Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, International journal of Computer Networks & Communications
…
9 pages
1 file
During the last decades, information security has become a major issue. Encrypting and decrypting data have recently been widely investigated and developed because there is a demand for a stronger encryption and decryption which is very hard to crack. Cryptography plays major roles to fulfilment these demands. Nowadays, many of researchers have proposed many of encryption and decryption algorithms such as AES, DES, RSA, and others. But most of the proposed algorithms encountered some problems such as lack of robustness and significant amount of time added to packet delay to maintain the security on the communication channel between the terminals. In this paper, the security goals were enhanced via "A New Approach for Complex Encrypting and Decrypting Data" which maintains the security on the communication channels by making it difficult for attacker to predicate a pattern as well as speed of the encryption / decryption scheme.
International Journal of Computer Applications, 2012
Encryption is of prime importance when confidential data is transmitted over the network. Varied encryption algorithms like AES, DES, RC4 and others are available for the same. The most widely accepted algorithm is AES algorithm. We have proposed a new algorithm based on the concept used by Rijmen and Daemen (Rijndael algorithm), the founders of AES algorithm. The proposed algorithm encrypts and decrypts two 128 bits data simultaneously i.e. 256 bits data, thus providing strong encryption accompanied with complex processing. The proposed Feistal algorithm uses various invertible, self-invertible, and non-invertible components of modern encryption ciphers and key generation same as that of AES. This algorithm provides a secure, fast, and strong encryption of the data. There is a huge amount of confusion and diffusion of the data during encryption which makes it very difficult for an attacker to interpret the encryption pattern and the plain text form of the encrypted data. The proposed algorithm is also resistant to Brute-Force and pattern attacks.
Global journal of computer science and technology, 2013
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
2015
The encryption and decryption process is widely investigated and developed for a robust data security which is challenging to crack. Many researchers proposed different types of encryption and decryption algorithms such as DES, AES, RSA, etc., the proposed algorithms are encountered such as deficiency of stoutness and significant amount of time added to packet delay and to maintain the node data security in the network. The data security is the process which protects its privacy, integrity and availability. In this work, text data makes secure using encryption to decryption process while the secret key does not match and produce ambiguous message to the user during execution. The results demonstrate the efficiency of the encryption and decryption process in the measurement of time execution variations are presented.
2014
The Process of Encryption and Decryption is performed by using Symmetric key cryptography and public key cryptography for Secure Communication. In this paper, we studied that how the process of Encryption and Decryption is perform in case of Symmetric key and public key cryptography using AES and DES algorithms and modified RSA algorithm.
International Journal of Innovative Research in Computer and Communication Engineering, 2017
Currently, security has become one of the important factors in our day to day life. Like banks, shops and everywhere else we require security. An attacker can use the password to access the private information. To avoid this is one of the goals of the data security. As we know that we require security in our daily life then what about the security of our security system such as our national security i.e. defense. Mainly, at the time of war the terrorists, spies or an attacker tries to leak information and capture the important information which may useful to win the war. To overcome the problem the proposed technique can be used. The plain-text is treated at the bit level for encryption/decryption which provides more security than compound and intermix characters. Moreover, the advantage of the technique is that both the algorithm uses the same key generation algorithm. Here the key is generated from the plain-text bit stream and same key is used for both encryption and decryption.
IJCSMC, 2019
Due to the large number of different computer applications transactions on the internet, cryptography is a vital key in ensuring the security of the transactions. Cryptography is an important way of achieving data confidentiality, data integrity, user authentication and non-repudiation. In this paper we will introduce a new approach of message encryption-decryption, this approach will be implemented, and the experimental results will compared with the results of DES method of data cryptography. The following features of the proposed approach will be proved:-Simplicity, Efficiency, High security level, Flexibility.
— Today internet is widely used tool for communication, exchange of information and sending and receiving of data using computers, mobile phones and other electronic gadgets. Unsecured data that travels through different networks are open and can be read, altered or copied by anyone who has access to that data. Cryptographic algorithms are used to encrypt and decrypt messages. In the past year several algorithm have been developed for improving the efficiency of Cryptographic algorithms. Each and every algorithm used different techniques and process to encryption and decryption the data. In this paper we represent a comparative study of various encryptions, decryption algorithms.
2011
The encryption standards such as DES (Data Encryption Standard), AES (Advanced Encryption Standard) and EES (Escrowed Encryption Standard) are widely used to solve the problem of communication over an insecure channel. With advanced technologies in computer hardware and software, these standards seem not to be as secure and fast as one would like. In this paper we propose a fast and secure encryption algorithm using substitution mapping, translation and transposing operations. The proposed symmetric encryption technique has two advantages over traditional schemes. First, the encryption and decryption procedures are much simpler, and consequently, much faster. Second, the security level is higher due to the inherent poly-alphabetic nature of the substitution mapping method used here, together with the translation and transposition operations performed in the algorithm. In this paper, the encryption and decryption procedures are explained and the performance is compared with popular e...
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Emerging Trends in Engineering and Management
Global Journal of Engineering and Technology Advances
IARJSET
International Journal of Electrical and Computer Engineering (IJECE), 2025
International Journal of Engineering in Computer Science
IJCA Proceedings on National Workshop-Cum-Conference on Recent Trends in Mathematics and Computing 2011, 2011
International Journal of …, 2010