soma ghosh | Malaviya National Institute of Technology, Jaipur (original) (raw)

Related Authors

IRJET  Journal

IJCSMC Journal

Waseem  Khan

Waseem Khan

COMSATS Institute of Information Technology Wah Cantt

khandoker Rahad

Sayed Mohsin Reza

Gaith Jaradat

Uploads

Papers by soma ghosh

Research paper thumbnail of Integrating Encryption Security Pattern in Network Communication

Web services send and receive plaintext messages over standard internet protocols. Such plaintext... more Web services send and receive plaintext messages over standard internet protocols. Such plaintext messages can be intercepted by an attacker and potentially viewed or even modified for malicious purposes. By using message protection, we can protect sensitive data against threats such as eavesdropping and data tampering. In this paper, I present security patterns for data confidentiality. Security patterns are reusable solutions.

Research paper thumbnail of Performance Analysis of AES, DES, RSA And AES-DES-RSA Hybrid Algorithm for Data Security

Network security typically based on authentication which might start with a simple username and a... more Network security typically based on authentication which might start with a simple username and a password. This is just 1-factor authentication (one username and one password), But generally 1-factor authentication does not serve the purpose of full security for sensitive data transmission .To send the data (generally more sensitive) we have to wrap the data using some algorithm(like AES or DES) and put over the network. Now a day due to high speed computers these algorithms are now vulnerable to attacks. In this project we propose the idea of using a combination of AES-DES-RSA and incorporating it in the Feistal structure. Being a hybrid of three powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard. This project will contain the implementation and design of a of hybrid based AES-DES-RSA algorithm for the security purpose. Data Encryption: Using Hybrid AES-DES algorithm Key Exchange Mechanism: Using RSA-1024. Our Algorithm will mainly focus on following parameters: 1. Avalanche Effect 2. Encryption Time 3. CPU Usage 4. Throughput

Research paper thumbnail of Integrating Encryption Security Pattern in Network Communication

Web services send and receive plaintext messages over standard internet protocols. Such plaintext... more Web services send and receive plaintext messages over standard internet protocols. Such plaintext messages can be intercepted by an attacker and potentially viewed or even modified for malicious purposes. By using message protection, we can protect sensitive data against threats such as eavesdropping and data tampering. In this paper, I present security patterns for data confidentiality. Security patterns are reusable solutions.

Research paper thumbnail of Performance Analysis of AES, DES, RSA And AES-DES-RSA Hybrid Algorithm for Data Security

Network security typically based on authentication which might start with a simple username and a... more Network security typically based on authentication which might start with a simple username and a password. This is just 1-factor authentication (one username and one password), But generally 1-factor authentication does not serve the purpose of full security for sensitive data transmission .To send the data (generally more sensitive) we have to wrap the data using some algorithm(like AES or DES) and put over the network. Now a day due to high speed computers these algorithms are now vulnerable to attacks. In this project we propose the idea of using a combination of AES-DES-RSA and incorporating it in the Feistal structure. Being a hybrid of three powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard. This project will contain the implementation and design of a of hybrid based AES-DES-RSA algorithm for the security purpose. Data Encryption: Using Hybrid AES-DES algorithm Key Exchange Mechanism: Using RSA-1024. Our Algorithm will mainly focus on following parameters: 1. Avalanche Effect 2. Encryption Time 3. CPU Usage 4. Throughput

Log In