soma ghosh | Malaviya National Institute of Technology, Jaipur (original) (raw)
Related Authors
COMSATS Institute of Information Technology Wah Cantt
Uploads
Papers by soma ghosh
Web services send and receive plaintext messages over standard internet protocols. Such plaintext... more Web services send and receive plaintext messages over standard internet protocols. Such plaintext messages can be intercepted by an attacker and potentially viewed or even modified for malicious purposes. By using message protection, we can protect sensitive data against threats such as eavesdropping and data tampering. In this paper, I present security patterns for data confidentiality. Security patterns are reusable solutions.
Network security typically based on authentication which might start with a simple username and a... more Network security typically based on authentication which might start with a simple username and a password. This is just 1-factor authentication (one username and one password), But generally 1-factor authentication does not serve the purpose of full security for sensitive data transmission .To send the data (generally more sensitive) we have to wrap the data using some algorithm(like AES or DES) and put over the network. Now a day due to high speed computers these algorithms are now vulnerable to attacks. In this project we propose the idea of using a combination of AES-DES-RSA and incorporating it in the Feistal structure. Being a hybrid of three powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard. This project will contain the implementation and design of a of hybrid based AES-DES-RSA algorithm for the security purpose. Data Encryption: Using Hybrid AES-DES algorithm Key Exchange Mechanism: Using RSA-1024. Our Algorithm will mainly focus on following parameters: 1. Avalanche Effect 2. Encryption Time 3. CPU Usage 4. Throughput
Web services send and receive plaintext messages over standard internet protocols. Such plaintext... more Web services send and receive plaintext messages over standard internet protocols. Such plaintext messages can be intercepted by an attacker and potentially viewed or even modified for malicious purposes. By using message protection, we can protect sensitive data against threats such as eavesdropping and data tampering. In this paper, I present security patterns for data confidentiality. Security patterns are reusable solutions.
Network security typically based on authentication which might start with a simple username and a... more Network security typically based on authentication which might start with a simple username and a password. This is just 1-factor authentication (one username and one password), But generally 1-factor authentication does not serve the purpose of full security for sensitive data transmission .To send the data (generally more sensitive) we have to wrap the data using some algorithm(like AES or DES) and put over the network. Now a day due to high speed computers these algorithms are now vulnerable to attacks. In this project we propose the idea of using a combination of AES-DES-RSA and incorporating it in the Feistal structure. Being a hybrid of three powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard. This project will contain the implementation and design of a of hybrid based AES-DES-RSA algorithm for the security purpose. Data Encryption: Using Hybrid AES-DES algorithm Key Exchange Mechanism: Using RSA-1024. Our Algorithm will mainly focus on following parameters: 1. Avalanche Effect 2. Encryption Time 3. CPU Usage 4. Throughput