Open Access Open Access  Restricted Access Subscription Access

Artificially Intellegent Anti-BIS Mechanism Using Shared Key Cryptography


Affiliations
1 Ramjas College, North Campus, University of Delhi, Delhi-110007, India
 

As BIS processeses begin, the system approaches too far from equilibrium state leading to chances of loosing information within it. Information is one of the most important assets for any organization to protect against any form of damage or theft. We need to generate anti-BIS processes in order to protect the system from its loss. Cryptography means the art of encrypting and decrypting digital data using mathematical techniques. The ciphered data can only be deciphered by someone who has the mechanism for that. But if the original ciphered data or ciphering key gets damaged then the original data can never be recovered. Now, the Secret sharing scheme for digital data based on Shamir's threshold cryptography method to share the data among different users comes to rescue in such cases. The concept is developed in the form of a web application where one user submits the data and breaks it into shares after ciphering it through the proposed bit conversion method. The shares are distributed among different users depending on who can collectively view the original data. Now these users group can view data only if they have the minimum required no. of shares. This methodology is applicable to any form of digital data.

Keywords

BIS (Breakdown of Integrated System), Cryptography, Secret Sharing, Masking, Cipher.
User
Notifications
Font Size

Abstract Views: 244

PDF Views: 0




  • Artificially Intellegent Anti-BIS Mechanism Using Shared Key Cryptography

Abstract Views: 244  |  PDF Views: 0

Authors

Tuhin Datta
Ramjas College, North Campus, University of Delhi, Delhi-110007, India

Abstract


As BIS processeses begin, the system approaches too far from equilibrium state leading to chances of loosing information within it. Information is one of the most important assets for any organization to protect against any form of damage or theft. We need to generate anti-BIS processes in order to protect the system from its loss. Cryptography means the art of encrypting and decrypting digital data using mathematical techniques. The ciphered data can only be deciphered by someone who has the mechanism for that. But if the original ciphered data or ciphering key gets damaged then the original data can never be recovered. Now, the Secret sharing scheme for digital data based on Shamir's threshold cryptography method to share the data among different users comes to rescue in such cases. The concept is developed in the form of a web application where one user submits the data and breaks it into shares after ciphering it through the proposed bit conversion method. The shares are distributed among different users depending on who can collectively view the original data. Now these users group can view data only if they have the minimum required no. of shares. This methodology is applicable to any form of digital data.

Keywords


BIS (Breakdown of Integrated System), Cryptography, Secret Sharing, Masking, Cipher.