IJERT-Sane : Secure Encryption Technique for Alphnumeric Data Over Web Based Applications (original) (raw)
Related papers
Sane : Secure Encryption Technique for Alphnumeric Data Over Web Based Applications
International journal of engineering research and technology, 2014
In today's scenario of cyber-attacks like phishing, man in the middle attacks and system compromises, it is difficult to ensure the secure data transfer. In order to ensure confidentiality there is a requirement to encrypt the data. Various techniques have been proposed by the researchers over a period of time regarding the encryption of data and it's subsequent transmission over the web. But in our literature survey we didn't across a technique which is able to encrypt and decrypt the Alphabets , Numbers and Alphanumeric data in minimum span of time with minimum lines of code. The designed logic has been tested successfully by writing modules coded using open source JAVA programming language with the file containing plain text in the form of only alphabets, numbers and alphanumeric characters . Since the logic implemented is custom made, there is remote possibility of breaking the encryption by an intruder, since the logic will be a secret known only within the organiza...
A Novel Cryptographic Method for Information security with Low Computational Cost
2020
Encryption and decryption techniques are gaining importance in the cryptographic system.In this context a new encrypting and decrypting technique have been designed to secure the plain text over the internet and preventing all the prone attacks like man in middle attack and other vulnerable threats. It is actually encrypting and decrypting the text with the special characters and symbols along with the variations in mapping that makes it impossible for the intruder to breach the ethics of security like confidentiality,availability, integrity, Denial of Service. This paper also highlights the strengths and drawbacks of the designed system.
Securing Confidential Data using Java/J2EE Ankur
This paper proposes an Encryption/Decryption mechanism for protecting password confidentiality over the Web Application. Encryption may be defined as the encoding of information in such a manner that only a person with the proper knowledge may decode it. This knowledge can is analogous to a key for a lock. This application is very useful and stringent and can be best utilized by the Professionals. This application uses a simple mechanism for key Generation. Final Encryption is done by 2-tier system, first converting the data into the binary form and then into a coded form through a series of Logical Operations. This application runs on any Web Server or Application Server. The core idea is to encrypt confidential data before sending it to untrusted sites. A J2EE information flow model is used to prove the soundness of the mechanism.
A study of data security using cryptography
International Journal of Engineering in Computer Science
To make better data transmission over networks cryptography is used with the internet having reached a level that merges with our lives, growing explosively during the last several decades; data security has become a main concern for anyone connected to the web. Data security ensures that our data is only accessible by the intended receiver and prevents any modification or alteration of data. In order to achieve this level of security, various algorithms and methods have been developed. Cryptography can be defined as techniques that cipher data, depending on specific algorithms that make the data unreadable to the human eye unless decrypted by algorithms that are predefined by the sender.
Individual or organizational sensitive data and information need to be prevented from unauthorized access. Several reports of middle man attacks and intrusion in form of hacking have been reported over the years when data are sent over wired or wireless media. One of the ways to prevent these is to either secure the medium through which information is being sent or to put measures in place to secure the actual information being sent. Though implementing both options could be expensive, however, implementing any of the option could still be effective. This could be achieved by making the data being sent meaningless to a third party but meaningful to the intending recipient. Cryptography is a proven way to achieve this. It entails using certain mathematical techniques to make a data unreadable and meaningless to any other person except the actual recipient who has the key needed to decrypt the encrypted data. Rijndael algorithm; which is the Advanced Encryption Standard (AES) for implementing cryptography is presented in this paper. It is a symmetric approach to implementing cryptography as it uses the same key for encryption and decryption. A detailed analysis of its implementation using its various 128, 192 and 256 bits key lengths is presented in this paper. The encryption and decryption process is made more secured by sending the encrypted text to the recipients email while the decryption key is sent to the recipient's phone number. This is done to prevent instances where the recipients email is hacked.
Securing Confidential Data using Java/J2EE
paper proposes an Encryption/Decryption mechanism for protecting password confidentiality over the Web Application. Encryption may be defined as the encoding of information in such a manner that only a person with the proper knowledge may decode it. This knowledge can is analogous to a key for a lock. This application is very useful and stringent and can be best utilized by the Professionals. This application uses a simple mechanism for key Generation. Final Encryption is done by 2-tier system, first converting the data into the binary form and then into a coded form through a series of Logical Operations. This application runs on any Web Server or Application Server. The core idea is to encrypt confidential data before sending it to untrusted sites. A J2EE information flow model is used to prove the soundness of the mechanism.
A Review Paper on Data Encryption and Decryption
International Journal for Research in Applied Science & Engineering Technology (IJRASET), 2023
Cryptography is the technique for hiding data and information from unauthorized users. It is the art of achieving security by encoding messages to make them non-readable. When we send simple message from one location to another then this message called plain text is visible to anybody. If we want to codify the message called cipher text so that no one can easily understand the meaning of message then we use cryptography techniques. There are numerous applications where this technology is used such as ATM pin, Password, Credit Card number or any other secret communication. Cryptography can be divided into following three categories depending upon the types of key used: secret key (symmetric) cryptography, public key (asymmetric) cryptography and hash functions. In this paper we provide review of various types of cryptography techniques.
5. A NEW TECHNIQUE TO ENCRYPT A CODE WORD
shows the advantages and the limitations of this algorithm. With this new approach we are implementing a technique to enhance the security level and to further reduce the time for encryption and decryption.
Implementation of an Improved Data Encryption Algorithm in a Web Based Learning System
Physics International
Problem statement: This study proffered solution to some identified data insecurity problems in software development by the use of Web-based learning system as a test bed and development of an hybrid crypto-biometric security system. Approach: A variant of data encryption algorithm tagged (XOR-RSA algorithm) is developed in order to encrypt the messages being sent between the learner and the facilitator. Results: A comparative analysis of performance of this algorithm was carried out using cryptographic algorithm metrics in order to establish its stronger performance above the existing algorithms. The result shows that the improved algorithm (XOR-RSA) performed better than prominent data encryption algorithms in the likes of RSA, SKIPJACK, DES1 and 3DES. Conclusion/Recommendations: This was eventually implemented in a web based learning system. The work provides a prototype for the development of secured Web-based learning infrastructure and its contextual framework, which foster indigenization of electronic learning technology which will adequately address the related challenges in the phenomenon of system security in terms of confidentiality and integrity of the system.
S 2 SE: An Encryption Methodology
In the day to day life, Internet has become a vital part, owing to the revolutionary changes it has brought about in various fields. Transfer of critical information is also being carried out through the Internet. This enormous use of the Internet coupled with the tremendous growth in e-commerce and mcommerce has created a vital need for information security . A security mechanism is any process that is designed to prevent, detect, or recover from a security attack. Examples of this security mechanism are encryption algorithms, authentication protocols and digital signatures. Encryption algorithms are used to protect blocks of data, such as messages from alteration. In this paper, we introduced a simple encryption methodology to secure the text file for longer time.