Refine your search
Collections
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kiran, S.
- Nearest Prime Cipher for Data Confidentiality and Integrity
Abstract Views :133 |
PDF Views:5
Authors
Affiliations
1 Dept of CSE, YSREC of YV University, Proddatur, IN
2 YSREC of YV University, Proddatur, IN
1 Dept of CSE, YSREC of YV University, Proddatur, IN
2 YSREC of YV University, Proddatur, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 6 (2016), Pagination: 2944-2948Abstract
Communication is the process of transmitting information from source to destination. The information exchanged between sender and receiver through the proper channel. The information should not be stolen by unauthorized parties like hackers while sending or receiving via channel. To avoid this stealing of the information cryptography techniques are used. The key is playing prominent role in cryptography. This paper proposes a novel method for key generation by using nearest primes. Further 2's complement and logical operations are used in encryption and decryption process. The final cipher text is generated by representing the intermediate cipher in matrix form and then read by column wise.Keywords
2’s Complement, Ciphertext, Cryptography, Nearest Prime Number, Plaintext, XOR Operation.- Multi-Stage Encryption Using Seeded SDES
Abstract Views :134 |
PDF Views:5
Authors
Affiliations
1 Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, IN
1 Department of Computer Science and Engineering, YSREC of Y V University, Proddatur, IN
Source
International Journal of Advanced Networking and Applications, Vol 7, No 2 (2015), Pagination: 2694-2699Abstract
Now-a-days the usage of internet increases tremendously so, there is a need of security for the data. Cryptography is a process of scrambling the data into unknown format which provides security to the data. Modern cryptography is mainly based on mathematical theory and computer science practice. Cryptography process is done with the help of encryption and decryption. The basic two ideas behind the cryptography technique are substitution and transposition. This paper presents a multistage encryption algorithm. At the end of each stage an intermediate cipher is produced. The key is generated by using SEEDED SDES algorithm. Final cipher text is derived from the local binary pattern (LBP).Keywords
Decryption, Encryption, Railference, SEEDED SDES Key Generation, Substitution, Transposition.- Robust Lossless Secure Image Steganography Using Spiral Scan
Abstract Views :155 |
PDF Views:0
Authors
Affiliations
1 Department of CSE, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
2 Department of Physics, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
1 Department of CSE, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
2 Department of Physics, Y.S.R.Engineering College of YV University, Proddatur, Andhra Pradesh, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 5 (2018), Pagination: 3596-3600Abstract
Steganography is the principles and techniques of embedding data within other data. Cryptography is the principles and techniques of changing the data one form to another form. Image Steganography is the process of hiding data within an image. Steganography along with encryption techniques provides an additional security to the data. Several techniques exist for image steganography, in this work, a new lossless image steganography technique along with cryptographic method is presented. Lossless compression is a class of algorithms that allows the original data to be perfectly reconstructed from the compressed data. Present work concentrates the lower nibble of pixels in the cover image for embedding the information; further encryption techniques will be applied. It is not possible for the hacker to retrieve the secured data from the cover image.Keywords
Compression, Cover Image, Cryptography, Lossless, Nibble, Steganograpy.References
- Petitcolas, F.A.P., Anderson, R.J. & Kuhn, M.G., “Information Hiding – A survey”, Proceedings of the IEEE, 87:07, July 1999.
- Wang, H & Wang, S, “Cyber warfare: Steganography vs. Steganalysis”, Communications of the ACM, 47:10, October 2004.
- Pranab Garg, Jaswinder Singh Dilawari, "A Review Paper on Cryptography and Significance of Key Length", IJCSCE Special issue on“Emerging Trends in Engineering ICETIE 2012.
- Chandramouli, R., Kharrazi, M. & Memon, N., “Image steganography and steganalysis: Concepts and Practice”, Proceedings of the 2nd International Workshop on Digital Watermarking, October 2003.
- Sumeet Kaur, Savina Bansal, "Steganography and Classification of Image Steganography Techniques", Published in: Computing for Sustainable Global Development (INDIACom), 2014 International conference.
