SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2012
SECURITY IN MANETS USING CRYPTOGRAPHY ALGORITHMS
N Neelima1, Lekharaju Sai Siddhartha2, Chavali Meghana3, Shaik Sameer4, Shaik Ashika5,
Vemulamada Naga Chandramouli6
1 Assistant Professor, 2,3,4,5,6 Final year B. Tech, Department of Information Technology, VRSEC, Vijayawada, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Mobile Ad-hoc Network (MANET) is an
important field where many of the users are using mobile
devices for last few years where ad-hoc routing in networks is
one of the prominent issues. A malicious node can drop the
routing information, data packets intentionally and disturb
the process of the routing protocol. To solve this problem, we
proposed a novel approach for effective key management, and
prevention of malicious nodes. Securitytotheroutingprotocol
is incorporated using traditional SHA algorithm along with
symmetric and asymmetric key encryption methods. The
performance of the proposed algorithms is analyzed with
different algorithms and results are shown improvement in
terms of the time taken to transfer the data, communication
overheads and battery consumption.
Key Words: MANETS, Security, Symmetric key
cryptographicalgorithm,Asymmetrickeycryptographic
algorithm, SHA, RSA, AES.
1. INTRODUCTION
Now-a-days the mobile devices are used morefrequently
as every person owns at least a mobile device. We use these
devices for almost everything like to share data, post an
update, and share the information. In such cases these
devices must be secured. Cryptography will be playing a
major role in hiding the data or information. These
cryptography algorithms are divided into two types,
symmetric keycryptography algorithms andasymmetric key
cryptography algorithms. Thesymmetric algorithmswill use
same key for encryption and decryptions of the information.
These are again divided into Block ciphers and stream
ciphers. Block ciphers will use block of data for the
encryption and decryption like AES, DES and Blowfish.
Stream ciphers use single bit at a time like in RC4. In
asymmetric key algorithms, there will be two different keys
used for the encryption and decryption,oneispublic key and
another is private key. We can use one key for encryption
and other for decryption like RSA algorithm. Public key is
public to all but private key is recognized for the user only.
Due to large processing of the keys the asymmetric
algorithms are much slower than the symmetric key
algorithms.
1.1 Goals of Cryptography
1.1.1 Confidentiality: Confidentiality is basically used to
ensure that the data is safe and private this is
obtained using encryption.
1.1.2 Data Integrity: This is to ensure that the data is not
changed intentionally or accidentally.
1.1.3 Authentication: Authentication is to ensure thatthe
originator is original and is known to receiver.
1.1.4 Non-Repudiation: Non-Repudiationistoassurethat
the sender cannot refuse the fact that he send the
message or vice versa.
1.2 Asymmetric Key Algorithm
In asymmetric key algorithm two different keys are used,
one public key and another private key. Generally,thepublic
key is used for the encryption process and the private key is
used for the decryption process because this will make only
the receiver to decrypt the message. So, the sender encrypts
the message with the help of the public key of the receiver
and sends the message, now the receiver will be able to
decrypt the message using his own private key.
1.3 Symmetric key Algorithm
In symmetric key algorithm, we will use only one single key
for both encryption and decryption. The sender will encrypt
the message with a secret key that is shared between the
sender and the receiver privately. This key will be used by
the receiver to decrypt the cipher text from the sender. Thus
in this algorithms one secret key is used.
1.4 Cryptographic hash functions
The cryptographic hash functions are the functionsthattake
an input and return a fixed-size alphanumeric string. The
string is called the hash value or message digest or digital
fingerprint or digest or checksum.
The ideal hash function has three main properties: (a) It is
extremely easy to calculate a hash for any given data. (b)It is
extremely computationally difficult to calculate an
