An integrated approach for enhancing data security

  • Authors

    • G Manikandan SASTRA DEEMED University
    • R Jeeva Dharani SASTRA DEEMED University
    • R Maya SASTRA DEEMED University
    2018-06-01
    https://doi.org/10.14419/ijet.v7i2.12315
  • Key Strength, Security, Atbash Cipher, Rail Fence Cipher, Playfair Cipher, AES Algorithm.
  • Abstract

    Information security is a key challenge in today’s information era where a huge volume of data is being generated on the internet as a result of the online transaction. This data needs to be protected from the unauthorized users on the web. Cryptography is used to ensure the confidentiality and integrity of data in the virtual world. The strength of the cryptographic algorithm relies on the complexity involved in retrieving the original content from the unintelligible information. The system proposed in this paper focuses on the use of a different mechanism to increase complexity involved in the cryptanalysis. Different cryptographic techniques are used to create a modified plain text and modified key. The newly generated key is used to encrypt the modified plaintext to generate the ciphertext. From the security analysis, it is evident that the time taken for cryptanalysis by the proposed scheme is more when compared with the existing systems.

     

     

  • References

    1. [1] William Stallings, Cryptography, and Network Security, Wiley, 1995.

      [2] Bruce Schiner, Applied Cryptography, John Wiley, 1996.

      [3] SachinSharma, JeevanSingh, Bisht, "Performance Analysis of Data Encryption Algorithms", International Journal of Scientific Research in Network Security and Communication, pp.1-5, 2015.

      [4] Yu-Jung Huang, Yang-Shih Lin, Kuang-Yu Hung, Kuo-Chen Lin, "Efficient Implementation of AES IP", IEEE Asia Pacific Conference on Circuits and Systems, 2006 https://doi.org/10.1109/APCCAS.2006.342467.

      [5] Subashri T, Aruna chalam R, Gokul Vinoth Kumar B, Vaidehi V, "Pipelining Architecture of AES Encryption and Key Generation with Search-Based Memory", International Conference on Network Security and Applications. Pp.224-31, 2010.

      [6] Natasha Saini, Nitin Pandey, Ajeet Pal Singh, “Enhancement of Security Using Cryptographic Techniquesâ€, 4th International Conference on Reliability, Infocom Technologies and Optimization 2015 https://doi.org/10.1109/ICRITO.2015.7359224.

      [7] Himanshu Tripathi, Bramah Hazela Data, “Security Enhancement Through Number Systemâ€, Second International Conference on Computational Intelligence & Communication Technology,pp.632-37, 2016.

      [8] Shaikh Ammarah P, Vikas Kaul and S K Narayankhedkar,†Security Enhancement Algorithm for Data Transmission using Elliptic Curve Diffie - Hellman Key Exchangeâ€, International Conference & workshop on Advanced Computing, pp 10-16, 2014.

      [9] Jigar Chauhan, Neekhil Dedhia, Bhagyashri Kulkarni,†Enhancing Data Security by using Hybrid Cryptographic Algorithmâ€, International Journal of Engineering Science and Innovative Technology, pp.221-28, 2013.

      [10] T. M. Sadikot, Dr. D. G. Kamdar,†Data Security Enhancement with Crystography – A Combination of Cryptography and Steganographyâ€, International Journal of DARSHAN Institute on Engineering Research & Emerging Technologies, pp.1-6, 2015.

      [11] Chandan Kumar, Sandip Dutta, Soubhik Chakraborty, “A Hybrid Polybius-Playfair Music Cipherâ€, International Journal of Multimedia and Ubiquitous Engineering,pp.187-98, 2015.

      [12] Aruna Varanasi, V.U.K.Sastry, and S.Udaya Kumar, “A Modern advanced hill cipher involving a pair of keys, modular arithmetic addition, and substitutionâ€, Journal of Global Research in Computer Science, pp.52-57, 2011.

      [13] G.Manikandan, S.PrasannaVenkatesan, S.Srividhya, Nooka Saikumar, “Generating Strong Keys Using Modified Huffman Tree Approachâ€, IEEE International Conference on Circuit, Power and Computing Technologies, 2016.

      [14] D. Lin, P. Dunphy, P. Olivier, J. Yan, “Graphical Passwords & Qualitative Spatial Relationsâ€, Proceedings of the 3rd Symposium, On Usable Privacy and Security, Pittsburgh, USA, pp. 161-62, 2007. https://doi.org/10.1145/1280680.1280708.

      [15] Manhas, Jatinder, "Initial framework for website design and development", International Journal of Information Technology, pp.363-75. 2017.

  • Downloads

  • How to Cite

    Manikandan, G., Jeeva Dharani, R., & Maya, R. (2018). An integrated approach for enhancing data security. International Journal of Engineering & Technology, 7(2), 880-883. https://doi.org/10.14419/ijet.v7i2.12315

    Received date: 2018-05-01

    Accepted date: 2018-05-14

    Published date: 2018-06-01