Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
AI
The analysis of the RSA cryptosystem's security highlights vulnerabilities related to the size of the private exponent d when it is less than n^0.292, as indicated by Wiener's attack. This paper seeks to extend the range of d up to n^0.5, enhancing the encryption's resilience against potential attacks. By scrutinizing various factors influencing encryption algorithms' performance, this study aims to contribute to the development of more secure communication protocols.
IJSRD, 2013
Presently on a daily basis sharing the information over web is becoming a significant issue due to security problems. Thus lots of techniques are needed to protect the shared info in academic degree unsecured channel. The present work target cryptography to secure the data whereas causing inside the network. Encryption has come up as a solution, and plays an awfully necessary role in data security. This security mechanism uses some algorithms to scramble info into unclear text which can be exclusively being decrypted by party those possesses the associated key. This paper is expounded the varied forms of algorithmic rule for encryption & decryption: DES, AES, RSA, and Blowfish. It helps to hunt out the best algorithmic rule.
Journal of Ultra Computer and information Technology, 2017
Now a day mostly people are doing their daily routine digitally, because current era is based on information and communication technology. But security is one of the most important and challenging issues in this technological world. As per the literature analysis there is a demand for a encryption which should be strong and efficient. Cryptography is a private secure communication in the public world. Cryptography is a technique of protecting secure information from hacking and cracking by unauthorized individuals and converting it into unintelligible form. It provides authentication, identification to user data, confidentiality and also provides security and privacy to the data stored. It is an emerging technology in the area of network security. There is a broad range of cryptographic algorithms that are used for securing networks and presently continuous researches on the new cryptographic algorithms are going on for evolving more advanced techniques for secures communication. The main objective of this paper is to study the basic terms used in cryptography, its purpose and to compare the encryption techniques used in cryptography.
In today's information age, communication play a very important role which help in growth of new technologies. So security is an essential parameter to be considered. A mechanism is therefore needed to secure the information that is sent. The process of transforming the original information into an unreadable format is known as encryption. The process of again converting the unreadable format in to the original information is known as decryption. The study of both encryption and decryption is known as cryptography. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) .This paper provides a detailed description of all these cryptography techniques and a public key cryptography algorithm RSA.
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost synonymous with encryption i.e. the conversion of plain text to a cryptic text to secure it against unauthorized users. Encryption techniques are typically divided into two generic types: symmetric key encryption and asymmetric key encryption. Encryption methods in which both the sender and receiver share the same key are referred to as symmetric key encryption schemes. Encryption methods in which encryption and decryption are performed using the different keys, one a public key and one a private key are referred to as asymmetric key encryption schemes. This paper provides a performance comparison between four popular and commonly used encryption algorithms: DES, 3DES, AES, and RSA. DES, 3DES, and AES are symmetric key encryption algorithms while as RSA is an asymmetric key encryption algorithm.
IJARCCE
Cryptography is one of the important and useful technique in which usually a particular file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data or file transmission between original sender and receiver. In this transmission file of unreadable format is send, after receiving this file receiver used the similar algorithm technique and private key for getting the original file data. In this procedure various algorithms are used as a processing function and depending on that algorithm we used the private key. The power or strength of any algorithm is depending on the secret key used in sender client and receiver side client.
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2022
This paper explores many important Symmetric and Asymmetric Cryptography algorithms and their essence in network security. As the use of the internet has grown, so have attacks on the communication channels. These attacks can be used by third parties to obtain sensitive data about your organization and its activities. This data can be used to compromise an organization's operations or blackmail the organisation to pay for the data. To avoid these situations, such algorithms are adapted to protect communications. These algorithms encrypt data that is nearly impossible for unauthorized persons to read, making it unusable for attackers. These algorithms therefore play an important role in the security of communications. This paper states a study of symmetric and asymmetric algorithms in terms of optimal resource allocation, potential attacks which can be used to exploit these algorithms, time consumption, power consumption, overall structure and some other basis Along with explanation of some of the security attacks.
