered to its modern mathematics implementation. The regeneration of
public/private key is adopted to make the system more secure from various attacks.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Cryptography is a technique used today hiding any confidential information from the attack of an intruder. Today data communication mainly depends upon digital data communication, where prior requirement is data security, so that data should reach to the intended user. The protection of multimedia data, sensitive information like credit cards, banking transactions and social security numbers is becoming very important. The protection of these confidential data from unauthorized access can be done with many encryption techniques. So for providing data security many cryptography techniques are employed, such as symmetric and asymmetric techniques. In this review paper different asymmetric cryptography techniques, such as RSA (Rivest Shamir and Adleman), Diffie-Hellman, DSA (Digital Signature Algorithm), ECC (Elliptic curve cryptography) are analyzed. Also in this paper, a survey on existing work which uses different techniques for image encryption is done and a general introduction about cryptography is also given. This study extends the performance parameters used in encryption processes and analyzing on their security issues.
Computer Security : Introduction, Need for security, Principles of Security,
Types of Attacks
Cryptography : Plain text and Cipher Text, Substitution techniques, Caesar
Cipher, Mono-alphabetic Cipher, Polygram, Polyalphabetic Substitution,
Playfair, Hill Cipher, Transposition techniques, Encryption and Decryption,
Symmetric and Asymmetric Key Cryptography, Steganography, Key Range and
Key Size,
Possible Types of Attacks
Symmetric Key Algorithms and AES: Algorithms types and modes, Overview
of Symmetric key Cryptography, Data Encryption Standard (DES), International
Data Encryption Algorithm (IDEA), RC4, RC5, Blowfish, Advanced Encryption
Standard (AES)
Asymmetric Key Algorithms, Digital Signatures and RSA: Brief history of
Asymmetric Key Cryptography, Overview of Asymmetric Key Cryptography,
RSA algorithm, Symmetric and Asymmetric key cryptography together, Digital
Signatures, Knapsack Algorithm, Some other algorithms (Elliptic curve
cryptography, ElGamal, problems with the public key exchange)
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
Abstract In this modern era, with the vast improvement in the field of internet, security is a major issue at hand. A lot of crimes, or to say, hacking is prevalent. This system "Safe Exchange of Encrypted Data (SEED)" handles sharing secret data between the sender and receiver in a cryptic manner by providing a new approach to symmetric encryption with ensured confidentiality, authenticity, integrity and availability of a secure communication, and protection against Man-in-the-Middle attacks even without a Public Key Infrastructure (PKI) or endpoint certificates, in the unprotected network space. This system makes use of an efficient concept called 'ephemeral shared session key', which being a combination of public and private keys can only be generated at both ends and negates the need of having to transmit a symmetric key between the users. The text data is encrypted using a new symmetric key algorithm known as “Xenacrypt” which is more secure than any other existing symmetric key algorithms. This system provides integrity through an efficient algorithm which we have implemented to indicate data thefts by any malicious attacks or threats. Application of this crypto-system will have a huge impact in the future of transmitting secure data especially in the field of business transaction and military operations. Keywords:-encryption;signed diffie hellman;signature;VOIP Integrity,verification,decryption,authentication.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man-in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring attack risk if a very small amount of information is exchanged. It raises the bar on the standards of information security, ensuring more efficiency.
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
Computer Security : Introduction, Need for security, Principles of Security,
Types of Attacks
Cryptography : Plain text and Cipher Text, Substitution techniques, Caesar
Cipher, Mono-alphabetic Cipher, Polygram, Polyalphabetic Substitution,
Playfair, Hill Cipher, Transposition techniques, Encryption and Decryption,
Symmetric and Asymmetric Key Cryptography, Steganography, Key Range and
Key Size,
Possible Types of Attacks
Symmetric Key Algorithms and AES: Algorithms types and modes, Overview
of Symmetric key Cryptography, Data Encryption Standard (DES), International
Data Encryption Algorithm (IDEA), RC4, RC5, Blowfish, Advanced Encryption
Standard (AES)
Asymmetric Key Algorithms, Digital Signatures and RSA: Brief history of
Asymmetric Key Cryptography, Overview of Asymmetric Key Cryptography,
RSA algorithm, Symmetric and Asymmetric key cryptography together, Digital
Signatures, Knapsack Algorithm, Some other algorithms (Elliptic curve
cryptography, ElGamal, problems with the public key exchange)
FellowBuddy.com is an innovative platform that brings students together to share notes, exam papers, study guides, project reports and presentation for upcoming exams.
