Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2020, International Journal of Computer Applications
An increase in network technology development has its own downside; thus as more connections are established with various global computer networks daily, the more exposed the connected systems are to unauthorized access, thus making security of data very important to address. Internet based transaction applications such as internet banking, online shopping, etc., involves sharing of very sensitive information between two or more parties that should be confidential. This requires very secure end-to-end connections that will ensure the data integrity, confidentiality, authenticity, etc. Cryptography is one of the most reliable and best, if not the best way to keep sensitive data from unauthorized users. This implies a good cryptosystem that maximizes security of the information been transferred and minimizes a substantial amount of delay time is needed. This is dependent on the particular cryptosystem one chooses to secure information. Also of the two known types of cryptosystems, the best in security is asymmetric cryptosystems, which uses two different keys; one for encryption and the other for decryption, whiles symmetric cryptosystems use the same key for both encryption and decryption. The essential features of asymmetric cryptosystems that determines their efficiency and security are; encryption computation time, decryption computation time, performance, encryption throughput, decryption throughput, throughput, randomness, key length and Operation per Instruction (O/I). This research seeks to examine these properties of some asymmetric cryptosystems and subsequently develop a proposed cryptosystem that is more secure and efficient. The results of this research clearly demonstrate that, the proposed cryptosystem has better results for all the properties stated above.
Computer systems have undoubtedly become universal in today's world, and also, therefore, a lot of this info is made digital. Additionally, with the advancement of the internet, this relevant information is currently circulated. Licensed individuals can easily now send and also fetch info coming from a distance making use of a local area network. Although the three above mentioned security objectives-confidentiality, honesty and also accessibility-still stay of prime usefulness, they currently have some brand new dimensions. Indeed, not only carry out the pcs consisting of the information need to have to be safe, the network additionally needs to have to be just as safe and secure. This paper provides a study on cryptographic principles and cryptographic models. 5733 information in the cloud are certainly not assured. The paper concludes by mentioning that much job needs to have to become done for a trusted public cloud setting to become a reality. Software-Defined Social Network, which is a brand-new approach to designing, building as well as dealing with systems. It splits the network's control (brains) as well as forwarding (muscle mass) aeroplanes to make it less complicated to improve each. In this unique atmosphere, an Operator works as the "human brains," providing a theoretical, centralized perspective of the entire network. Through the Operator, network managers may rapidly as well as conveniently make as well as push out choices on how the rooting units (changes, routers) of the forwarding plane will deal with the website traffic. The paper concedes that SDN is capable of assisting the compelling attributes of potential network functionalities and reasonable requests while decreasing operating costs through streamlined hardware, program, and also control. Nevertheless, several problems in the place of efficiency, scalability, security, as well as interoperability, need to have to become gotten rid of.
International Journal of Swarm Intelligence and Evolutionsary Computation (Print), 2016
IJSRP, 2019
The cryptography is the art of protecting information by transforming encryption into unreadable format called cipher text. Only those who possess a secret key can decipher the message into plaintext. Either single or more cryptographic primitives are often used to develop a more complex algorithm which is called cryptosystem. Michael O. Rabin Cryptosystem can generate same ciphertext form different plaintext as well as multiple plaintext from single cyphertext. There are a number of techniques to reveal original plaintext, but none of them can separate similar cyphertext against each plaintext generated from modular reduction arithmetic. Another problem is forgery attack on Rabin signcryption algorithm and private key derivation. To solve those issues, a new cryptosystem has been designed which can efficiently separate similar ciphertext against each plaintext by removing all of the problem of Rabin cryptosystem identified in problem statements. The proposed cryptosystem comprises five algorithms: Key generation, Encryption, Decryption, Signature generation and Signature verification algorithm. To authenticate message, the syncryption algorithm has been designed. The proposed cryptosystem construction based on quadratic residue, quadratic quotient, floor function and absolute value counting, Diffie-Hellman key exchange protocol, concept of Michael O. Rabin signature algorithm, and probability theorem. The advantage of proposed crypto intensive technique is intended receiver gets only one plain value distinguishing the ciphertext against the plaintext by verifying signature of sender. Another advantage is that the sender generate signature using encrypted text and intended receiver can retrieve plaintext from signature through signature verification system. The proposed crypto technique requires less time complexity and probably secure against man in-the-middle attack, chosen plaintext, cyphertext attack and modular squaring attack. The newly designed techniques uses random padding system including additional quotient and residuum. In terms of signature, Rabin signature is pair but proposed cryptosystem uses 4-tuple signature system. Keywords: Cryptosystem, key distribution protocol, Extended Euclidean Algorithm, Chinese Remainder Theorem, Legendre Symbol, Congruence, ASCII- Code, Quadratic reciprocity, Jacobi Symbol, Dedekind sum. Group isomorphism, Cipher, Biswas cryptosystem.