Cryptography is the art and science of keeping massages secure. It is the study of techniques related to aspects of information security such as information privacy, integrity, authentication and non-repudiation. Cryptography is almost synonymous with encryption i.e. the conversion of plain text to a cryptic text to secure it against unauthorized users. Encryption techniques are typically divided into two generic types: symmetric key encryption and asymmetric key encryption. Encryption methods in which both the sender and receiver share the same key are referred to as symmetric key encryption schemes. Encryption methods in which encryption and decryption are performed using the different keys, one a public key and one a private key are referred to as asymmetric key encryption schemes. This paper provides a performance comparison between four popular and commonly used encryption algorithms: DES, 3DES, AES, and RSA. DES, 3DES, and AES are symmetric key encryption algorithms while as RSA is an asymmetric key encryption algorithm.
Computer systems have undoubtedly become universal in today's world, and also, therefore, a lot of this info is made digital. Additionally, with the advancement of the internet, this relevant information is currently circulated. Licensed individuals can easily now send and also fetch info coming from a distance making use of a local area network. Although the three above mentioned security objectives-confidentiality, honesty and also accessibility-still stay of prime usefulness, they currently have some brand new dimensions. Indeed, not only carry out the pcs consisting of the information need to have to be safe, the network additionally needs to have to be just as safe and secure. This paper provides a study on cryptographic principles and cryptographic models. 5733 information in the cloud are certainly not assured. The paper concludes by mentioning that much job needs to have to become done for a trusted public cloud setting to become a reality. Software-Defined Social Network, which is a brand-new approach to designing, building as well as dealing with systems. It splits the network's control (brains) as well as forwarding (muscle mass) aeroplanes to make it less complicated to improve each. In this unique atmosphere, an Operator works as the "human brains," providing a theoretical, centralized perspective of the entire network. Through the Operator, network managers may rapidly as well as conveniently make as well as push out choices on how the rooting units (changes, routers) of the forwarding plane will deal with the website traffic. The paper concedes that SDN is capable of assisting the compelling attributes of potential network functionalities and reasonable requests while decreasing operating costs through streamlined hardware, program, and also control. Nevertheless, several problems in the place of efficiency, scalability, security, as well as interoperability, need to have to become gotten rid of.
Cryptography means secret writing. When the data are transferred from sender to receiver over the network through information channel any third parties can intensively read and may modify the data. Here in this paper we elaborate how cryptography will help to secure the data between authorized people. In order to transfer secure data the data will convert to unreadable form before transmitting to the channel. The cryptography applications range have been expanded a lot in the modern area after the development of communication means; cryptography is essentially required to ensure that data are protected against penetrations and to prevent espionage. Also, cryptography is a powerful mean in securing e-commerce. This paper focuses on analysing different types of cryptography, concept of encryption and decryption, a brief introduction to cryptography techniques. If we are taking about security of information then following services come in mind i.e. Confidentiality (privacy of information), Authentication, Integrity (has not been altered) This paper also provides a detailed description of cryptography techniques in Symmetric encryption and a public key cryptography algorithm RSA in Asymmetric encryption.
International Journal of Advanced Networking and Applications
In this fast transforming world finance and money is also transforming on a high note.Digitalized strength and other innovative systems and instruments are creating new platforms for financial traction who rectify and assume your transaction. Crypto is one such platform where transactions are secured and verified trustfully. Here in this paper, we will come to know how mathematics has enhanced the word of cryptography.In this paper we are going to study about role of mathematics in crypto text, encryption, symmetric key, stream, block cypher, asymmetric key and functions along with hash function,.Crypto key management andEfficient implementation. This paper provides a pure knowledge of application of mathematics in cryptography and how mathematics has enhanced in a truly different way.