We connect Students who have an understanding of course material with Students who need help.
Benefits:-
# Students can catch up on notes they missed because of an absence.
# Underachievers can find peer developed notes that break down lecture and study material in a way that they can understand
# Students can earn better grades, save time and study effectively
Our Vision & Mission – Simplifying Students Life
Our Belief – “The great breakthrough in your life comes when you realize it, that you can learn anything you need to learn; to accomplish any goal that you have set for yourself. This means there are no limits on what you can be, have or do.”
Like Us - https://www.facebook.com/FellowBuddycom
Analysis of Cryptographic Algorithms for Network SecurityEditor IJCATR
Cryptography plays a major role in securing data. It is used to ensure that the contents of a message are confidentially
transmitted and would not be altered. Network security is most vital component in information security as it refers to all hardware and
software function, characteristics, features, operational procedures, accountability, access control, and administrative and management
policy. Cryptography is central to IT security challenges, since it underpins privacy, confidentiality and identity, which together
provide the fundamentals for trusted e-commerce and secure communication. There is a broad range of cryptographic algorithms that
are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving
more advanced techniques for secures communication.
Security Concepts: Introduction, The need for security, Security approaches, Principles of security, Types of Security attacks, Security services, Security Mechanisms, A model for Network Security Cryptography Concepts and Techniques: Introduction, plain text and cipher text, substitution techniques, transposition techniques, encryption and decryption, symmetric and asymmetric key cryptography, steganography, key range and key size, possible types of attacks
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
A novel approach to information security using safe exchange of encrypted dat...eSAT Journals
Abstract In this modern era, with the vast improvement in the field of internet, security is a major issue at hand. A lot of crimes, or to say, hacking is prevalent. This system "Safe Exchange of Encrypted Data (SEED)" handles sharing secret data between the sender and receiver in a cryptic manner by providing a new approach to symmetric encryption with ensured confidentiality, authenticity, integrity and availability of a secure communication, and protection against Man-in-the-Middle attacks even without a Public Key Infrastructure (PKI) or endpoint certificates, in the unprotected network space. This system makes use of an efficient concept called 'ephemeral shared session key', which being a combination of public and private keys can only be generated at both ends and negates the need of having to transmit a symmetric key between the users. The text data is encrypted using a new symmetric key algorithm known as “Xenacrypt” which is more secure than any other existing symmetric key algorithms. This system provides integrity through an efficient algorithm which we have implemented to indicate data thefts by any malicious attacks or threats. Application of this crypto-system will have a huge impact in the future of transmitting secure data especially in the field of business transaction and military operations. Keywords:-encryption;signed diffie hellman;signature;VOIP Integrity,verification,decryption,authentication.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Modified RSA-based algorithm: a double secure approachTELKOMNIKA JOURNAL
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text
A novel paradigm in authentication systemIJNSA Journal
Maintaining the security of your computer, network and private/sensitive data against unauthorized access
and a wide variety of security threats can be challenging. Verifying data integrity and authentication are
essential security services in order to secure data transmission process. In this paper we propose a novel
security technique which uses new encryption and decryption algorithms to achieve authenticated
communication and enhanced data integrity. The proposed technique is very complex for attackers to
decode, and it is applicable to client-server architecture.
Cryptographic Algorithms For Secure Data CommunicationCSCJournals
Personal privacy is of utmost importance in the global networked world. One of the best tools to help people safeguard their personal information is the use of cryptography. In this paper we present new cryptographic algorithms that employ the use of asymmetric keys. The proposed algorithms encipher message into nonlinear equations using public key and decipher by the intended party using private key. If a third party intercepted the message, it will be difficult to decipher it due to the multilevel ciphers of the proposed application.
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA ALGORITHM AND SCHEDULING CONCEPTSIJNSA Journal
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm with round-robin priority scheduling scheme in order to extend the level of security and reduce the effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to their priority. This method reduces the risk of man-in-middle attacks and timing attacks as the encrypted and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring attack risk if a very small amount of information is exchanged. It raises the bar on the standards of information security, ensuring more efficiency.