International Journal of Electrical and Computer Engineering (IJECE), 2024
The elliptic curve cryptosystem (ECC) has several applications in Information Security, especially in cryptography with two main activities including encrypting and decrypting. There were several solutions of different research teams which propose various forms of the elliptic curve cryptosystem on cryptographic sector. In the paper, we proposed a solution for applying the elliptic curve on cryptography which is based on these proposals as well as basic idea about the elliptic curve cryptosystem. We also make comparison between our proposal and other listed solution in the same application of the elliptic curve for designing encryption and decryption algorithms. The comparison results are based on parameters such as time consumption (t), RAM consumption (MB), source code size (Bytes), and computational complexity.
2002
Cryptographic techniques have become a standard component in many communications settings. There is now a wide variety of tools, both in hardware and software, providing encryption for data security and digital signatures for authentication. Almost everyone involved in data transfer encounters these tools in the course of their work. End users may wish to send electronic mail or store data locally without fear that this information can be accessed by unauthorized persons. Hardware and software developers may similarly wish to incorporate encryption or authentication schemes in their products. Because of the dizzying array of options, many users are confronted with questions they may not be prepared to answer: which tools, and more specifically, which algorithms, are most appropriate for a given task? In this article, we survey some commonly available cryptographic algorithms, discuss their security and make recommendations as to which algorithms are best suited to which applications.
Cryptography refers to the tools and techniques used to make messages secure for communication between the participants and make messages immune to attacks by hackers. For private communication through public network, cryptography plays a very crucial role. Cryptography is a method to provide information confidentiality, authenticity and integrity .Cryptography can be categorized into symmetric or asymmetric. In this paper we have defined and analyzed various cryptographic symmetric algorithms like DES, Triple DES, AES and asymmetric key cryptographic algorithms like RSA.
International Journal of Advanced Computer Science and Applications
Cryptography plays a vital role for ensuring secure communication between multiple entities. In many contemporary studies, researchers contributed towards identifying best cryptography mechanisms in terms of their performance results. Selection of cryptographic technique according to a particular context is a big question; to answer this question, many existing studies have claimed that technique selection is purely dependent on desired quality attributes such as efficiency and security. It has been identified that existing reviews are either focused only towards symmetric or asymmetric encryption types. Another limitation is found that a criterion for performance comparisons only covers common parameters. In this paper, we have evaluated the performance of different symmetric and asymmetric algorithms by covering multiple parameters such as encryption/decryption time, key generation time and file size. For evaluation purpose, we have performed simulations in a sample context in which multiple cryptography algorithms have been compared. Simulation results are visualized in a way that clearly depicts which algorithm is most suitable while achieving a particular quality attribute.