- Gaurav Vijayvargiya, Dr. Sanjay Silakari, Dr.Rajeev Pandey, "A Survey: Various Techniques of Image Compression", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 11, No. 10, October 2013.
- Rashi Singh, Gaurav Chavla, “ Data Hiding at 7th bit (RGB) with cryptography”, IJCSMC, vol 3, issue 5, may 2014.
- Chang, Chin-Chen., Lin, Iuan-Chang., and Yaun-Hui YU., “ A new Steganographic method for color and gray scale image hiding”, Computer Vision and Image Understanding, ELSEVIER, Vol. 107, No. 3, pp. 183-194,2007.
- Shreelekshmi R, Wilscy C, Madhavan V. "Cover image preprocessing for more reliable LSB replacement steganography". In: Proc. of International Conf. on Signal Acquisition and Processing; 2010. p. 153–56.
- S.S.Maniccama, N.G.Bourbakis, “Image and video encryption using SCAN patterns” Pattern Recognition Volume 37, Issue 4, April 2004, Pages 725-737.
- Network as a Service Model in Cloud Authentication by HMAC Algorithm
Abstract Views :170 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, IN
2 Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, AP, 522101, IN
1 Department of Computer Science and Engineering, YSR Engineering College of Yogi Vemana University Proddatur Kadapa, Andhra Pradesh, 516360, IN
2 Department of Computer Science and Engineering, Bapatla Engineering College, Bapatla, AP, 522101, IN
Source
International Journal of Advanced Networking and Applications, Vol 9, No 6 (2018), Pagination: 3623-3631Abstract
Resource pooling on internet-based accessing on use as pay environmental technology and ruled in IT field is the cloud. Present, in every organization has trusted the web, however, the information must flow but not hold the data. Therefore, all customers have to use the cloud. While the cloud progressing info by securing-protocols. Third party observing and certain circumstances directly stale in flow and kept of packets in the virtual private cloud. Global security statistics in the year 2017, hacking sensitive information in cloud approximately maybe 75.35%, and the world security analyzer said this calculation maybe reached to 100%. For this cause, this proposed research work concentrates on Authentication-Message-Digest-Key with authentication in routing the Network as a Service of packets in OSPF (Open Shortest Path First) implementing Cloud with GNS3 has tested them to securing from attackers.Keywords
Authentication, Attacks, Cloud, Cryptography, Protocols, Router, Security.References
- X. Wang and S. Zhang, Research about optimization of campus network security system, Procedia Eng., vol. 15, pp. 1802–1806, 2011.
- B.Harikrishna, S.Kiran, G.Murali and R.Pradeep Kumar Reddy, Security Issues In Service Model Of Cloud Computing Environment, Procedia Computer Science 87 ( 2016 ) 246 251, Science Direct.
- Cataldo Basile, Antonio Lioy, Analysis of Application Layer Filtering Policies With Application to HTTP, IEEE/ ACM Transactions on Networking, 1063-6692, 2013 IEEE.
- Free CCNA Tutorials. Study CCNA For Free!. Studyccna. com. N.p., 2017. Web. 21 Mar. 2017.
- Cite A Website - Cite This For Me. Networkstraining.com. N.p., 2017. Web. 21 Mar. 2017.
- B.Harikrishna, N.Anusha, K.Manideep, Madhusudhanarao, Ch, Quarantine Stabilizing MultiKeyword Rated Discover with Unfamiliar ID Transferover Encrypted Cloud Warning IJERCSE Vol 2, Issue 2, February 2015.
- Zili Shao, Chun Xue, Qingfeng Zhuge, Meikang Qiu, Bin Xiao, Edwin H.-M Sha, ―Security Protection and Checking for Embedded System Integration against Buffer Overflow attacks via Hardware/Software‖, IEEE Transactions on Computers, Vol. 55, NO. 4, April 2006.
- Source: https://docs.gns3.com/. B. Harikrishna, Efficient Resource Allocation using Fair Scheduling in Cloud Based Systems, RITS ICA EM 2012.