METHODS TOWARD ENHANCING RSA ALGORITHM : A SURVEYIJNSA Journal
Cryptography defines different methods and technologies used in ensuring communication between two parties over any communication medium is secure, especially in presence of a third part. This is achieved through the use of several methods, such as encryption, decryption, signing, generating of pseudo-random numbers, among many others. Cryptography uses a key, or some sort of a password to either encrypt or decrypt a message that needs to be kept secret. This is made possible using two classes of key-based encryption and decryption algorithms, namely symmetric and asymmetric algorithms. The best known and the most widely used public key system is RSA. This algorithm comprises of three phases, which are the key generation phase, encryption phase, and the decryption phase. Owing to the advancement in computing technology, RSA is prone to some security risks, which makes it less secure. The following paper preview different proposals on different methods used to enhance the RSA algorithm and increase its security. Some of these enhancements include combining the RSA algorithm with Diffie-Hellman or ElGamal algorithm, modification of RSA to include three or four prime numbers, offline storage of generated keys, a secured algorithm for RSA where the message can be encrypted using dual encryption keys, etc.
Research trends review on RSA scheme of asymmetric cryptography techniquesjournalBEEI
One of the cryptography classifications is asymmetric cryptography, which uses two different keys to encrypt and decrypt the message. This paper discusses a review of RSA scheme of asymmetric cryptography techniques. It is trying to present the domains of RSA scheme used including in public network, wireless sensor network, image encryption, cloud computing, proxy signature, Internet of Things and embedded device, based on the perspective of researchers’ effort in the last decade. Other than that, this paper reviewed the trends and the performance metrics of RSA scheme such as security, speed, efficiency, computational complexity and space based on the number of researches done. Finally, the technique and strengths of the proposed scheme are also stated in this paper.
A New Method for Encrypting Digital Data Using Symmetric Key in Information E...Editor IJCATR
with the arrival of the information age and much more important information systems and communication in human
everyday life, necessity immunization information and communication strategy were also raised. The easiest way to meet this
necessity is conventional encryption algorithms. Encryption is a right tool for data protection in an unsecure channel. To this end, from
two-method symmetric key encryption and public-key cryptography are used. In this paper we examine text cryptography, one of the
most important topics in cryptography. A unique attribute of this kind of encryption has been of interest to many researchers in this
field. This paper, considering the symmetric encryption algorithm, provides a text encryption algorithm using a 128-bit key. The
proposed algorithm uses a 128-bit key, the text data using the XOR operator to convert the encrypted information. Therefore, the aim
of this method is to provide a convenient method for symmetrically encrypting data not to be easily decoded, and finally, the results of
the tests show that the proposed method is better in terms of security and speed of execution
In many of today’s computer application needs, faster operation is essential to the efficient implementation
of information security algorithm. RC4 has been used as the data encryption algorithm for many
applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient
approaches to the implementation of RC4 have been proposed and we review some of those. More recently
some parallel approaches to faster implementation of RC4 have been presented and we include those in our
survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software
parallel implementations of RC4 symmetric key-based algorithm and some security approaches which
make it more secure.
Encryption is a technique that transforms a code from an understandable into an incomprehensible code. Many methods can be applied to an encryption process. One such method is RSA. RSA works by appointing on byte values. The value is obtained from character conversion to ASCII code. This algorithm is based on the multiplication of two relatively large primes. Applications of the RSA algorithm can be used in data security. This research provides RSA algorithm application on data security system that can guarantee data confidentiality. RSA algorithm is known as a very secure algorithm. This algorithm works with the number of bits in the search for prime numbers. The larger the bits, the less chance of ciphertext can be solved. The weakness of this method is the amount of ciphertext capacity will be floating in line with the number of prime numbers used. Also, to perform the process of encryption and decryption, RSA requires a relatively long time than other algorithms. The advantage of RSA is that complicated ciphertext is solved into plaintext.
