K. Nanda Kishore | Jain University (original) (raw)

Papers by K. Nanda Kishore

Research paper thumbnail of A Novel Text Encryption Algorithm using enhanced Diffie Hellman and AES

International Journal of Advance Research in Computer Science and Management Studies, 2020

Security is one of the vital concerns especially in the current period with an extensive rise in ... more Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this context, we propose a secure text encryption algorithm using an enhanced version of Diffe-Hellman and AES. By improving the Diffie-Hellman key exchange Algorithm can help in generating a secret key that is highly secure and this key is used in the AES algorithm to perform the encryption and decryption operations on a text. The proposed algorithm is implemented in Java and the results are discussed along with a possible explanation.

Research paper thumbnail of A Novel Text Encryption Algorithm using enhanced Diffie Hellman and AES

International Journal of Advance Research in Computer Science And Management Studies - IJARCSMS, 2020

Security is one of the vital concerns especially in the current period with an extensive rise in ... more Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this context, we propose a secure text encryption algorithm using an enhanced version of Diffe-Hellman and AES. By improving the Diffie-Hellman key exchange Algorithm can help in generating a secret key that is highly secure and this key is used in the AES algorithm to perform the encryption and decryption operations on a text. The proposed algorithm is implemented in Java and the results are discussed along with a possible explanation.

Research paper thumbnail of Rsa algorithm a theoretical study and implementation

International Research Journal Of Modernization In Engineering Technology And Science, 2020

There are many aspects in which security can be provided, even many applications too like secure ... more There are many aspects in which security can be provided, even many applications too like secure payments,
private communications. One such indispensable aspect is Cryptography. Though it’s probably the oldest art,
still the techniques used in Cryptography are a crucial means in achieving security. It not only clinches in
making information restricted but also delivers various protection and security features like system security,
digital signatures. So, the methods, encryption, and decryption of cryptography play a vital role in achieving the
security mentioned above. The quality of the security provided will be entirely dependent on the quality of the
encryption and decryption algorithms which in turn can be said to be based on the structure of mathematics and
the confidentiality of key. The key can be said as the essence of encryption, as by knowing the key a person can
encrypt or decrypt the information. Hence, choosing the key is the most vital process. This paper provides an
overview and implementation of RSA, a public-key cryptosystem.

Research paper thumbnail of A Novel Text Encryption Algorithm using enhanced Diffie Hellman and AES

International Journal of Advance Research in Computer Science and Management Studies, 2020

Security is one of the vital concerns especially in the current period with an extensive rise in ... more Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this context, we propose a secure text encryption algorithm using an enhanced version of Diffe-Hellman and AES. By improving the Diffie-Hellman key exchange Algorithm can help in generating a secret key that is highly secure and this key is used in the AES algorithm to perform the encryption and decryption operations on a text. The proposed algorithm is implemented in Java and the results are discussed along with a possible explanation.

Research paper thumbnail of A Novel Text Encryption Algorithm using enhanced Diffie Hellman and AES

International Journal of Advance Research in Computer Science And Management Studies - IJARCSMS, 2020

Security is one of the vital concerns especially in the current period with an extensive rise in ... more Security is one of the vital concerns especially in the current period with an extensive rise in the usage of the internet. So, an effective text encryption algorithm is of greater need for achieving an immense amount of privacy. In this context, we propose a secure text encryption algorithm using an enhanced version of Diffe-Hellman and AES. By improving the Diffie-Hellman key exchange Algorithm can help in generating a secret key that is highly secure and this key is used in the AES algorithm to perform the encryption and decryption operations on a text. The proposed algorithm is implemented in Java and the results are discussed along with a possible explanation.

Research paper thumbnail of Rsa algorithm a theoretical study and implementation

International Research Journal Of Modernization In Engineering Technology And Science, 2020

There are many aspects in which security can be provided, even many applications too like secure ... more There are many aspects in which security can be provided, even many applications too like secure payments,
private communications. One such indispensable aspect is Cryptography. Though it’s probably the oldest art,
still the techniques used in Cryptography are a crucial means in achieving security. It not only clinches in
making information restricted but also delivers various protection and security features like system security,
digital signatures. So, the methods, encryption, and decryption of cryptography play a vital role in achieving the
security mentioned above. The quality of the security provided will be entirely dependent on the quality of the
encryption and decryption algorithms which in turn can be said to be based on the structure of mathematics and
the confidentiality of key. The key can be said as the essence of encryption, as by knowing the key a person can
encrypt or decrypt the information. Hence, choosing the key is the most vital process. This paper provides an
overview and implementation of RSA, a public-key cryptosystem.