Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Pandey, Manoj Kumar
- An Effective and Secure Key Management Scheme in Multiphase Cryptosystem
Abstract Views :86 |
PDF Views:2
Authors
Affiliations
1 Computer Science & Engineering, Chhatrapati Shivaji Institute of Technology, Durg, IN
1 Computer Science & Engineering, Chhatrapati Shivaji Institute of Technology, Durg, IN
Source
Networking and Communication Engineering, Vol 6, No 6 (2014), Pagination: 237-242Abstract
One of the important aspects of network security is the security of data being communicated. The secret data can be obtained by unwanted users for poisonous purpose therefore its essential to apply efficient encryption algorithm to increase data security like Multiphase Encryption algorithm using an efficient technique for managing keys being used for encryption and decryption. This paper mainly focuses on implementation of the multiphase cryptosystem using AES, 3DES and management of keys using RSA algorithm.Keywords
Data Security, AES, 3DES, RSA, Encryption, Multiphase Encryptions, Data Verification.- Implementation of DNA Cryptosystem using Public and Private Key Cryptography
Abstract Views :206 |
PDF Views:1
Authors
Affiliations
1 Department of CSE, Swami Shri Swaroopanand Saraswati Mahavidyalaya, Hudco, Bhilai, IN
2 Department of CSE, Shri Shankracharya Technical College, Junwani, IN
1 Department of CSE, Swami Shri Swaroopanand Saraswati Mahavidyalaya, Hudco, Bhilai, IN
2 Department of CSE, Shri Shankracharya Technical College, Junwani, IN
Source
Networking and Communication Engineering, Vol 11, No 4 (2019), Pagination: 53-58Abstract
Data security is one of the important aspects of network security so a encryption algorithm is needed to increase data security like DNA Cryptography. DNA cryptography is a fusion of biotech and Computer Science field. This paper mainly focuses on implementation of the DNA cryptosystem with the use of AES and keys management using RSA algorithm and also for verification of data at other side message digest SHA-256 has been used to achieve Authentication, integrity, confidentiality, Non-repudiation, Access control, availability & signature. The system has been implemented in java using NETBEANS IDE 8.2.
Keywords
Data Security, Advance Encryption Standard (AES), Rivest, Shamir, and Adelman (RSA), DNA Encryption (DNAE), Cryptography, Data Verification, SHA-256.References
- Jawahar Thakur, Nagesh Kumar “DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis”, International Journal of Emerging Technology and Advanced Engineering, Volume 1, Issue 2, December 2011, ISSN 2250-2459
- ShraddhaSoni, HimaniAgrawal, Monisha Sharma “Analysis and Comparison between AES and DES Cryptographic Algorithm”, International Journal of Engineering and Innovative Technology (IJEIT), Volume 2, Issue 6, December 2012, ISSN: 2277-3754.
- Yunpeng Zhang and Liu He Bochen Fu (2012), “Research on DNA Cryptography, Applied Cryptography and Network Security”, Dr. Jaydip Sen (Ed.), ISBN: 978-953-51-0218-2, InTech, Available from: http://www.intechopen.com/books/applied-cryptography-and-network-security/research-on-dna-cryptography
- Radu Terec, Mircea-Florin Vaida, Lenuta Alboaie, Ligia Chiorean, “DNA Security using Symmetric and Asymmetric Cryptography”, pp 34-51, Available at https://www.researchgate.net/publication/230771223
- Yogesh Kumar, Rajiv Munjal, Harsh Sharma, “Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures”, International Journal of Computer Science and Management Studies, Vol. 11, Issue 03, Oct 2011.
- Posch, K. C., Posh, R., “Designing a new encryption method for optimum parallel performance”, IEEE First International Conference on Algorithms and Architectures for Parallel Processing, Brisbane, Qld., Australia 1995.
- Vinay kumar Pant, Ashutosh kumar, “DNA Cryptography: An New Approach to Secure Cloud Data”, International Journal of Scientific & Engineering Research, Volume 7, Issue 6, June-2016, pp 890-895
- Vaida MF., Terec R., Alboaie L. (2011), “Alternative DNA Security Using BioJava”, In: Cherifi H., Zain J.M., El-Qawasmeh E. (eds) Digital Information and Communication Technology and Its Applications, DICTAP 2011, Communications in Computer and Information Science, volume 166. Springer, Berlin, Heidelberg
- Tatiana, Hodorogea, Vaida, Mircea, Monica, Borda, Cosmin, Streletchi. (2008), “A Java Crypto implementation of DNA Provider featuring complexity in theory and practice”, pp 607 – 612,10.1109/ITI.2008.4588479
- Harneet Singh, Karan Chugh, Harsh Dhaka, A. K. Verma, “DNA based Cryptography: An Approach to Secure Mobile Networks”, International Journal of Computer Applications (0975 - 8887) Volume 1 – No. 19, pp 77-80
- Snehal Javheri, Rahul Kulkarni, “Secure DataCommunication Using DNA based Cryptography in Mobile Adhoc Network”, International Journal of Science and Research (IJSR), Volume 3, Issue 9, September 2014, pp 1504-1508.
- http://technet.microsoft.com/en-us/library/cc962035.aspx.
- RaziehMokhtarnameh, NithiapidaryMuthuvelu, Sin Ban Ho, Lan Chai “A Comparison Study on Key Exchange-Authentication Protocol”, Faculty of Information Technology, Multimedia University, Jalan Multimedia, 63100 Cyberjaya, Selangor, Malaysia, International Journal of Computer Applications (0975 – 8887)Volume 7– No.5, September 2010.
- Manoj kumar pandey, Prateeksha Pandey, “An Effective and Secure Key Management Scheme in Multiphase Cryptosystem”, CiiT International Journal of Networking and Communication Engineering ISSN: 0974 – 9616 Volume 6, Issue 6, August 2014, pp 237-242.