Rajalaxmi Mishra - Academia.edu (original) (raw)

Uploads

Papers by Rajalaxmi Mishra

Research paper thumbnail of A Novel Enhancement of Vigenere Cipher Using Message Digest

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Secure Data Transmission using Goldbach Codes and RSA Algorithm

International Journal of Recent Technology and Engineering, 2019

Information transmitted through the insecure network need to be secured by using different method... more Information transmitted through the insecure network need to be secured by using different methods. There are several cryptographic methods to ensure secure data transmission. The compression algorithms are used to compress the information, then on the compressed information encryption algorithms can be applied so as to reduce the time of encryption. There are several data compression algorithms available to compress the data. Our proposed scheme is a combination of Goldbach Code Algorithm for data compression, and the RSA algorithm for data encryption.

Research paper thumbnail of A Key Management Scheme in Wireless Sensor Networks Using Symmetric and Asymmetric Key Cryptography

Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory... more Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory and battery power. In order to achieve security in WSNs, it is required to encrypt and send data among the sensor nodes. In this paper we present a novel scheme for key management to achieve secure communication, by using both symmetric key and asymmetric and symmetric key. Our scheme provides integrity, confidentiality and authenticity. Also it is robust to various attacks in WSN.

Research paper thumbnail of An Enhancement to Caesar Cipher using Euler Totient Function

International Journal of Engineering and Advanced Technology

In this modern world every communication including financial transactions are taking place throug... more In this modern world every communication including financial transactions are taking place through the open unsecured network. In order to communicate securely through open networks the messages need to be concealed by using the cryptographic methods. The mono alphabetic traditional Cipher is Caesar cipher is the simplest and fairly popular among the available cryptographic algorithms but it is prone to brute force attack and frequency analysis test. In this paper we propose an enhancement to Caesar cipher by using the Euler Totient function to generate the key to encrypt a text file. The Euler Totient function is applied on the total number of lines of the plain text file. The key value is generated from the plain text hence for different plain text the key value is different; this makes it difficult for the adversary to guess the key thus making the encryption scheme robust. It needs to design secured key distribution schemes to be taken up as the extension work of this scheme.

Research paper thumbnail of Performance Evaluation of Leach and Apteen

Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical... more Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical world in various applications, for instance, condition watching, developing the board, following animals or items, social protection, transportation and general home frameworks. Nowadays, WSNs are pulling in unfathomable thought in research. A WSN involves an ordinarily enormous number of sensor center points, in like manner called bits, passed on in the application circumstance. Bits are equipped with the specific sensors mentioned by the application, and gather information about nature, which is transmitted towards no less than one sink centers (in like manner called base stations). The aim of this research paper is the implementation of simulation models and the simulation of energy-efficient network initialization algorithms. First of all, it is presented a survey of stateof-the-art strategies for network initialization and exploration in wireless ad-hoc networks. Among the routing ...

Research paper thumbnail of A Novel Encryption Scheme Using Hybrid Cellular Automata

2019 International Conference on Information Technology (ICIT), 2019

With the growth of Internet and advancement of technology, communication becomes faster and easie... more With the growth of Internet and advancement of technology, communication becomes faster and easier. Now-a-days, the data sent through open and unsecured network becomes vulnerable to unauthorized access. Hence many schemes are developed for encryption using Cellular Automata. We come up with a scheme of image encryption using traditional encryption system like Caesar Cipher and 1-D Hybrid Cellular Automata. The private or symmetric key used to encipher the image is again proposed to be encrypted by using RSA public key scheme. From the result of simulation and security analysis it is shown that the given scheme satisfies confusion and diffusion and is ideal for information concealing. With the use of public key encryption the proposed scheme becomes more robust

Research paper thumbnail of New Multiphase Encryption Scheme for Better Security Enhancement

Research paper thumbnail of A Novel Enhancement of Vigenere Cipher Using Message Digest

Lecture notes in electrical engineering, 2022

Research paper thumbnail of Secure Data Transmission using Goldbach Codes and RSA Algorithm

International Journal of Recent Technology and Engineering, 2019

Information transmitted through the insecure network need to be secured by using different method... more Information transmitted through the insecure network need to be secured by using different methods. There are several cryptographic methods to ensure secure data transmission. The compression algorithms are used to compress the information, then on the compressed information encryption algorithms can be applied so as to reduce the time of encryption. There are several data compression algorithms available to compress the data. Our proposed scheme is a combination of Goldbach Code Algorithm for data compression, and the RSA algorithm for data encryption.

Research paper thumbnail of A Key Management Scheme in Wireless Sensor Networks Using Symmetric and Asymmetric Key Cryptography

Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory... more Wireless Sensor Networks (WSN) are network of sensor node having very low computing power, memory and battery power. In order to achieve security in WSNs, it is required to encrypt and send data among the sensor nodes. In this paper we present a novel scheme for key management to achieve secure communication, by using both symmetric key and asymmetric and symmetric key. Our scheme provides integrity, confidentiality and authenticity. Also it is robust to various attacks in WSN.

Research paper thumbnail of An Enhancement to Caesar Cipher using Euler Totient Function

International Journal of Engineering and Advanced Technology

In this modern world every communication including financial transactions are taking place throug... more In this modern world every communication including financial transactions are taking place through the open unsecured network. In order to communicate securely through open networks the messages need to be concealed by using the cryptographic methods. The mono alphabetic traditional Cipher is Caesar cipher is the simplest and fairly popular among the available cryptographic algorithms but it is prone to brute force attack and frequency analysis test. In this paper we propose an enhancement to Caesar cipher by using the Euler Totient function to generate the key to encrypt a text file. The Euler Totient function is applied on the total number of lines of the plain text file. The key value is generated from the plain text hence for different plain text the key value is different; this makes it difficult for the adversary to guess the key thus making the encryption scheme robust. It needs to design secured key distribution schemes to be taken up as the extension work of this scheme.

Research paper thumbnail of Performance Evaluation of Leach and Apteen

Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical... more Wireless Sensor Networks (WSNs) are used for checking and information gathering from the physical world in various applications, for instance, condition watching, developing the board, following animals or items, social protection, transportation and general home frameworks. Nowadays, WSNs are pulling in unfathomable thought in research. A WSN involves an ordinarily enormous number of sensor center points, in like manner called bits, passed on in the application circumstance. Bits are equipped with the specific sensors mentioned by the application, and gather information about nature, which is transmitted towards no less than one sink centers (in like manner called base stations). The aim of this research paper is the implementation of simulation models and the simulation of energy-efficient network initialization algorithms. First of all, it is presented a survey of stateof-the-art strategies for network initialization and exploration in wireless ad-hoc networks. Among the routing ...

Research paper thumbnail of A Novel Encryption Scheme Using Hybrid Cellular Automata

2019 International Conference on Information Technology (ICIT), 2019

With the growth of Internet and advancement of technology, communication becomes faster and easie... more With the growth of Internet and advancement of technology, communication becomes faster and easier. Now-a-days, the data sent through open and unsecured network becomes vulnerable to unauthorized access. Hence many schemes are developed for encryption using Cellular Automata. We come up with a scheme of image encryption using traditional encryption system like Caesar Cipher and 1-D Hybrid Cellular Automata. The private or symmetric key used to encipher the image is again proposed to be encrypted by using RSA public key scheme. From the result of simulation and security analysis it is shown that the given scheme satisfies confusion and diffusion and is ideal for information concealing. With the use of public key encryption the proposed scheme becomes more robust

Research paper thumbnail of New Multiphase Encryption Scheme for Better Security Enhancement