- Chandra Wijaya 2011 IEEE 355-360.
- B. Harikrishna, S. Kiran, R. Pradeep Kumar Reddy, Protection on sensitive information in cloud Cryptography algorithms, IEEE digital Library 10.1109/CESYS.2016.7889894.
- Source: Computer weekly.com
- Jason C. Neumann The book of GNS3 Device Nodes, Live Switches, and the Internet 2015.
- Khalid Abu Al-Saud, Hatim Tahir, Moutaz Saleh and Mohammed Saleh 2010 IAJIT 380- 387.
- Check point FireWall-1, version 3.0 White paper June 1997 http://www.checkpoint.com/products/whitepapers/wp 30.pdf.
- Wallace, Kevin. CCNP Routing And Switching ROUTE 300-101 Official Cert Guide. 1st ed. Indianapolis, IN: Pearson Education, 2015.
- Hon Sun Chiu, Kwan L. Yeung, and King-Shan Lui- J-CAR: An Efficient Joint Channel Assignment and Routing Protocol for IEEE 802.11-Based MultiChannel Multi-Interface Mobile Ad Hoc Networks, 1706 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8 (4) , APRIL 2009.
- Anja Feldmann, Jennifer Rexford, and Ramon Caceres, ”Efficient Policies for Carrying Web Traffic Over Flow- Switched Networks” , IEEE/ ACM transactions on networking, vol. 6, no. 6, December 1998.
- Q.Zhao, Y. Mou, and S.H.. Qin, “The design of Security authentication system based on campus Network, “ Proc. – Int. Conf. Electr. Control Eng. ICECE 2010, pp. 3070-3073, 2010.
- Performance of Evaluation for AES with ECC in Cloud Environment
Abstract Views :184 |
PDF Views:0
Authors
Affiliations
1 Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
2 Department of Computer Science and Engineering, JNTUA College of Engineering Pulivendula, Kadapa, Andhra Pradesh – 516390, IN
3 Department of Computer Science and Engineering,, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
1 Department of Computer Science and Engineering, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
2 Department of Computer Science and Engineering, JNTUA College of Engineering Pulivendula, Kadapa, Andhra Pradesh – 516390, IN
3 Department of Computer Science and Engineering,, Y.S.R Engineering College of Yogi Vemana University Proddatur, Kadapa, Andhra Pradesh - 516360, IN
Source
International Journal of Advanced Networking and Applications, Vol 10, No 5 (2019), Pagination: 4019-4025Abstract
During the day; Technology is Cloud, where people can share resources, services and information across the Internet. Due to information on the Internet, security is considered a major problem. The information should be protected by an unauthorized user and should be sent to a person with a private and confidential intent. On this proposed work, to provide a secure method, secure connection, authentication, confidentiality and third-party data protection in cloud computing. In the combination of the Advanced Encryption Standard (AES) and Cryptographic Curve Cryptography (ECC) analyzing of different parameters like storage, encryption time, decryption time and correlation. The results show that the impact of this integrated approach is more important than the other secure algorithms.Keywords
Security, Advanced Encryption Standard, Elliptic Curve Cryptography, Cloud Computing, Cryptography Algorithms, Authentication, Privacy, Confidentially.References
- B. Hari Krishna, S. Kiran, G. Murali, R. Pradeep Kumar Reddy. "Security Issues in Service Model of Cloud Computing Environment", Procedia Computer Science, 2016.
- B. Harikrishna, S. Kiran, R. Pradeep kumar Reddy. "Protection on sensitive information in cloud — Cryptography algorithms", 2016 International Conference on Communication and Electronics Systems (ICCES), 2016.
- D. E. Denning, “Cryptography and Data Security”, Addison-Wesley Publishing Company, America, (1982).
- G. C. Kessler, “An overview of cryptography”, [Online], Available: ,http://www.garykessler.net/ library/crypto.html# purpose, (1998).
- P. Patil, P. Narayankar, N. D. G. and M. S. M, “A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish”, Procedia Computer Science, (2016); Nagpur, India.
