S 2 SE: An Encryption Methodology (original) (raw)
Related papers
Individual or organizational sensitive data and information need to be prevented from unauthorized access. Several reports of middle man attacks and intrusion in form of hacking have been reported over the years when data are sent over wired or wireless media. One of the ways to prevent these is to either secure the medium through which information is being sent or to put measures in place to secure the actual information being sent. Though implementing both options could be expensive, however, implementing any of the option could still be effective. This could be achieved by making the data being sent meaningless to a third party but meaningful to the intending recipient. Cryptography is a proven way to achieve this. It entails using certain mathematical techniques to make a data unreadable and meaningless to any other person except the actual recipient who has the key needed to decrypt the encrypted data. Rijndael algorithm; which is the Advanced Encryption Standard (AES) for implementing cryptography is presented in this paper. It is a symmetric approach to implementing cryptography as it uses the same key for encryption and decryption. A detailed analysis of its implementation using its various 128, 192 and 256 bits key lengths is presented in this paper. The encryption and decryption process is made more secured by sending the encrypted text to the recipients email while the decryption key is sent to the recipient's phone number. This is done to prevent instances where the recipients email is hacked.
2021
ABSTRAK Advances in computer science and technology have affected every aspect of human life, including education. Information and data can be easily and quickly sent to consumers via a computer network. Data and information can be easily and quickly accessed by users through a computer network. Of course, this is dangerous if unauthorized persons have access to the data transmitted and cause a data breach or leakage. Security issues are one of the most important aspects of information systems. In particular, technological advances in data security systems to maintain data security have grown rapidly. Scientific disciplines such as encryption and steganography are being developed to maintain data security. (Program et al., 2016) In the implementation of not only one security technique, but can be done in combination in the security of information data. This research aims to create data security by applying cryptography to text messages, document files, and images online with advanced encryption standard (AES) algorithm calculation methods. AES is a cryptographic algorithm that can be used to eat data where the algorithm is a symmetric chipertext block that can encrypt and decrypt information. The result of the study is that users can encrypt text messages, document files, and images so that the security of the information data can be maintained because of security. (Ikbal, 2007)
A Novel Cryptographic Method for Information security with Low Computational Cost
2020
Encryption and decryption techniques are gaining importance in the cryptographic system.In this context a new encrypting and decrypting technique have been designed to secure the plain text over the internet and preventing all the prone attacks like man in middle attack and other vulnerable threats. It is actually encrypting and decrypting the text with the special characters and symbols along with the variations in mapping that makes it impossible for the intruder to breach the ethics of security like confidentiality,availability, integrity, Denial of Service. This paper also highlights the strengths and drawbacks of the designed system.
A Study on Cryptographic Techniques
International Journal of Scientific Research in Computer Science, Engineering and Information Technology, 2020
In current scenario, to store data securely on online is a tedious task as a result proper security over the network. Cryptography is a technique that masks the data over the channel of communication. Hiding the data to outsiders is an art. As the technology grows day by day, the need for data security over the channel of communication is greatly increased. Several cryptographic schemes are used for secure communication. The cryptographic technique and various algorithms are used to ensure the application has the necessary security. Cryptography is the science of both encryption and decryption. This paper describes all of the cryptographic techniques in detail.
