Rajalaxmi Mishra - Academia.edu (original) (raw)
Uploads
Papers by Rajalaxmi Mishra
Lecture notes in electrical engineering, 2022
International Journal of Recent Technology and Engineering, 2019
Information transmitted through the insecure network need to be secured by using different method... more Information transmitted through the insecure network need to be secured by using different methods. There are several cryptographic methods to ensure secure data transmission. The compression algorithms are used to compress the information, then on the compressed information encryption algorithms can be applied so as to reduce the time of encryption. There are several data compression algorithms available to compress the data. Our proposed scheme is a combination of Goldbach Code Algorithm for data compression, and the RSA algorithm for data encryption.
Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory... more Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory and battery power. In order to achieve security in WSNs, it is required to encrypt and send data among the sensor nodes. In this paper we present a novel scheme for key management to achieve secure communication, by using both symmetric key and asymmetric and symmetric key. Our scheme provides integrity, confidentiality and authenticity. Also it is robust to various attacks in WSN.
International Journal of Engineering and Advanced Technology
In this modern world every communication including financial transactions are taking place throug... more In this modern world every communication including financial transactions are taking place through the open unsecured network. In order to communicate securely through open networks the messages need to be concealed by using the cryptographic methods. The mono alphabetic traditional Cipher is Caesar cipher is the simplest and fairly popular among the available cryptographic algorithms but it is prone to brute force attack and frequency analysis test. In this paper we propose an enhancement to Caesar cipher by using the Euler Totient function to generate the key to encrypt a text file. The Euler Totient function is applied on the total number of lines of the plain text file. The key value is generated from the plain text hence for different plain text the key value is different; this makes it difficult for the adversary to guess the key thus making the encryption scheme robust. It needs to design secured key distribution schemes to be taken up as the extension work of this scheme.
Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical... more Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical world in various applications, for instance, condition watching, developing the board, following animals or items, social protection, transportation and general home frameworks. Nowadays, WSNs are pulling in unfathomable thought in research. A WSN involves an ordinarily enormous number of sensor center points, in like manner called bits, passed on in the application circumstance. Bits are equipped with the specific sensors mentioned by the application, and gather information about nature, which is transmitted towards no less than one sink centers (in like manner called base stations). The aim of this research paper is the implementation of simulation models and the simulation of energy-efficient network initialization algorithms. First of all, it is presented a survey of stateof-the-art strategies for network initialization and exploration in wireless ad-hoc networks. Among the routing ...
2019 International Conference on Information Technology (ICIT), 2019
With the growth of Internet and advancement of technology, communication becomes faster and easie... more With the growth of Internet and advancement of technology, communication becomes faster and easier. Now-a-days, the data sent through open and unsecured network becomes vulnerable to unauthorized access. Hence many schemes are developed for encryption using Cellular Automata. We come up with a scheme of image encryption using traditional encryption system like Caesar Cipher and 1-D Hybrid Cellular Automata. The private or symmetric key used to encipher the image is again proposed to be encrypted by using RSA public key scheme. From the result of simulation and security analysis it is shown that the given scheme satisfies confusion and diffusion and is ideal for information concealing. With the use of public key encryption the proposed scheme becomes more robust
Lecture notes in electrical engineering, 2022
International Journal of Recent Technology and Engineering, 2019
Information transmitted through the insecure network need to be secured by using different method... more Information transmitted through the insecure network need to be secured by using different methods. There are several cryptographic methods to ensure secure data transmission. The compression algorithms are used to compress the information, then on the compressed information encryption algorithms can be applied so as to reduce the time of encryption. There are several data compression algorithms available to compress the data. Our proposed scheme is a combination of Goldbach Code Algorithm for data compression, and the RSA algorithm for data encryption.
Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory... more Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory and battery power. In order to achieve security in WSNs, it is required to encrypt and send data among the sensor nodes. In this paper we present a novel scheme for key management to achieve secure communication, by using both symmetric key and asymmetric and symmetric key. Our scheme provides integrity, confidentiality and authenticity. Also it is robust to various attacks in WSN.
International Journal of Engineering and Advanced Technology
In this modern world every communication including financial transactions are taking place throug... more In this modern world every communication including financial transactions are taking place through the open unsecured network. In order to communicate securely through open networks the messages need to be concealed by using the cryptographic methods. The mono alphabetic traditional Cipher is Caesar cipher is the simplest and fairly popular among the available cryptographic algorithms but it is prone to brute force attack and frequency analysis test. In this paper we propose an enhancement to Caesar cipher by using the Euler Totient function to generate the key to encrypt a text file. The Euler Totient function is applied on the total number of lines of the plain text file. The key value is generated from the plain text hence for different plain text the key value is different; this makes it difficult for the adversary to guess the key thus making the encryption scheme robust. It needs to design secured key distribution schemes to be taken up as the extension work of this scheme.
Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical... more Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical world in various applications, for instance, condition watching, developing the board, following animals or items, social protection, transportation and general home frameworks. Nowadays, WSNs are pulling in unfathomable thought in research. A WSN involves an ordinarily enormous number of sensor center points, in like manner called bits, passed on in the application circumstance. Bits are equipped with the specific sensors mentioned by the application, and gather information about nature, which is transmitted towards no less than one sink centers (in like manner called base stations). The aim of this research paper is the implementation of simulation models and the simulation of energy-efficient network initialization algorithms. First of all, it is presented a survey of stateof-the-art strategies for network initialization and exploration in wireless ad-hoc networks. Among the routing ...
2019 International Conference on Information Technology (ICIT), 2019
With the growth of Internet and advancement of technology, communication becomes faster and easie... more With the growth of Internet and advancement of technology, communication becomes faster and easier. Now-a-days, the data sent through open and unsecured network becomes vulnerable to unauthorized access. Hence many schemes are developed for encryption using Cellular Automata. We come up with a scheme of image encryption using traditional encryption system like Caesar Cipher and 1-D Hybrid Cellular Automata. The private or symmetric key used to encipher the image is again proposed to be encrypted by using RSA public key scheme. From the result of simulation and security analysis it is shown that the given scheme satisfies confusion and diffusion and is ideal for information concealing. With the use of public key encryption the proposed scheme becomes more robust