- P. Prajapati, N. Patel, R. Macwan, N. Kachhiya and P. Shah, “Comparative Analysis of DES, AES, RSA Encryption Algorithms”, International Journal of Engineering and Management Research, vol. 4, no. 1, (2014), pp. 132-134.
- P. Mahajan and A. Sachdeva, “A study of Encryption algorithms AES, DES and RSA for security”, Global Journal of Computer Science and Technology, vol. 13, no. 15, (2013).
- Y. Wang and M. Hu, “Timing evaluation of the known cryptographic algorithms”, International Conference on Computational Intelligence and Security, (2009).
- V. R. Pancholi and B. P. Patel, “Enhancement of Cloud Computing Security with Secure Data Storage using AES”, International Journal for Innovative Research in Science and Technology, vol. 2, no. 09, (2016), pp. 18-21.
- P. Kumar and S. B. Rana, “Development of modified AES algorithm for data security”, Optik-International Journal for Light and Electron Optics, vol. 127, no. 04, (2016), pp. 2341-2345.
- A. K. Mandal, C. Parakash and A. Tiwari, “Performance evaluation of cryptographic algorithms: DES and AES”, Electrical, Electronics and Computer Science (SCEECS), (2012).
- A. A. Hasib and A. A. M. Haque, “A comparative study of the performance and security issues of AES and RSA cryptography”, Third International Conference on Convergence and Hybrid Information Technology, (2008).
- K. Rege, N. Goenka, P. Bhutada and S. Mane, “Bluetooth Communication using Hybrid Encryption Algorithm based on AES and RSA”, International Journal of Computer Applications, vol. 71, no. 22, (2013).
- R. R. Ahirwal and M. Ahke, “Elliptic curve diffiehellman key exchange algorithm for securing hypertext information on wide area network”, International Journal of Computer Science and Information Technologies, vol. 4, no. 2, (2013), pp. 363-368.
- A. Pourali, M. V. Malakooti and M. H. Yektaie, “A Secure SMS Model in E-Commerce Payment using Combined AES and ECC Encryption Algorithms”, The International Conference on Computing Technology and Information Management (ICCTIM), (2014).
- B. Ji, L. Wang and Q. Yang, “New Version of AES-ECC Encryption System Based on FPGA in WSNs”, Journal of Software Engineering, vol. 9, no. 1, (2015), pp. 87-95.
- N. Jha and B. Patel, “Forward Secrecy For Google HTTPS using Elliptic Curve Diffie-Hellman Key”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, no. 9, (2012).
- Dr.Smith Jones.” AN EMPIRICAL CRYPTOGRAPHY ALGORITHM FOR CLOUD SECURITY BASED ON HASH ENCRYPTION”, International Journal of Computing and Corporate Research ISSN (Online) : 2249- 054X Volume 4 Issue 4 July 2014 International Manuscript ID : 2249054XV4I4072014-43.
- A method for obtaining digital signatures and public key cryptosystems, R.Rivest, A.Shamir and L.Adleman “communication of the association for computing machinery “ 1978, pp 120-126.
- RSA algorithm using modified subset sum cryptosystem, Sonal Sharma, Computer and Communication Technology (ICCCT), pp-457-461, IEEE 2011.
- Harikrishna, B. (2018). Network as a Service Model in Cloud Authentication by HMAC Algorithm.
- Harikrishna Bommala, S. Kiran (2018). Client Authentication as a Service in Microsoft Azure, vol 8, issues 2, IJEAT.
- Fibonacci Technique for Privacy and Security to Sensitive Data on Cloud Environment
Abstract Views :151 |
PDF Views:0
Authors
Affiliations
1 Computer Science and Engineering ,Chalapathi Institute of Engineering and Technology, Guntur, IN
2 Computer Science and Engineering ,YSR Engineering College of Yogi Vemana University, Proddatur, IN
1 Computer Science and Engineering ,Chalapathi Institute of Engineering and Technology, Guntur, IN
2 Computer Science and Engineering ,YSR Engineering College of Yogi Vemana University, Proddatur, IN