Encryption is a fundamental concept in cryptography that involves the process of converting plaintext (readable and understandable data) into ciphertext (encoded and unintelligible data) using a mathematical algorithm and an encryption key. The primary purpose of encryption is to ensure the confidentiality and privacy of sensitive information during transmission or storage.
In the encryption process:
1. **Plaintext:** This is the original, readable data that is to be protected. It could be a message, a file, or any form of digital information.
2. **Encryption Algorithm:** An encryption algorithm is a set of mathematical rules and procedures that transform the plaintext into ciphertext. Common encryption algorithms include Advanced Encryption Standard (AES), RSA, and Triple DES.
3. **Encryption Key:** The encryption key is a piece of information used by the encryption algorithm to perform the transformation. The key determines the specific pattern and method by which the plaintext is converted into ciphertext. The strength of the encryption often depends on the length and randomness of the key.
4. **Ciphertext:** This is the result of the encryption process—the transformed and encoded data that appears random and is indecipherable without the corresponding decryption key.
Encryption serves several important purposes in the field of cryptography:
- **Confidentiality:** The primary goal of encryption is to keep information confidential and secure from unauthorized access. Even if an unauthorized party intercepts the ciphertext, they should be unable to understand or decipher it without the correct decryption key.
- **Integrity:** Encryption helps ensure the integrity of data by providing a means to detect any unauthorized modifications. If the ciphertext is altered, the decryption process will produce incorrect results, alerting the recipient to potential tampering.
- **Authentication:** In some encryption scenarios, the use of digital signatures or authenticated encryption helps verify the origin and authenticity of the encrypted data.
- **Secure Communication:** Encryption is widely used to secure communication over networks, such as the internet. Protocols like HTTPS (HTTP Secure) use encryption to protect the confidentiality of data transmitted between a web browser and a web server.
- **Data-at-Rest Protection:** Encryption is applied to data stored on devices or servers, ensuring that even if physical access is gained, the data remains protected from unauthorized viewing.
In summary, encryption is a crucial tool in the field of cryptography, providing a means to safeguard the confidentiality, integrity, and authenticity of sensitive information in various digital environments.
Review on variants of Security aware AODVijsrd.com
Mobile ad-hoc network (MANET) is very sensitive network to security due to challenging characteristic such as decentralization, dynamic changing topology, and neighbor based routing. All existing MANET protocol are simply trust their neighbor and make route through them due to neighbor based routing network is disturbed by malicious node or intruder. Trust calculation is challenging task due to computation complexity constraints in MANET. In this paper we have presented variants of trust based security protocol in an on demand distance vector routing protocol and also proposed new mechanism for Network coding with RSA based Encryption and Decryption in an AODV which will improve the security level of MANET with acceptable overhead limit.
A comparative study of symmetric key algorithm des, aes and blowfish for vide...pankaj kumari
Cryptography means storing and transmitting data or information in a particular form that allow to be kept secret.
Symmetric key cryptography:- Both sender and receiver share the secret key.The symmetric key is kept private.both parties use the same key for encryption and decryption.
Asymmetric key cryptography:- Asymmetric key cryptography uses public or private key for encryption and decryption.Public key is kept by publically and private is kept secret.sender use the public key to send message and receiver use the private or secret key to decrypt the message.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Welcome to WIPAC Monthly the magazine brought to you by the LinkedIn Group Water Industry Process Automation & Control.
In this month's edition, along with this month's industry news to celebrate the 13 years since the group was created we have articles including
A case study of the used of Advanced Process Control at the Wastewater Treatment works at Lleida in Spain
A look back on an article on smart wastewater networks in order to see how the industry has measured up in the interim around the adoption of Digital Transformation in the Water Industry.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Hybrid cryptographic technique using rsa algorithm and scheduling concepts
1. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
HYBRID CRYPTOGRAPHIC TECHNIQUE USING RSA
ALGORITHM AND SCHEDULING CONCEPTS
Meenakshi Shankar1and Akshaya.P2
1Department of Electrical and Electronics Engineering, Sri Venkateswara College of
Engineering, Sriperumbudur, India
2Department of Information Technology,Sri Venkateswara College of Engineering,
Sriperumbudur, India
ABSTRACT
The RSA algorithm is one of the most commonly used efficient cryptographic algorithms. It provides the
required amount of confidentiality, data integrity and privacy. This paper integrates the RSA Algorithm
with round-robin priority scheduling scheme in order to extend the level of security and reduce the
effectiveness of intrusion. It aims at obtaining minimal overhead, increased throughput and privacy. In this
method the user uses the RSA algorithm and generates the encrypted messages that are sorted priority-wise
and then sent. The receiver, on receiving the messages decrypts them using the RSA algorithm according to
their priority. This method reduces the risk of man-in-middle attacks and timing attacks as the encrypted
and decrypted messages are further jumbled based on their priority. It also reduces the power monitoring
attack risk if a very small amount of information is exchanged. It raises the bar on the standards of
information security, ensuring more efficiency.