alphanumeric text that has a given hash. (c)It is extremely
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2013
unlikely that two slightly different messages will have the
same hash.
A cryptographic hash function should behave as much as
possible like a random function while still being efficiently
computable. A cryptographic hash function is considered
"insecure" from a cryptographic point of view,ifeitherofthe
following is computationally feasible, finding a (previously
unseen) message that matches a given hash values and
finding "collisions", in which two different messages have
the same hash value.
2. LITERATURE SURVEY
In [1] it is concluded that AES is faster and more efficient
than other encryption algorithms. When the broadcast of
data is considered there is insignificant difference in
performance of different symmetric key schemes. Under the
scenario of data transfer it would be better to use AES
scheme in case the encrypted data is stored at the other end
and decrypted multiple times.
In 2016, Madumita Panda hasdoneperformanceanalysisof
encryption algorithms for security. In this paper, the
professor compared different algorithms in terms of CPU
time, memory, the algorithms include symmetric as well as
asymmetric algorithms.
In 2014, Suni kumar Sahu, Ajay kushwaha have done
analysis of symmetric encryption algorithms for mobile ad
hoc network. In this paper, he compared onlysymmetrickey
algorithms in the MANETS anddisplayedtheresultsinterms
of battery usage, end to end delay, processing time etc. The
author used ns2 simulator to compare the performance of
the algorithms.
In 2016, M V Narayana, Dr G Narsimha, Dr SSVN Sarma
proposed security enhancement in MANETS using SHA
Algorithm [6]. In this paper, the authors proposed a method
to improve the security in the mobile ad hoc networks using
the Secure Hashing Algorithm.
In [2] it states that AES is faster and more proficient than
other encryption algorithms. Increasing the key size by 64
bits of AES leads to increase in energy consumption
about8%without any data transfer. The difference is not
obvious. Reducing the number of rounds leads to power
savings but it makes the protocol insecure for AES and
should be avoided.
3. PROPOSED SYSTEM
The proposed system involves a multi-level security in
MANETS where the data is will undergo the cryptographic
hash function and an encryption algorithm and is sent to the
destination where the data is decrypted and the data is
checked for its integrity using the SHA algorithm.
At the sender the message digest of the data that has to be
sent is obtained using the SHA-256 algorithm, then the data
along with the message digest is encrypted and will be
transmitted to the destination. Whenthemessageisreceived
at the destination it will be decrypted and the hash code
value of the incoming message is compared to the value that
is concatenated to the input string. This way the integrity of
the message is verified.
Now AES algorithm and RSA algorithmsareusedintheplace
of the encryption algorithms and their performance is
compared.
3.1 SHA-256:
SHA-256 belongs to the SHA-2 family of hash functions; the
family consists of SHA-256 and SHA-512 that are
differentiated by the word block sizes. The FIPS PUB 180-2
standard is followed by the SHA-256. This is developed by
the National Institutes of Standards and Technology (NIST)
and other government and private parties.
A hash function is a mathematical function that converts the
input valued into another compressed value of fixed length.
The input to the hash function is of arbitrary length but
output is of fixed length.
SHA-256 operates in the manner of MD4, MD5 and SHA-1.
The message is first padded with itslengthinsucha waythat
the result is a multiple of 512 bit long word then it is parsed
into 512-bit message blocks M1, M2 … Mn. Now theblocksare
processed one at a time beginning from the initial buffer H
(0), sequentially calculate
H(i) = H(i-1) + CMi *( H(i-1) )
Where C is the SHA-256 compression function and + means
word-wise mode 232 addition. H(n) is the hash or message
digest of the message
3.2 RSA Algorithm
RSA is the acronym derived for Ron Rivest, Adi Shamir and
Leonard Adleman, who first described it in 1978. This
