A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kanani, Pratik
- Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm
Authors
1 Department of Computer Science and Engineering Maharaja Sayajirao, University of Baroda, Baroda, IN
2 Department of Information Technology, University of Mumbai, Mumbai, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 24-32Abstract
Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.
Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.
Keywords
I-Se4GE, Cryptocat, TestSecure, MME, HS, Attacks.References
- S. Sharma, J. Bisht, “Performance Analysis of Data Encryption Algorithms,” IJSROSET, 3(1), 1-5, 2015.
- Jacobs School of Engineering. (2014,January,10). Computer Science and Engineering. [Online]. Available :https://cseweb.ucsd.edu/~mihir/cse207/w-asym.pdf
- Cryptocat. (2016,Feb,16). Cryptocat. [Online]. Available: https://crypto.cat/
- True private Messaging . (2016, March, 20). [Online], Available : http://www.whoishostingthis.com/blog/2015/04/29/im-encryption/
- Security-in-a-Box . (2016, March, 25). [Online], Available : https://securityinabox.org/en/guide/textsecure/android
- How Secure is Text Secure? . (2016, March, 20). [Online], Available : https://eprint.iacr.org/2014/904.pdf
- Naked Security . (2016, March, 27). [Online], Available : https://nakedsecurity.sophos.com/2013/07/06/cryptocat-encrypted-group-chats-may-have-been-crackable-for-7-months/
- Health BI . (2016, March, 28). [Online], Available : http://www.healthbi.com/secure-messaging-careful-pitfalls/
- Schneier on Security (2016, March, 29). [Online], Available : https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html
- J. Cao and M. Ma, “A Survey on Security Aspects for LTE and LTE-A Networks,” IEEE, Communication Surveys and Tutorials, 16(1), 283-302, 1955.
- R. Nossenson, “Long-Term Evolution Network Architecture,” IEEE, International conference on Microwave, Communications, Antennas and Electronics Systems, 2009, pp.1-4.
- Y. Huang, F. Leu and J. Liu, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core,” IEEE International conference on Broadband Wireless Computing, Communication and Applications, 2013, 360-365.
- P.Kanani, V.Kaul, K.Shah,” Hybrid PKDS in 4G” ,ICSPCT 2014, pp- 323-328.
- Java Cryptography Architecture standard algorithm name documentation. (2016,May,2015). [Online]. Available: http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html#CipherM. Young, The Technical Writer’s Handbook, Mill Valley, CA: University Science, 1989.
- An Insight into IPAddressing
Authors
1 Department of Computer Science and Engineering, MS University of Baroda, Gujarat, IN
2 Department of Information Technology, University of Mumbai, Mumbai, IN
Source
Oriental Journal of Computer Science and Technology, Vol 10, No 1 (2017), Pagination: 33-40Abstract
Thecurrent version of Internet Protocol (IPv4) has not been substantially changed in the past 25 years. IPv4 has proven to be robust and easily implemented. In the early stage, the deployment of IPv6 is prepared and begun on the IPv4-based network. In the intermediate stage, IPv4 and IPv6 coexist. In the later stage, IPv6 plays a leading role on the network and the IPv4 network is gradually withdrawing from the market. Meanwhile, researchers put forward many transition mechanisms for different network infrastructures and different evolution stages. In this paper, a detailed study is made on IPv4 along with its different smart saving techniques. Which help in delay of IPv4 to IPv6 shifting delays. Also different addressing schemes are discussed which remains unchanged in future. Along with that limitations of IPv4 is also focused so present IPv4 network infrastructure can be more secured till IPv6 realization. Further the need for IPv6 is discussed along with its header and address formats.Keywords
Ipv4, IPv6, NAT, Addressing, IP Classes, Subnetting, Supernetting;, IPv4 Limitations, Need for IPv6, IPv6 format and Headers.References
- Addressing, MVN UNiversity (2016, Oct.2). [Online], Available : http://mvn.edu.in/lms/mod/book/view.php?id=58
- How TCP/IP works, informbit (2016, Oct.4). [Online], Available : http://www.informit.com/articles/article.aspx?p=1807488&seqNum=2
- Introduction to MAC addresses. Lifewire (2016, Oct.2). [Online], Available : https://www.lifewire.com/introduction-to-mac-addresses-817937
- Registered ports, Wikipedia (2016, Oct.10). [Online], Available : https://en.wikipedia.org/wiki/Registered_port
- Internet protocol version 4, Tutorial point (2016, Oct.12). [Online], Available : https://www.tutorialspoint.com/ipv4/ipv4_quick_guide.htm
- IP – Addresses Classful, infocellar(2016, Oct.20). [Online], Available : http://infocellar.com/networks/ip/classful.htm
- IANA, Wikipedia (2016, Oct.25). [Online], Available : https://en.wikipedia.org/wiki/Internet_Assigned_Numbers_Authority
- Classful vs Classless Networks, Cisco (2016, Oct.28). [Online], Available : https://learningnetwork.cisco.com/thread/34420
- IP Addressing and subnetting for new users, Cisco (2016, Nov.2). [Online], Available : http://www.cisco.com/c/en/us/support/docs/ip/routing-information-protocol-rip/13788-3.html
- Subnetworks , wikipedia(2016, Nov.5). [Online], Available : https://en.wikipedia.org/wiki/Subnetwork
- Public and private IP Addresses, IPlocation (2016, Nov. 5). [Online], Available : https://www.iplocation.net/public-vs-private-ip-address
- Public and private IP Addresses, Siliconindia (2016, Nov.10). [Online], Available : http://References www.siliconindia.com/online-courses/tutorials/What-are-Private-and-Public-IP-Addresses-id-109.html
- DHCP, Wikipedia(2016, Nov.12). [Online], Available : https://en.wikipedia.org/wiki/Dynamic_Host_Configuration_Protocol
- What is DHCP?, Microsoft (2016, Nov.20). [Online], Available : https://technet.microsoft.com/en-us/library/cc781008(v=ws.10).aspx
- NAT, Wikipedia (2016, Nov.25). [Online], Available : https://en.wikipedia.org/wiki/Network_address_translation
- NAT, Computerworld (2016, Dec.10). [Online], Available : http://www.computerworld.com/article/2591804/lan-wan/network-address-translation.html
- A primer on IPv6 white paper, Digi International (2016, Dec.20). [Online], Available : https://www.digi.com/pdf/wp_ipv6.pdf
- IPv6 security models and dual stack (IPv6/IPv4) implications (2016, Dec 22). [Online] Available :http://cordis.europa.eu/fp7/ict/security/docs/ipv6-security-models-and-implications-executive-summary.pdf
- IPv6 Headers, Tutorialspoint, (2016, Dec. 23). [Online], Available : https://www.tutorialspoint.com/ipv6/ipv6_headers.htm
- IPv6 Packet, Wikipedia, (2016, Dec. 23). [Online], Available : https://en.wikipedia.org/wiki/IPv6_packet
- Configuring IPv6, Cisco, (2016, Dec. 24). [Online], Available http://www.cisco.com/c/en/us/td/docs/switches/datacenter/nexus9000/sw/6-x/unicast/configuration/guide/l3_cli_nxos/l3_ipv6.pdf
- IPv6 Address types, Tutorialspoint, (2016, Dec. 23). [Online], Available : https://www.tutorialspoint.com/ipv6/ipv6_address_types.htm.