KEYWORDS
RSA Algorithm, Cryptography, Priority Scheduling, Encryption & Decryption, Information Security.
1. INTRODUCTION
Message passing in a confidential manner is the key feature of any successful cryptographic
technique. Cryptography plays a major role in data protection and authenticity in applications
running in a system connected to a network. It allows people to communicate or transfer data
electronically without worries of deceit and deception (confidentially)in addition to ensuring the
integrity of the message and authenticity of the sender. There is a need for cryptographic
algorithms because of the exponential increase in electronic transfer of data in several fields such
as, e-commerce, banking, finance, etc. [1].
Curiosity is one of the most common human traits, matched by the wish to conceal private
information. People often resort to information hiding to pass messages securely, sometimes
deliberately including misleading information. Steganography, a mechanism for hiding
information in apparently innocent pictures, may be used on its own or with other methods [2].
Cryptography is the science of devising methods that allow information to be sent in a secure
form in such a way that the only person able to retrieve this information is the intended recipient
[3]. Cryptanalysis is the science of analysing and breaking secure communication. Classical
cryptanalysis involves an interesting combination of analytical reasoning, application of
DOI : 10.5121/ijnsa.2014.6604 39
2. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
mathematical tools, pattern finding, patience, determination, and luck. Cryptanalysts are also
called attackers. Cryptology embraces both cryptography and cryptanalysis [4].
Cryptography is broadly divided into two categories depending upon the Key; which is defined as
the rules used to convert an original text into encrypted text: - Symmetric Key Cryptography and
Asymmetric Key Cryptography [5]. In symmetric key cryptography, the encryption and
decryption are done using the same key (symmetric key). In asymmetric cryptography, encryption
and decryption are done using different keys.
Encryption fundamentally consists of scrambling a message so that its contents are not readily
accessible while decryption is the reversing of that process. These processes depend on particular
algorithms, known as ciphers [6].
A key is used in conjunction with a cipher to encrypt or decrypt text. The key might appear
meaningful, like a password. However the functionality of a key lies in its usefulness in
determining the mapping of the plain text to the cipher text.
This paper proposes the implementation of RSA algorithm with encryption according to priority
and cypher text transfer in parts, alternatively using round-robin technique.
2. CRYPTOGRAPHY
40
Cryptographic algorithms are classified based on the number of keys used as
Figure 2. Types of Cryptography
2.1. Secret-Key Cryptography
In secret key crypto there is only one key. It is used for both encryption and decryption. A key
refers to any code that yields plain text when applied to cypher text.This key is shared by both
sender and receiver. If the key is disclosed the secrecy of the information is compromised. The
key is known to both the sender and the receiver, hence does not protect the sender from the
receiver forging a message & claiming is sent by sender. Lengthy keys are used to increase the
security and to decrease the chances of identifying the key through brute force. It is relatively fast
as it uses the same key for encryption and decryption [8]. However, more damage if can occur if
the key is compromised. When someone gets their hands on a symmetric key, they can decrypt
everything that was encrypted with that key. Since symmetric encryption is used for two-way
communication, both sender and receiver end data gets compromised.
3. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
41
2.2. Public-Key Cryptography
Public-key/ two-key/ asymmetric cryptography involves the use of two keys: a public-key, which
may be known to everyone, used to encrypt messages and verify signatures and a private-key,
known only to the recipient, used to decrypt messages and sign (create signatures). It is called
asymmetric cryptography because the key used to encrypt messages or verify signatures cannot
be used to decrypt messages or create signatures [8]. Asymmetric key cyphers increase the
security and convenience as private keys never have to be transmitted or revealed to anyone.