Abstract: Encryption is the most effective way to achieve data security. It is the process in which plain text converts into a cipher text and allows only authorized people to access the sender information. In this research paper I would like to explain different types of encryption techniques such as hashing function and symmetric and asymmetric methods with advantages and disadvantages including necessary practical examples. Keywords: Encryption, Cryptography, Hashing, Asymmetric, Symmetric, Cipher text Title: Encryption Author: Sruthi Medasani, Professor Tarik El Taeib, International Journal of Computer Science and Information Technology Research ISSN 2348-1196 (print), ISSN 2348-120X (online) Research Publish Journals
Security through Smart Encryption
2014
This paper has a new approach for encryption of text files. It encrypts data at different-different level. First of all ASCII (American Standard Code for Information Interchange) of each character has been taken. Than we check from 2 to no- 1, how many digits divide that number than we add that value in our ASCII value and new text file has been created. Value in the binary data of file is divided into variable size blocks called as grids. The bit stream of each grid is taken and bits manipulation read diagonal wise is applied. The key is wrapped up with some public key algorithm say RSA for secret key transposition so that intruder cannot identify. For decryption the reverse grid transposition and private key is required. The included session key is obtained by decrypting the wrapped key with receiver's private key. As we get the text file, a reverse process will be followed and we predict that value that will be added in original ASCII value, after getting original ASCII value...
CRYPTOGRAPHY AND ENCRYPTION ALGORITHMS FOR INFORMATION SECURITY
—In today's world of Computer and Internet; most o f the data travel over computer network and it becomes challenging task to secure this data. So there is need of an efficient and simple way of securing the electronic documents from being read or used by people other than authorized one. Some of the mechanisms used to secure data are: authenticating the user, using access control mechanism (such as profiling), restricting physical access (i.e. k eeping media locked) and encrypted communication between two hosts. Cryptography is one of the main categories of information security.
Comparative analysis of modern methods and algorithms of cryptographic protection of information
Information protection problems are topical at the present stage of development of information technologies. Protection of information stored in electronic form, is implemented by cryptographic methods. The article deals with modern symmetric and asymmetric encryption methods. It analyzes advantages and disadvantages of each type of encryption algorithms. Based on comparison results of algorithms, recommendations on the use of algorithms to solve specific problems are provided. The aim of the article is to analyze modern methods and encryption algorithms. When analyzing the strengths and weaknesses of cryptographic methods of protection it is necessary to make a choice of the method of protection on the basis of selected performance criteria, as well as assess the possibility of practical use of the considered cryptographic protection methods for different tasks. Keyword—cryptoalgorithm, symmetric algorithm, an asymmetric algorithm, ciphertext.
An Algorithm for Encrypting/Decrypting Textual Messages
This paper evolves an algorithm for encrypting and decrypting textual messages for transmission over an unsecured channel. The algorithm is based on the selection of a prime integer depending upon the size of the message. Then all its 'generators' or primitive roots are identified. The primitive roots are used for generating the elements for calculating the keys. Key generation follows a particular strategy, on a per-arranged manner. The message constituting the alphanumeric string of characters is permuted by 1-level railway fence. The cipher text is determined by XORing the ASCII decimal value of the message character with its corresponding key, expressed in ASCII decimal. Select bits of the cipher text, are flipped. The enciphered text is then transmitted to the receiver. The prime integer and the primitive roots needed for key generation are transmitted to the receiver in a separate message. Upon receiving the cipher-text and the key generation generation parameters, the receiver reverses the whole sequence of operations to recover the plain-text. The algorithm scrambles the message during transmission through unsecured channels, and also safeguards data stored in the cloud. Applying 3 strategies for encryption/decryption is attempted for the first time, hence no comparison is attempted with prior works with regard to efficiency or versatility.
A Review of Encryption Methods for Secure Data Communication
Proceedings of the 30th iSTEAMS Multidisciplinary & Inter-tertiary Research Conference
We are living in the new era of information, and information is an important aspect of our living. So, the need of security is to ensure that our information remains confidential and only authorized users can access it, and ensuring that no unauthorized user has changed our information, so that it provides full accuracy and efficiency. To be secured, information needs to be hidden from unauthorized access i.e. confidentiality and protected from unauthorized change and also available to an authorized entity when it is needed. Cryptography is a technique that can be employed to ensure the security of transmitted information. This papers reviews existing tecgniques for cryptography and identified salient attributes of each method. Keywords: Cryptography; Symmetric key; ciphered text; Public Key; Private Key; Encryption; Decryption, Security, Transmission, Cyber Security.