algorithm is used to encrypt and decrypt the messages. It is
an asymmetric cryptographic algorithm means it uses two
different keys for encryption and decryption.
The main steps in the RSA algorithm are (a) Key Generation
(b) Encryption (c) Decryption. The key generation can be
done as follows: Generate two large prime numbers p and q
of approximately equal size. Find the product of the two
numbers let it be ‘n’.
n = p*q
Calculate ɸ such that ɸ = (p-1)*(q-1). Next choose ‘e’ such
that
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2014
gcd(e, ɸ ) = 1 , 1 < e < ɸ
Compute the value d such that ed = 1 mod ɸ
Now the Message is encrypted like
Cipher = (Message e) mod n
The cipher message is then decrypted like
Message = (Cipher d) mod n
3.3 AES Algorithm
The Advanced encryption standard is symmetric
key cryptographic algorithm which is also known as
Rijndael. This is a block cipher algorithm used as an
encryption standard by the U.S. government. This is the
enhancement of the DES algorithm; AES is found at least six
times faster than the DES algorithm.
AES algorithm uses 10 rounds for 128-bit keys, 12
rounds for 192-bit key and 14 rounds for the 256-bit keys
where each of these rounds uses a different 128-bit round
key which is calculated from the original AES key.
The encryption in AES is done as follows: (a) Byte
Substitution (b) Shift rows (c) Mix columns (d) Add round
Key. Now the initial message is converted into a non-
readable format (cipher).
The decryption process is similar to the encryption
process but the order of the operations is reverse i.e.(a)Add
round key (b) Mix columns (c) Shift rows (d) Byte
substitution.
The encryption and the decryption processneedsto
be separately implemented although they areverysimilar to
each other.
4. RESULTS
The home page of the project is the following which
allows you to choose the number of nodes to be created in
the MANET
Fig -1: Home Screen
Fig -2: Mobile nodes Simulation
The data is then transferred from the source to destination
with the SHA algorithm and AES algorithm.
Fig -3: AES with SHA
Now the data is transferred using the RSA algorithm and
SHA algorithm
Fig -4: RSA with SHA
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2015
Finally the time and the battery consumptions of both the
techniques are compared and the results are shown below:
Fig -5: Time comparisons for AES with SHA and RSA with
SHA (in seconds)
Fig -6: Battery comparisons for AES with SHA and RSA
with SHA
5. CONCLUSIONS AND FUTURE WORK
The RSA algorithm will consume more time because of the
large processing of the information. This makes the AES
algorithm faster that the RSA algorithm. The battery
consumption factor is also high for the RSA algorithm
because of the calculation of the largeprimesandoperations
on them. This leaves that the AES along with the SHA shows
better results than the RSA along with the SHA.
In future these algorithms will become obsolete as the
advancement of the mobile processing technology and the
introduction of highly advanced processing machines like
super computers and quantum computers. Sothesecurity in
these MANETS are to be provided by the future proof
algorithms rather than algorithms that are vulnerable to
brute force attacks in the future.
REFERENCES
[1] Nagesh Kumar, Jawahar Thakur, Arvind Kalia on
“Performance Analysis Of Symmetric Key Cryptography
Algorithms: DES, AESAndBlowfish―inAnInternational
Journal of Engineering Sciences ISSN: 22296913 Issue
Sept 2011, Vol.4, pp.28-37.
[2] S.Hirani, ''Energy Consumption of Encryption Schemes
in Wireless Devices Thesis,'' university of Pittsburgh,
April 9, 2003. Retrieved October 1, 2008, at:
portal.acm.org/ citation.cfm?id=383768.
[3] Tamimi, A Al; ―Performance Analysis of Data
Encryption Algorithms‖, Oct 2008.
[4] Nadeem, Aamer; "A Performance Comparison of Data
Encryption Algorithms", IEEE 2005.
[5] Ruangchaijatupon, P. Krishnamurthy,‟ Encryption and
Power Consumption in Wireless LANs-N,‟‟ The Third
IEEE Workshop on Wireless LANs -September 27-28,
2001- Newton, Massachusetts.
[6] M V Narayana, Dr G Narsimha,DrSSVN Sarma proposed
“Security enchancement in MANETS using SHA
Algorithm”, 2016.
[7] W. Stallings. “Cryptography and Network Security”:
Principlesand Practice. Prentice Hall, 2nd edition, 1999.

