A Novel Concept to Enhance Security  
  Authors : Fahim Multani; Gajendra Singh

 

In cryptographic application, the data sent to a remote node are encrypted first at the sender node use a key then it encrypt to data and send to the other node called receiver node. This is the method where the attacker or hacker will not have the original key which is necessary to get the original information and thus the hacker or attacker will be incapable to do something with the session. In this paper, A new concept for encryption is proposed and proposed concept is based on the transformation of a text file into word file on both client and server node. We analyze proposed method by calculating the number of all possible key permutations. And the expected results are showing the effectiveness of the proposed method.

 

Published In : IJCAT Journal Volume 1, Issue 8

Date of Publication : 30 September 2014

Pages : 390 - 395

Figures :01

Tables : 01

Publication Link : A Novel Concept to Enhance Security

 

 

 

Fahim Multani : M.Tech. Scholar CSE Dept., SSSIST, Sehore (M.P.), India

Gajendra Singh : HOD CS/IT Dept., SSSIST, Sehore (M.P.), India

 

 

 

 

 

 

 

Information security

Encryption

Decryption

Cryptography

Symmetric

Asymmetric

Key

Algorithm

This part presents the expected performance of proposed concept. The proposed concept is based on symmetric key techniques. Where at both end same key will used. There is some performance parameters used during expected results analysis. First; there is no important dissimilarity when the results displayed either in base 64 encoding or hexadecimal base encoding. Secondly; in the case of varying size of data, it concluded that proposed concept can be better than earlier presented techniques. Finally in the case of varying size of key which is related with security of the techniques that means larger key produced good security but too large can be a causes of poor efficiency in terms of execution time. In this paper it is surveyed and designed security concept used for securing information which is transferring over public network in open way. The concept is the calculation of selected parameters in cryptography.

 

 

 

 

 

 

 

 

 

[1] D Das, Je Nath, M Mukherjee, N, A Nath and D Das “An Integrated Symmetric key Cryptography Algorithm using Generalised modified Vernam Cipher method and DJSA method: DJMNA symmetric key algorithm” Published in IEEE World Congress on Information and Communication Technologies (WICT), 11-14 Dec. 2011 Page(s):1199 – 1204.

[2] A Nadeem., “A performance comparison of data encryption algorithms," IEEE Information and Communication Technologies, 2006on Communication Systems and Network Technologies (CSNT), 3-5 June 2011 Page(s):125 - 130

[3] J Nath, S Das, S Agarwal and A Nath “Advanced Steganographic Approach for Hiding Encrypted Secret Message in LSB, LSB+1, LSB+2 and LSB+3 Bits in Non standard Cover Files” International Journal of Computer Applications (0975 – 8887) Volume 14– No.7, February 2011

[4] D Salama, Al Minaam, M. Hatem, A Kader, and M M Hadhoud “Evaluating the Effects of Symmetric Cryptography Algorithms on Power Consumption for Different Data Types” International Journal of Network Security, Vol.11, No.2, PP.78-87, Sept. 2010

[5] R. Venkateswaran Dr. V. Sundaram “Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography” International Journal of Computer Applications (0975 – 8887)Volume 3 – No.7, June 2010

[6] J Sanyal, R Ray, A Nath, D Das, “A new Challenge of hiding any encrypted secret message inside any Text/ASCII file or in MS word file: RJDA Algorithm” Published in IEEE International Conference on Communication Systems and Network Technologies (CSNT), 11-13 May 2012 Page(s):889 – 893

[7] J Nath, N Khanna, J James, A Nath , S Chakraborty and A Chakrabarti” New Symmetric key Cryptographic algorithm using combined bit manipulation and MSA encryption algorithm: NJJSAA symmetric key algorithm” Published in IEEE International Conference

[8] D Chatterjee, J Nath, S Dasgupta, A Nath “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” Published in IEEE International Conference on Communication Systems and Network Technologies (CSNT), 3-5 June 2011 Page(s): 89 - 94

[9] A Kaushik, M Bamela and A Kumar “Block Encryption Standard for Transfer of Data” Published in International Conference on Networking and Information Technology (ICNIT), 2010 11-12 June 2010 Page(s):381 - 385

[10] Y Wang and M Hu “Timing evaluation of the known cryptographic algorithms “2009 Published in International Conference on Computational Intelligence and Security, 2009. CIS '09. 11-14 Dec. 2009 Page(s):233 - 237

[11] Md. N Islam, Md. M H Mia, M F. I. Chowdhury, M.A. Matin “Effect of Security Increment to Symmetric Data Encryption through AES Methodology” Published in Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, 6-8 Aug. 2008 Page(s): 291 - 294

[12] G C. Kessler, 1998, An overview of cryptography, [online]:http://www.garykessler.net/library/crypto.html ,date accessed: 23/07/06