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
Objectives: Computer security is all about the study of cyber attacks with a view to defend against them. Cryptography is considered to be a class of science by using the special art of transforming information in a protected way such that it can overcome the attacks. There is an immense requirement of strong cryptographic algorithms in order to withstand against the various attacks. Methods: The Kerchoff''s Principle states that the encryption and decryption algorithms are always available to anyone. The security of the cipher against any sort of attack should be depends only on the secrecy of the key. There comes the play of cryptanalysis. It is art of breaking the keys by identifying the vulnerabilities existing in the systems. This paper deals with the classical encryption schemes and their cryptanalysis. The cryptanalysis for various encryption schemes differs a lot. Various cryptanalysis like statistical analysis, frequency analysis, trial and error (brute force) are carried out in this work. Findings: The classical encryption schemes such as caesar cipher, shift cipher, vigenere cipher, affine cipher and hill cipher are discussed in the paper. A detailed analysis about the security of the above mentioned ciphers are explored. Among the ciphers it is identified that if the key varies for each plaintext to be encrypted provides added security. But the worst is the management of the huge key space. A modified algorithm is proposed which can provide a better security using simple computations. In this approach lots of keys are used but generated from a single key by using simple shift and EXOR operation. In the main stream only one key need to be exchanged between the communication entities and for that exchange we can make use of the public key cryptosystem. Application: Cryptography is considered to be an ineluctable field in era of communication. Cryptographic algorithms acts as an underpinning for lots of applications such as Anonymous Remailers, Digital Signatures, Secured Money transactions etc.
In this modern world of communications, cryptography has an important role in the security of data transmission and is the best method of data protection against passive and active fraud. Cryptography is an algorithmic process of converting a plain text or clear text message to a cipher text or cipher message based on an algorithm that both the sender and receiver know. There are a number of algorithms for performing encryption and decryption, but comparatively few such algorithms have stood the test of time. The most successful algorithms use a key. In this paper, we may gain knowledge about the cryptography algorithms and its role in Encryption and Decryption.
Security can be defined as the quality or state of being secure or in other words to be free from danger. security can be provided in multiple ways like Physical security, Personal security ,Communications security ,Network security, Information security etc. The survey deals with information security that is the protection of information and its critical elements, including the systems and hardware that use, store, and transmit that information .To provide security to the data various cryptographic algorithms are used. The survey brings out the analysis made on different algorithms and introducing new emerging techniques in the field of cryptography. . Keywords-visual cryptography, Chaos based cryptography, quantum based cryptography, Bio-metric based cryptography. 52 Maya Mohan, Jeevan Prakash V II. DESCRIPTION
2013
Cryptography is the study of Secret (crypto-) writing (-graphy) that is concealing the content of message from all except the sender and the receiver and to authenticate the correctness of message to the recipient. Data security is the challenging issue of today that touches many areas including computers and communication. Recent cyber security attacks have certainly played with the sentiments of the users. Cryptography is one such way to make sure that confidentiality, authentication, integrity, availability and identification of user data can be maintained as well as security and privacy of data can be provided to the user. We have analysed three algorithms DES, Triple DES and RSA. DES and Triple DES is symmetric key cryptographic algorithm and RSA is an asymmetric key cryptographic algorithm, they have been analysed on their ability to secure data, time taken to encrypt data and throughput the algorithm requires. Performance of different algorithms is different according to the ...
—Securing information includes various approaches in order to protect and mitigate threats that can cause severe damage to precious information and resources which are available all over the internet and computer systems. Cryptography is a technique utilized to secure personal data by encoding it and protecting it by giving authorized and secure access there by ensuring safety. This paper explores various new technologies like circular encryption, password based cryptography. In addition, this paper will dive deep into cryptanalysis and its applications. Keywords— Cryptography, symmetric key, asymmetric key, cryptanalysis, password based encryption, salt.
2016
Cryptography is a very important tool for protecting information in Internet. Every time we connect to the Internet the browser uses appropriate cryptographic algorithms on our behalf. There are various cryptography techniques under the symmetric and asymmetric cryptosystem. The perfect selection of specific encryption scheme play important role to exchange the information and to enhance security objectives. The study is done some of the more popular cryptography algorithm currently in used. Practical cryptosystems are either symmetric or asymmetric in nature. This paper compares both the scheme on the basis of different parameter and also compares trendy encryption techniques for convinced selection of both key and cryptographic scheme. Finally this comprehensive analysis thrash outs the latest trends and research issues upon cryptographic elements to conclude forthcoming necessities related to cryptographic key, algorithm structure and enhanced privacy.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.