More Related Content

What's hot

RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextYekini Nureni
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit vArthyR3
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET Journal
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYKathirvel Ayyaswamy
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...IJCSIS Research Publications
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithmijtsrd
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...editor1knowledgecuddle
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography Durgesh Malviya
 
A Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing AlgorithmsA Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing AlgorithmsIRJET Journal
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imageseSAT Journals
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variantsijsrd.com
 

What's hot (20)

RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and TextRSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text
 
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
A New Design of Algorithm for Enhancing Security in Bluetooth Communication w...
 
82 86
82 8682 86
82 86
 
Unit 4
Unit 4Unit 4
Unit 4
 
Unit 2
Unit 2Unit 2
Unit 2
 
CNS - Unit v
CNS - Unit vCNS - Unit v
CNS - Unit v
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Unit 3(1)
Unit 3(1)Unit 3(1)
Unit 3(1)
 
Unit 7 : Network Security
Unit 7 : Network SecurityUnit 7 : Network Security
Unit 7 : Network Security
 
IRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid CryptographyIRJET- Message Encryption using Hybrid Cryptography
IRJET- Message Encryption using Hybrid Cryptography
 
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITYCS6701 CRYPTOGRAPHY AND NETWORK SECURITY
CS6701 CRYPTOGRAPHY AND NETWORK SECURITY
 
50120140507006
5012014050700650120140507006
50120140507006
 
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
Caesar Cipher Method Design and Implementation Based on Java, C++, and Python...
 
Image Cryptography using RSA Algorithm
Image Cryptography using RSA AlgorithmImage Cryptography using RSA Algorithm
Image Cryptography using RSA Algorithm
 
Encryption
EncryptionEncryption
Encryption
 
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
Comparative Analysis of Cryptographic Algorithms and Advanced Cryptographic A...
 
White Paper on Cryptography
White Paper on Cryptography White Paper on Cryptography
White Paper on Cryptography
 
A Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing AlgorithmsA Survey of Password Attacks and Safe Hashing Algorithms
A Survey of Password Attacks and Safe Hashing Algorithms
 
Security analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital imagesSecurity analysis of fbdk block cipher for digital images
Security analysis of fbdk block cipher for digital images
 
A Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA VariantsA Literature Review of Some Modern RSA Variants
A Literature Review of Some Modern RSA Variants
 

Similar to Security in Manets using Cryptography Algorithms

Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 
Enhancement in data security and integrity using minhash technique
Enhancement in data security and integrity using minhash  techniqueEnhancement in data security and integrity using minhash  technique
Enhancement in data security and integrity using minhash techniquenooriasukmaningtyas
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONIJNSA Journal
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationIRJET Journal
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...journalBEEI
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographicijcsa
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption StandardIRJET Journal
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationIRJET Journal
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithmijtsrd
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmeSAT Publishing House
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsMahmudJion
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...IOSR Journals
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...Kimberly Thomas
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanismShubham Patil
 

Similar to Security in Manets using Cryptography Algorithms (20)

Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 
Enhancement in data security and integrity using minhash technique
Enhancement in data security and integrity using minhash  techniqueEnhancement in data security and integrity using minhash  technique
Enhancement in data security and integrity using minhash technique
 
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATIONENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
ENHANCED SECURE ALGORITHM FOR MESSAGE COMMUNICATION
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
Design of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure CommunicationDesign of Hybrid Cryptography Algorithm for Secure Communication
Design of Hybrid Cryptography Algorithm for Secure Communication
 
H42063743
H42063743H42063743
H42063743
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
 
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Schedu...
 
State of the art realistic cryptographic
State of the art realistic cryptographicState of the art realistic cryptographic
State of the art realistic cryptographic
 
DES- Data Encryption Standard
DES- Data Encryption StandardDES- Data Encryption Standard
DES- Data Encryption Standard
 
Mj3422172221
Mj3422172221Mj3422172221
Mj3422172221
 
An Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit ComplementationAn Enhanced Encryption Technique using BCD and Bit Complementation
An Enhanced Encryption Technique using BCD and Bit Complementation
 
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA AlgorithmEncryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
Encryption Data Measurement and Data Security of Hybrid AES and RSA Algorithm
 
Implementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithmImplementation of aes and blowfish algorithm
Implementation of aes and blowfish algorithm
 
Comparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ ApplicationsComparative Study of Cryptography Algorithms and Its’ Applications
Comparative Study of Cryptography Algorithms and Its’ Applications
 
Cryptography
CryptographyCryptography
Cryptography
 
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
Generate an Encryption Key by using Biometric Cryptosystems to secure transfe...
 