Public key encryption is slow compared to symmetric encryption. It is difficult to encrypt bulk
messages. Interference by a third party results in a type of attack called man-in-middle attack.
Damages due loss of private key are mostly irreparable.
Digital signature is a mechanism by which a message is authenticated, proving that amessage is
definitely coming from a given sender, much like a signature on a paper document.
Figure 2. Public Key Cryptosystems: Secrecy and Authentication
2.3. Hash Function
The Hash Function uses a mathematical transformation to irreversibly "encrypt" information. This
algorithm does not use keys for encryption and decryption of data. It rather uses a fixed-length
hash value which is computed based on some plaintext that makes it impossible for either the
contents or the length of the plaintext to be recovered. These algorithms are typically used to
provide a digital fingerprint of a file's contents, often used to ensure that the file has not been
altered by an intruder or virus. Hash functions are also commonly employed by many operating
systems to encrypt passwords to provide some amount of integrity to a file [9].
4. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
42
2.4. Need for Cryptography
Cryptography provides privacy and information security. In this era where information has a lot
of importance such techniques play an important role in several fields.Protecting access to
information for reasons of security is still a major reason for using cryptography. However, it is
also increasingly used for authorization or identification, authentication and non-repudiation.The
identity of e-mail and web users is easy to conceal or forge and secure authentication can give
those interacting remotely confidence that they're dealing with the right person and that a message
hasn't been adulterated.
In commercial situations, non-repudiation is an important concept that helps in maintaining the
stance of the agreeing parties under all circumstances in case of any agreement. Digital signatures
and digital timestamps are used in such situations, often in conjunction with other mechanisms
such as message digests and digital certificates.
The range of uses for cryptography and related techniques is considerable and growing steadily.
Passwords are common but the protection they offer is often illusory, perhaps because security
policies within many organizations aren't well thought out and their use causes more problems
and inconvenience than seems worth it.
In many cases where passwords are used, for example in protecting word processed documents,
the ciphers used are extremely lightweight and can be attacked without difficulty using one of a
range of freely available cracking programs [2] [6] [7].
3. RSA CRYPTOGRAPHIC ALGORITHM
RSA stands forRon Rivest, Adi Shamir and Leonard Adlemanat MIT who first proposed a
description of the algorithm publically in 1977. It is a form of asymmetric cryptography.A user of
RSA creates and then publishes a public key based on the two large prime numbers, along with an
auxiliary value. The prime numbers must be kept secret. Anyone can use the public key to encrypt
a message, but with currently published methods, if the public key is large enough, only someone
with knowledge of the prime numbers can feasibly decode the message[10].
According to the patent issued by theDerwent World Patents Index, RSA algorithm is described
as: The system includes a communications channel coupled to at least one terminal having an
encoding device and to at least one terminal having a decoding device. A message-to-be-transferred
is enciphered to cipher text at the encoding terminal by encoding the message as a
number M in a predetermined set. That number is then raised to a first predetermined power
(associated with the intended receiver) and finally computed. The remainder or residue, C, is...
computed when the exponentiated number is divided by the product of two predetermined prime
numbers (associated with the intended receiver).
5. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
43
Figure 3. Comparative analysis of RSA
A cryptographically strong random number generator, which has been properly seeded with
adequate entropy, must be used to generate the primes p and q. An analysis comparing millions of
public keys gathered from the Internet was carried out in early 2012 by Arjen K. Lenstra, James
P. Hughes, Maxime Augier, Joppe W. Bos, Thorsten Kleinjung and Christophe Wachter. They
were able to factor 0.2% of the keys using only Euclid's algorithm [11][12].
4. PRIORITY SCHEDULING
CPU Scheduling is the basis of multi programming operating system. By switching the CPU
among processes, the operating system can make the computer more productive. Whenever the
CPU becomes idle, the operating system must select one of the processes in the ready queue to be
executed. This selection process is carried out by the Short-term Scheduler are CPU Scheduler. It
selects from all the processes in memory that are ready to execute and allocate the CPU to one of
them. The ready queue can be implemented using one of the scheduling algorithms
Scheduling is done in terms of priority in priority scheduling. Priorities are generally some fixed
range of numbers. However there is no general agreement on whether the smallest number has the
6. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
highest or lowest priority. Some systems use low numbers to represent low priority; others use
low numbers for high priority. This difference can lead to confusion.