2017
Data encryption is widely used to assure security in open networks such as the internet. Each kind of data has its own features; therefore, different techniques should be used to protect confidential data from unauthorized access. Currently, most of the available encryption algorithms are used for text data. However, due to large data size and real time constrains, algorithms that are good for textual data may not be suitable for multimedia data. This Paper is a literature survey about block ciphers encryption algorithm( triple-DES, DES,AES, Blow-Fish).In this Paper I have concentrates on providing a starting point for designing strong, secure, and efficient cryptosystems. Various design issues and algorithms have been described in the paper. Paper explains a new timing evaluation model based on random number generating mechanism is proposed here to analyze the time-consuming of the known block cipher symmetric cryptographic algorithms. In this model for evaluation, there is one eva...
International Journal of Engineering Development and Research, 2014
Cryptography is derived from Greek word 'crypto' means secret 'graphy' means writing that is used to conceal the content of message from all except the sender and the receiver and is used to authenticate the correctness of message to the recipient. Today information security is the challenging issue that touches many areas such as computers and communication. Cryptography is such a way that make sure of integrity, availability and identification, confidentiality, authentication of user and as well as security and privacy of data can be provided to the user. In this paper we have defined and analysed various cryptographic symmetric algorithms like DES, Triple DES, Blowfish, AES and IDEA and asymmetric key cryptographic algorithms like RSA. They have been analysed on their ability to secure data, key size, block size, features.
Science and Technology are updating rapidly. Data are transferred through various communicative mediums. Hence always there been a major requirement of confidentiality and secure authorization of information to prevent the unauthorised access and attacks. Symmetric key cryptography is an integral part of cryptographic technique which ensures high security and confidentiality of data transmitted through the communication channel using a common key for both encryption and decryption. There are so many traditional symmetric key algorithms as well as some proposed algorithms which can provide high confidentiality along with authorized access of data. In this paper we made a comparison analysis of some of those proposed algorithms as well as the traditional algorithms of symmetric cryptography with the merits and demerits of those different types algorithm.
Network security is an important aspect of information sharing. Attempts have been made to remove various insecurities over internet. For this, many technological implementations and security policies have been developed. The amount of data, transferred, is not a factor. The basic factor is, how much security, the channel provides while transmitting data. Cryptography is one such technique, which allows secure data transmission without losing its confidentiality and integrity. Based on the key distribution, cryptography is further classified into two major types-Symmetric Key Cryptography and Asymmetric Key Cryptography. In this paper, we have surveyed the traditional algorithms, along with the proposed algorithms based on their pros and cons, related to Symmetric and Asymmetric Key Cryptography. We have also compared the importance of both these cryptographic techniques. The proposed algorithms proved to be highly efficient in their respective grounds but there are certain areas that remained open, related to these algorithms, and have not yet been thoroughly discussed. This paper also presents an appropriate future scope related to these open fields.
2019
: Today’s world is depend on internet and its application where transmitting data through network communication via mail, social group, online banking etc., Hence there comes the requirement of securing the information is a must and so cryptography techniques are employed such as symmetric key and asymmetric key techniques. In this paper, few symmetric and asymmetric key encryption techniques are reviewed, compared and tested with cryptography tools to check its security strength.
Journal of Global Research in Computer Science, 2011
Information is flowing in assorted network across the globe via copious channels. The commercial, personal as well defense communication is relying on different protocols for secured data transmission to provide the quality of service as well as confidentiality to the client. A significant research work is going on in the stream of cryptography and secured data transmission and a number of data encryption techniques have been devised to secure the network infrastructure and the trust on service. Cryptology refers to the execution as well as the study of hiding information from different eyes. Now days, cryptography is used in almost many disciplines including mathematics, computer science, and engineering. The applications of cryptography include Smart Cards, ATM Cards, computer passwords, defense communications and electronic commerce. This paper emphasizes on the proportional analysis on different cryptography techniques and their relative performance issues.
IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011, 2011
Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryptographic schemes, such as certificates or encryption keys. Thus, cryptography mechanisms form a foundation upon which many important aspects of a solid security system are built. Cryptography is the science of writing in secret code and is an ancient art. Some experts argue that cryptography appeared spontaneously sometime after writing was invented, with applications ranging from diplomatic missives to wartime battle plans. It is no surprise, then; those new forms of cryptography came soon after the widespread development of computer communications. There are two basic types of cryptography: Symmetric Key and Asymmetric Key. Symmetric key algorithms are the quickest and most commonly used type of encryption. Here, a single key is used for both encryption and decryption. There are few well-known symmetric key algorithms i.e. DES, RC2, RC4, IDEA etc. This paper describes cryptography and its types and then proposes a new symmetric key algorithm X-S cryptosystem based on stream cipher. Algorithms for both encryption and decryption are provided here. The advantages of this new algorithm over the others are also explained.
2017
Data security is of utmost importance in today’s world. Especially when the data is travelling through an insecure communication network. Cryptography addresses the necessary elements for secure communication such as privacy, confidentiality, key exchange, authentication and non-repudiation. There are symmetric key encryption techniques which use only one key for both encryption and decryption of the data. . On the other hand, there are asymmetric key based algorithms which use a pair of keys, one for encryption, and the other for decryption, whose security is higher as compared to the symmetric. In this paper a hybrid asymmetric cryptosystem algorithm will be implemented which combine the methods RSA and El-gamal. The hybrid cryptosystem that improve the security and performance will be based on encryption time , decryption time and throughput.
International Journal of Scientific Research in Science, Engineering and Technology, 2019
The importance of encryption in most organizations, therefore, it became necessary to encrypt data because data security is an essential component in order to maintain the security of data and information in various institutions. Encryption also helps to ensure the confidentiality and integrity of data during transmission through communication channels. Given the importance of the keys used in encryption as a key part in the strength of the algorithm and increase its security in most encryption algorithms, thus generating the key in many research the most important part in data encryption and its importance lies in the non-duplication of keys to ensure better results and theoretically impossible to break. In this paper, we try to describe and review many of the papers that were used to create the keys and compare them with each other.
Due to the growth of multimedia applications, the need of information security has been become a necessity in this modern technology. Improper delivery of the message may leads to the leakage of important information. The encryption and decryption is used to securely transmit data in open network. Cryptography will provide secure communication by using encryption and decryption process. The encryption will hide the information that is not visible to anyone using a key. Depending upon key, cryptography is divided into two parts: symmetrical key cryptography and asymmetrical key cryptography. In this paper, symmetrical key algorithms and asymmetrical key algorithms are described like DES, AES, BLOWFISH, RSA etc. this paper is also describes the various attacks and advantages of cryptography. Cryptography is such a way that make sure of integrity, availability and identification, confidentiality, authentication of user and as well as security and privacy of data can be provided to the user.
International Journal, 2010
This paper introduces a symmetric cryptosystem for information. Algorithms are described for implementing the proposed method. Cryptanalysis of the proposed scheme is reported along with similar analysis for two popular systems -DES and AES.
international journal for research in applied science and engineering technology ijraset, 2020
Digital technologies is the demand of our society. To maintain digital property cryptography becomes more popular to protect data when it is being processed, transferred and stored. Cryptography algorithms provide security when we encrypt the messages or information in any system. This paper contains analysis of various cryptographic algorithm used in different emerging fields, also it emphasis the application fields, pitfalls and benefits .This survey classify the cryptographic algorithms based on their properties and behaviour also include the performance comparison in between various cryptographic algorithm used in the real world.
Journal of Kufa for Mathematics and Computer
Security is one of the significant difficulties that individuals are confronting when the information exchanged over the internet in today's world. Cryptography is the way to achieve security of network or data by hiding the important information from unauthorized individuals. Encryption is a mechanism of converting plain-text into cipher-text in order to be unreadable by unwanted people. In this review, we explain some important cryptography primitives ( symmetric and asymmetric cryptography algorithms) with examples for each type. Comparative study is making among this cryptography primitives according to many parameters such as structure, speed, block size and others parameters.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.