The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...The Time-Consuming Task Of Preparing A Data Set For...
The Time-Consuming Task Of Preparing A Data Set For...
 
File transfer with multiple security mechanism
File transfer with multiple security mechanismFile transfer with multiple security mechanism
File transfer with multiple security mechanism
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.eptoze12
 

Recently uploaded (20)

Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.Oxy acetylene welding presentation note.
Oxy acetylene welding presentation note.
 

Security in Manets using Cryptography Algorithms

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2012 SECURITY IN MANETS USING CRYPTOGRAPHY ALGORITHMS N Neelima1, Lekharaju Sai Siddhartha2, Chavali Meghana3, Shaik Sameer4, Shaik Ashika5, Vemulamada Naga Chandramouli6 1 Assistant Professor, 2,3,4,5,6 Final year B. Tech, Department of Information Technology, VRSEC, Vijayawada, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Mobile Ad-hoc Network (MANET) is an important field where many of the users are using mobile devices for last few years where ad-hoc routing in networks is one of the prominent issues. A malicious node can drop the routing information, data packets intentionally and disturb the process of the routing protocol. To solve this problem, we proposed a novel approach for effective key management, and prevention of malicious nodes. Securitytotheroutingprotocol is incorporated using traditional SHA algorithm along with symmetric and asymmetric key encryption methods. The performance of the proposed algorithms is analyzed with different algorithms and results are shown improvement in terms of the time taken to transfer the data, communication overheads and battery consumption. Key Words: MANETS, Security, Symmetric key cryptographicalgorithm,Asymmetrickeycryptographic algorithm, SHA, RSA, AES. 1. INTRODUCTION Now-a-days the mobile devices are used morefrequently as every person owns at least a mobile device. We use these devices for almost everything like to share data, post an update, and share the information. In such cases these devices must be secured. Cryptography will be playing a major role in hiding the data or information. These cryptography algorithms are divided into two types, symmetric keycryptography algorithms andasymmetric key cryptography algorithms. Thesymmetric algorithmswill use same key for encryption and decryptions of the information. These are again divided into Block ciphers and stream ciphers. Block ciphers will use block of data for the encryption and decryption like AES, DES and Blowfish. Stream ciphers use single bit at a time like in RC4. In asymmetric key algorithms, there will be two different keys used for the encryption and decryption,oneispublic key and another is private key. We can use one key for encryption and other for decryption like RSA algorithm. Public key is public to all but private key is recognized for the user only. Due to large processing of the keys the asymmetric algorithms are much slower than the symmetric key algorithms. 1.1 Goals of Cryptography 1.1.1 Confidentiality: Confidentiality is basically used to ensure that the data is safe and private this is obtained using encryption. 1.1.2 Data Integrity: This is to ensure that the data is not changed intentionally or accidentally. 1.1.3 Authentication: Authentication is to ensure thatthe originator is original and is known to receiver. 1.1.4 Non-Repudiation: Non-Repudiationistoassurethat the sender cannot refuse the fact that he send the message or vice versa. 1.2 Asymmetric Key Algorithm In asymmetric key algorithm two different keys are used, one public key and another private key. Generally,thepublic key is used for the encryption process and the private key is used for the decryption process because this will make only the receiver to decrypt the message. So, the sender encrypts the message with the help of the public key of the receiver and sends the message, now the receiver will be able to decrypt the message using his own private key. 1.3 Symmetric key Algorithm In symmetric key algorithm, we will use only one single key for both encryption and decryption. The sender will encrypt the message with a secret key that is shared between the sender and the receiver privately. This key will be used by the receiver to decrypt the cipher text from the sender. Thus in this algorithms one secret key is used. 1.4 Cryptographic hash functions The cryptographic hash functions are the functionsthattake an input and return a fixed-size alphanumeric string. The string is called the hash value or message digest or digital fingerprint or digest or checksum. The ideal hash function has three main properties: (a) It is extremely easy to calculate a hash for any given data. (b)It is extremely computationally difficult to calculate an alphanumeric text that has a given hash. (c)It is extremely