Priority scheduling can be either preemptive or nonpreemptive. When a process arrives at the
ready queue, its priority compared with the priority of the currently running process. A
preemptive priority-scheduling algorithm will preempt the CPU if the priority of the newly
arrived process is higher than the priority of the currently running process. A nonpreemptive
priority-scheduling algorithm will simply put the new process at the head of the ready queue.
A major problem with priority-scheduling algorithms is indefinite blocking or starvation. A
solution to this problem is aging. It is the technique of gradually increasing the priority of
processes that wait in the system for a long time.
5. ROUND-ROBIN SCHEDULING
The round-robin scheduling algorithm is designed especially for time sharing systems. It is
similar to First Come First Serve scheduling, but preemption is added to switch between
processes. A small unit of time called a time quantum or time slice is defined. It is generally from
10 to 100 milliseconds. The ready queue is treated as a circular queue. The CPU scheduler goes
around the ready queue, allocating the CPU to each process for a time interval of up to one time
quantum.
To implement RR Scheduling the ready queue is kept as a FIFO queue of processes. New
processes are added to the tail of the ready queue, sets a timer to interrupt after one time quantum
and dispatches the process.
One of two things will then happen. The process may have a CPU burst of less than one quantum
In that case, the process itself will release the CPU voluntarily. Otherwise, the timer will go off
and will cause an interrupt in the operating system. A context switch will be executed and the
process will be put at the tail of the ready queue[13].
6.METHODOLOGY
The RSA Algorithm is used to create a private- public key pair. It is a type of asymmetric key
cryptography.
6.1. RSA Algorithm
44
The steps for implementation of RSA algorithm are given below
1. Get two integers, p and q from the user.
2. Check if p and q are prime. If prime, continue the process, else exit the code.
3.Calculate (p-1)*(q-1) and name it as ɸ(n).
4.Calculate n=p*q.
5.Get an input e to act as private key, under the condition that 1<e<ɸ(n) and gcd(e, ɸ (n)) =1.
(gcd-greatest common divisor)
6.Compute the value of d such that 1 < d <ɸ(n) and e.d ≡ 1 (mod ɸ(n)).
NOTE:
The public key is (n, e) and the private key is (n, d).
The values of p, q and ɸ(n) are private.
7. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
45
‘e’ is the public or encryption exponent.
‘d’ is the private or decryption exponent.
Encryption:
The cypher text C is found by the equation 'C = Me mod n' where M is the original message.
Decryption:
The message M can be found form the cypher text C by the equation 'M = Cd mod n.
Figure 4. Communication using RSA
6.2. Procedure
This paper proposes the RSA algorithm with some variations in its implementation that will
enhance the security of the information transfer. The proposed procedure is given below:
1. The input-prime numbers-(p,q) are obtained from the user.
2. n and ɸ(n) are calculated.
3.All the co-prime numbers from 1 to ɸ(n) are listed out and the user is allowed to choose 'e' from
the given values, in addition to any data required for the normal implementation of the RSA
algorithm.
4.The private key is obtained by calculating’d’.
5.The message that has to be encrypted is obtained from the user along with the priorities for
various parts. The input message is split into low priority, medium priority and high priority parts
by the user.
6.The messages are encrypted (C = Me mod n) and sent to the receiver in parts using round-robin
technique. The receiver decrypts the split messages and joins them using the proposed decryption
algorithm which is essentially the reverse of the encryption algorithm and uses the RSA
algorithm's decryption technique (M=Cd mod n), thus obtaining the message.
8. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
7. A software is proposed to be provided for the implementation of this technique. The back end
is provided using java code
46
Figure 5. Flowchart for proposed algorithm
6.3. Implementation
The implementation of this hybrid algorithm is proposed using VC++. The main menu will
contain options to encrypt and decrypt data. The user will then be asked to give the data, the key
and specify the priority levels of various parts of the data. The output will be the encrypted
message that will automatically be forwarded to the receiver through the specified mode using the
proposed technique. The decryption of data can be done on the receiver’s system using the same
program and the key.
9. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
47
7. CONCLUSION
This paper presents an effective method that combines techniques that can be used to successfully
communicate secretively in a network. The proposed algorithm reduces the effectiveness of
intrusion and brute-force attacks as only a part of the message will be available even if the
intruder interrupts any message and decrypts it. Also decrypting part of a message is not very
easy. It uses RSA Algorithm, one of the most effective and commonly used cryptographic
algorithms and adds more steps to it to reduce attacks. Side channel attacks will not be very
effective on this technique as the power levels and leakages that are used to identify the algorithm
used will vary from that of RSA algorithm. If an intruder is identified then the sending can be
stopped and so, he will not receive the whole message as the messages are sent in parts. This
therefore reduces the effectiveness of the man-in-middle attack. Thus, if combined with effective
methods to prevent side channel and man-in-middle attacks this algorithm will prove to be very
effective. This can also function effectively function as a software that can be used to
encrypt/decrypt messages.
REFERENCES
[1] Nentawe Y. Goshwe, (2013). Data Encryption and Decryption Using RSA Algorithm in a Network
Environment. IJCSNS International Journal of Computer Science and Network Security, VOL.13
No.7.
[2] S. Subasree, N. K. Sakthivel, (2011), Design of a New Security Protocol Using Hybrid Cryptographic
Algorithms, ICECT.
[3] P. Gutmann, (2004). Cryptographic Security Architecture: Design andVerification‖. Springer-Verlag.
[4] Ayushi, (2010). A Symmetric Key Cryptographic Algorithm. International Journal of Computer
Applications (0975 - 8887), VOL.1 No.15.
[5] Suyash Verma, Rajnish Choubey, Roopali Soni, (2012).An Efficient Developed New Symmetric Key
Cryptography Algorithm for Information Security. International Journal of Emerging Technology and
Advanced Engineering, ISSN 2250-2459, Volume 2, Issue 7.
[6] S. D. Galbraith, C. Heneghan, J. F. McKee, (2005), Tunable balancing of RSA, Updated version of
ACISP.
[7] Ravindra Kumar Chahar and et.al, (2007), Design of a new Security Protocol, IEEE International
Conference on Computational Intelligence and Multimedia Applications, pp 132 – 134
[8] Willian Stallings, Cryptography and Network Security: principles and Practice. Tsinghua University
Press, 2002.6
[9] Afolabi, A.O and E.R. Adagunodo, (2012). Implementation of an improved data encryption algorithm
in a web based learning system. International Journal of research and reviews in Computer Science.
Vol. 3, No. 1.
[10] Rivest R, Shamir A, Adleman L, (1978), A Method for Obtaining Digital Signatures and Public-Key
Cryptosystems. Communications of the ACM 21 (2): 120–126.
[11] Markoff, John (February 14, 2012). Flaw Found in an Online Encryption Method. New York Times.
[12] Ron was wrong, Whit is right,Arjen K. Lenstra, James P. Hughes, Maxime Augier, Joppe W. Bos,
Thorsten Kleinjung, and Christophe Wachter, EPFL IC LACAL, Station 14, CH-1015 Lausanne,
Switzerland, Self, Palo Alto, CA, USA.
[13] Abraham Silberschatz, Peter Baer Galvin, Greg Gagne, (2012), Operating System Concepts. Wiley
India Pvt Ltd, Sixth Edition.
10. International Journal of Network Security & Its Applications (IJNSA) Vol.6, No.6, November 2014
48
AUTHORS
Meenakshi Shankar is a final year Electrical and Electronic Engineering and Information
Technology students respectively in Sri Venkateswara College of Engineering,
Sriperumbudur, India. They completed their schooling in 2011 from D.A.V Girls Senior
Secondary School, Gopalapuram, Chennai. They are interested in Information Security and
Cryptography
Akshaya.P is a final year Electrical and Electronic Engineering and Information
Technology students respectively in Sri Venkateswara College of Engineering,
Sriperumbudur, India. They completed their schooling in 2011 from D.A.V Girls Senior
Secondary School, Gopalapuram, Chennai. They are interested in Information Security and
Cryptography