An integrated approach for enhancing data security

  • Abstract
  • Keywords
  • References
  • PDF
  • Abstract

    Information security is a key challenge in today’s information era where a huge volume of data is being generated on the internet as a result of the online transaction. This data needs to be protected from the unauthorized users on the web. Cryptography is used to ensure the confidentiality and integrity of data in the virtual world. The strength of the cryptographic algorithm relies on the complexity involved in retrieving the original content from the unintelligible information. The system proposed in this paper focuses on the use of a different mechanism to increase complexity involved in the cryptanalysis. Different cryptographic techniques are used to create a modified plain text and modified key. The newly generated key is used to encrypt the modified plaintext to generate the ciphertext. From the security analysis, it is evident that the time taken for cryptanalysis by the proposed scheme is more when compared with the existing systems.



  • Keywords

    Key Strength; Security; Atbash Cipher; Rail Fence Cipher; Playfair Cipher; AES Algorithm.

  • References

      [1] William Stallings, Cryptography, and Network Security, Wiley, 1995.

      [2] Bruce Schiner, Applied Cryptography, John Wiley, 1996.

      [3] SachinSharma, JeevanSingh, Bisht, "Performance Analysis of Data Encryption Algorithms", International Journal of Scientific Research in Network Security and Communication, pp.1-5, 2015.

      [4] Yu-Jung Huang, Yang-Shih Lin, Kuang-Yu Hung, Kuo-Chen Lin, "Efficient Implementation of AES IP", IEEE Asia Pacific Conference on Circuits and Systems, 2006

      [5] Subashri T, Aruna chalam R, Gokul Vinoth Kumar B, Vaidehi V, "Pipelining Architecture of AES Encryption and Key Generation with Search-Based Memory", International Conference on Network Security and Applications. Pp.224-31, 2010.

      [6] Natasha Saini, Nitin Pandey, Ajeet Pal Singh, “Enhancement of Security Using Cryptographic Techniques”, 4th International Conference on Reliability, Infocom Technologies and Optimization 2015

      [7] Himanshu Tripathi, Bramah Hazela Data, “Security Enhancement Through Number System”, Second International Conference on Computational Intelligence & Communication Technology,pp.632-37, 2016.

      [8] Shaikh Ammarah P, Vikas Kaul and S K Narayankhedkar,” Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchange”, International Conference & workshop on Advanced Computing, pp 10-16, 2014.

      [9] Jigar Chauhan, Neekhil Dedhia, Bhagyashri Kulkarni,” Enhancing Data Security by using Hybrid Cryptographic Algorithm”, International Journal of Engineering Science and Innovative Technology, pp.221-28, 2013.

      [10] T. M. Sadikot, Dr. D. G. Kamdar,” Data Security Enhancement with Crystography – A Combination of Cryptography and Steganography”, International Journal of DARSHAN Institute on Engineering Research & Emerging Technologies, pp.1-6, 2015.

      [11] Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “A Hybrid Polybius-Playfair Music Cipher”, International Journal of Multimedia and Ubiquitous Engineering,pp.187-98, 2015.

      [12] Aruna Varanasi, V.U.K.Sastry, and S.Udaya Kumar, “A Modern advanced hill cipher involving a pair of keys, modular arithmetic addition, and substitution”, Journal of Global Research in Computer Science, pp.52-57, 2011.

      [13] G.Manikandan, S.PrasannaVenkatesan, S.Srividhya, Nooka Saikumar, “Generating Strong Keys Using Modified Huffman Tree Approach”, IEEE International Conference on Circuit, Power and Computing Technologies, 2016.

      [14] D. Lin, P. Dunphy, P. Olivier, J. Yan, “Graphical Passwords & Qualitative Spatial Relations”, Proceedings of the 3rd Symposium, On Usable Privacy and Security, Pittsburgh, USA, pp. 161-62, 2007.

      [15] Manhas, Jatinder, "Initial framework for website design and development", International Journal of Information Technology, pp.363-75. 2017.




Article ID: 12315
DOI: 10.14419/ijet.v7i2.12315

Copyright © 2012-2015 Science Publishing Corporation Inc. All rights reserved.