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2013 unlikely that two slightly different messages will have the same hash. A cryptographic hash function should behave as much as possible like a random function while still being efficiently computable. A cryptographic hash function is considered "insecure" from a cryptographic point of view,ifeitherofthe following is computationally feasible, finding a (previously unseen) message that matches a given hash values and finding "collisions", in which two different messages have the same hash value. 2. LITERATURE SURVEY In [1] it is concluded that AES is faster and more efficient than other encryption algorithms. When the broadcast of data is considered there is insignificant difference in performance of different symmetric key schemes. Under the scenario of data transfer it would be better to use AES scheme in case the encrypted data is stored at the other end and decrypted multiple times. In 2016, Madumita Panda hasdoneperformanceanalysisof encryption algorithms for security. In this paper, the professor compared different algorithms in terms of CPU time, memory, the algorithms include symmetric as well as asymmetric algorithms. In 2014, Suni kumar Sahu, Ajay kushwaha have done analysis of symmetric encryption algorithms for mobile ad hoc network. In this paper, he compared onlysymmetrickey algorithms in the MANETS anddisplayedtheresultsinterms of battery usage, end to end delay, processing time etc. The author used ns2 simulator to compare the performance of the algorithms. In 2016, M V Narayana, Dr G Narsimha, Dr SSVN Sarma proposed security enhancement in MANETS using SHA Algorithm [6]. In this paper, the authors proposed a method to improve the security in the mobile ad hoc networks using the Secure Hashing Algorithm. In [2] it states that AES is faster and more proficient than other encryption algorithms. Increasing the key size by 64 bits of AES leads to increase in energy consumption about8%without any data transfer. The difference is not obvious. Reducing the number of rounds leads to power savings but it makes the protocol insecure for AES and should be avoided. 3. PROPOSED SYSTEM The proposed system involves a multi-level security in MANETS where the data is will undergo the cryptographic hash function and an encryption algorithm and is sent to the destination where the data is decrypted and the data is checked for its integrity using the SHA algorithm. At the sender the message digest of the data that has to be sent is obtained using the SHA-256 algorithm, then the data along with the message digest is encrypted and will be transmitted to the destination. Whenthemessageisreceived at the destination it will be decrypted and the hash code value of the incoming message is compared to the value that is concatenated to the input string. This way the integrity of the message is verified. Now AES algorithm and RSA algorithmsareusedintheplace of the encryption algorithms and their performance is compared. 3.1 SHA-256: SHA-256 belongs to the SHA-2 family of hash functions; the family consists of SHA-256 and SHA-512 that are differentiated by the word block sizes. The FIPS PUB 180-2 standard is followed by the SHA-256. This is developed by the National Institutes of Standards and Technology (NIST) and other government and private parties. A hash function is a mathematical function that converts the input valued into another compressed value of fixed length. The input to the hash function is of arbitrary length but output is of fixed length. SHA-256 operates in the manner of MD4, MD5 and SHA-1. The message is first padded with itslengthinsucha waythat the result is a multiple of 512 bit long word then it is parsed into 512-bit message blocks M1, M2 … Mn. Now theblocksare processed one at a time beginning from the initial buffer H (0), sequentially calculate H(i) = H(i-1) + CMi *( H(i-1) ) Where C is the SHA-256 compression function and + means word-wise mode 232 addition. H(n) is the hash or message digest of the message 3.2 RSA Algorithm RSA is the acronym derived for Ron Rivest, Adi Shamir and Leonard Adleman, who first described it in 1978. This algorithm is used to encrypt and decrypt the messages. It is an asymmetric cryptographic algorithm means it uses two different keys for encryption and decryption. The main steps in the RSA algorithm are (a) Key Generation (b) Encryption (c) Decryption. The key generation can be done as follows: Generate two large prime numbers p and q of approximately equal size. Find the product of the two numbers let it be ‘n’. n = p*q Calculate ɸ such that ɸ = (p-1)*(q-1). Next choose ‘e’ such that
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2014 gcd(e, ɸ ) = 1 , 1 < e < ɸ Compute the value d such that ed = 1 mod ɸ Now the Message is encrypted like Cipher = (Message e) mod n The cipher message is then decrypted like Message = (Cipher d) mod n 3.3 AES Algorithm The Advanced encryption standard is symmetric key cryptographic algorithm which is also known as Rijndael. This is a block cipher algorithm used as an encryption standard by the U.S. government. This is the enhancement of the DES algorithm; AES is found at least six times faster than the DES algorithm. AES algorithm uses 10 rounds for 128-bit keys, 12 rounds for 192-bit key and 14 rounds for the 256-bit keys where each of these rounds uses a different 128-bit round key which is calculated from the original AES key. The encryption in AES is done as follows: (a) Byte Substitution (b) Shift rows (c) Mix columns (d) Add round Key. Now the initial message is converted into a non- readable format (cipher). The decryption process is similar to the encryption process but the order of the operations is reverse i.e.(a)Add round key (b) Mix columns (c) Shift rows (d) Byte substitution. The encryption and the decryption processneedsto be separately implemented although they areverysimilar to each other. 4. RESULTS The home page of the project is the following which allows you to choose the number of nodes to be created in the MANET Fig -1: Home Screen Fig -2: Mobile nodes Simulation The data is then transferred from the source to destination with the SHA algorithm and AES algorithm. Fig -3: AES with SHA Now the data is transferred using the RSA algorithm and SHA algorithm Fig -4: RSA with SHA
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 04 Issue: 03 | Mar -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 2015 Finally the time and the battery consumptions of both the techniques are compared and the results are shown below: Fig -5: Time comparisons for AES with SHA and RSA with SHA (in seconds) Fig -6: Battery comparisons for AES with SHA and RSA with SHA 5. CONCLUSIONS AND FUTURE WORK The RSA algorithm will consume more time because of the large processing of the information. This makes the AES algorithm faster that the RSA algorithm. The battery consumption factor is also high for the RSA algorithm because of the calculation of the largeprimesandoperations on them. This leaves that the AES along with the SHA shows better results than the RSA along with the SHA. In future these algorithms will become obsolete as the advancement of the mobile processing technology and the introduction of highly advanced processing machines like super computers and quantum computers. Sothesecurity in these MANETS are to be provided by the future proof algorithms rather than algorithms that are vulnerable to brute force attacks in the future. REFERENCES [1] Nagesh Kumar, Jawahar Thakur, Arvind Kalia on “Performance Analysis Of Symmetric Key Cryptography Algorithms: DES, AESAndBlowfish―inAnInternational Journal of Engineering Sciences ISSN: 22296913 Issue Sept 2011, Vol.4, pp.28-37. [2] S.Hirani, ''Energy Consumption of Encryption Schemes in Wireless Devices Thesis,'' university of Pittsburgh, April 9, 2003. Retrieved October 1, 2008, at: portal.acm.org/ citation.cfm?id=383768. [3] Tamimi, A Al; ―Performance Analysis of Data Encryption Algorithms‖, Oct 2008. [4] Nadeem, Aamer; "A Performance Comparison of Data Encryption Algorithms", IEEE 2005. [5] Ruangchaijatupon, P. Krishnamurthy,‟ Encryption and Power Consumption in Wireless LANs-N,‟‟ The Third IEEE Workshop on Wireless LANs -September 27-28, 2001- Newton, Massachusetts. [6] M V Narayana, Dr G Narsimha,DrSSVN Sarma proposed “Security enchancement in MANETS using SHA Algorithm”, 2016. [7] W. Stallings. “Cryptography and Network Security”: Principlesand Practice. Prentice Hall, 2nd edition, 1999.