Nur Algorithm on Data Encryption and Decryption

  • Authors

    • Nur Aminudin
    • Andino Maseleno
    • Shankar K
    • S Hemalatha
    • K Sathesh kumar
    • Fauzi .
    • Rita Irviani
    • Muhamad Muslihudin
    2018-05-07
    https://doi.org/10.14419/ijet.v7i2.26.14363
  • cryptography, private key, Nur algorithm, assembly, masm32
  • Security is a priority in information system, especially in the exchange of data that are important or confidential. The information to be given to the party entitled to the information must be properly safeguarded, don’t fall into the  other hands who have no right to such information. One way to maintain the security of information exchanged in a system can be done using cryptographic techniques. Cryptography is the art and science to hide information from third parties. In cryptography a person who has a private key can convert plaintext data into unique and unreadable data (ciphertext) and can convert existing ciphertext into plaintext form by using its private key. System development (System Development Lifecycle) can mean to construct a new system to replace old system, combined with prototyping technique to build a cryptographic system using Nur algorithm which is implemented using programming language used is assembly (MASM32). In Nur Aminuddin's Encryptor there are two data-reading techniques namely encryption technique (the technique of converting data from the original into unreadable code) and decryption technique (the techniques of reading unreadable codes become readable) Encryption technique is built by applying technique of modern cryptography which holds secrecy on the symmetric key, so the security of encryption depends only on the key and does not depend on whether the algorithm is known to people or not.

     

     

  • References

    1. [1] Singh, P., & Kumar, S. (2017). Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish.International Journal of Engineering & Technology, 7(1.5), 221-225. doi:http://dx.doi.org/10.14419/ijet.v7i1.5.9150

      [2] Santhosh Kumar, R., & Bharanidharan, R. (2017). Neighbor discovery-based security enhancement using threshold cryptography for IP address assigning in network. International Journal of Engineering & Technology, 7(1.1), 439-443. doi:http://dx.doi.org/10.14419/ijet.v7i1.1.11243

      [3] Murali Krishna, B., Khan, H., & Madhumati, G. (2017). Reconfigurable pseudo biotic key encryption mechanism for cryptography applications. International Journal of Engineering & Technology, 7(1.5), 62-70. doi:http://dx.doi.org/10.14419/ijet.v7i1.5.9124

      [4] P. George, J., & Varghese Kureethara, J. (2018). Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures. International Journal of Engineering & Technology, 7(2.6), 141-146.

      doi:http://dx.doi.org/10.14419/ijet.v7i2.6.10140

      [5] Sri Lakshmi, M., & Srikanth, V. (2018). A Study on Light Weight Cryptography Algorithms for Data Security in IOT. International Journal of Engineering & Technology, 7(2.7), 887-890. doi:http://dx.doi.org/10.14419/ijet.v7i2.7.11088

      [6] Noorbasha, F., & Suresh, K. (2018). FPGA implementation of RGB image encryption and decryption using DNA cryptography. International Journal of Engineering & Technology, 7(2.8), 397-403. doi:http://dx.doi.org/10.14419/ijet.v7i2.8.10469

      [7] Bindu Swetha, P., Kishore Sonti, V., & Murali, A. (2017). VLSI design for efficient RSD-Based ECC processor using Karatsuba algorithm. International Journal of Engineering & Technology, 7(1.5), 164-169. doi:http://dx.doi.org/10.14419/ijet.v7i1.5.9140

      [8] Kumar K, A., E A, N., S, D., & ., R. (2018). Secured cryptographic data model for cloud. International Journal of Engineering & Technology, 7(1.7), 128-131. doi:http://dx.doi.org/10.14419/ijet.v7i1.7.10632

      [9] Choudhury, S., & Kirubanand, V. (2018). Data encryption in public cloud using multi-phase encryption model.International Journal of Engineering & Technology, 7(1), 223-227. doi:http://dx.doi.org/10.14419/ijet.v7i1.9309

      [10] Kunchok, T., & Kirubanand V. B, P. (2018). A lightweight hybrid encryption technique to secure IoT data transmission. International Journal of Engineering & Technology, 7(2.6), 236-24. doi:http://dx.doi.org/10.14419/ijet.v7i2.6.10776

      [11] Aswathy, R., & Malarvizhi, N. (2018). An investigation on cryptographic algorithms usage in IoT contexts.International Journal of Engineering & Technology, 7(1.7), 10-14. doi:http://dx.doi.org/10.14419/ijet.v7i1.7.9379

      [12] K, L. (2018). Enforcing security in cloud environment using elliptic curve cryptography and third party auditing.International Journal of Engineering & Technology, 7(1.7), 84-86. doi:http://dx.doi.org/10.14419/ijet.v7i1.7.9580

      [13] Rajan, R., G. Murugaboopathi, D., & C.Parthasarathy, D. (2018). Analysis and assessment of various cryptographic techniques based on a variety of features. International Journal of Engineering & Technology, 7(1.9), 28-33.

      doi:http://dx.doi.org/10.14419/ijet.v7i1.9.9730

      [14] N K, M., D, M., & kumar K, A. (2018). An efficient cryptographic scheme for text message protection.International Journal of Engineering & Technology, 7(1.7), 152-155. doi:http://dx.doi.org/10.14419/ijet.v7i1.7.10639

      [15] Jerard, V., & Manimegalai, P. (2017). Content arrangement characteristic based encryption in cloud using public auditing for data management. International Journal of Engineering & Technology, 7(1.1), 30-36. doi:http://dx.doi.org/10.14419/ijet.v7i1.1.8918

      [16] R.K, N., R, S., P.G, S., & Sharma, G. (2018). Enhancing security for end users in cloud computing environment using hybrid encryption technique. International Journal of Engineering & Technology, 7(1), 152-156. doi:http://dx.doi.org/10.14419/ijet.v7i1.8340

      [17] K, S., & S.K, L. (2018). Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm. International Journal of Engineering & Technology, 7(1.9), 22-27. doi:http://dx.doi.org/10.14419/ijet.v7i1.9.9729

      [18] Srinivasu, N., Sahil, M., Francis, J., & Pravallika, S. (2017). Security enhanced using honey encryption for private data sharing in cloud. International Journal of Engineering & Technology, 7(1.1), 675-678. doi:http://dx.doi.org/10.14419/ijet.v7i1.1.10826

      [19] Dhanasekaran, K., Anandan, P., & Manju, A. (2018). A Computational Approach of Highly Secure Hash Algorithm for Color Image Steganography Using Edge Detection and Honey Encryption Algorithm. International Journal of Engineering & Technology, 7(2.24), 239-242. doi:http://dx.doi.org/10.14419/ijet.v7i2.24.12056

      [20] Lalita Kumar Parvataneni, M., Sai Nath Adusumalli, E., & C, R. (2018). Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud. International Journal of Engineering & Technology, 7(2.24), 311-315. doi:http://dx.doi.org/10.14419/ijet.v7i2.24.12071

      [21] Bhardwaj, A., Som, S., & K. Muttoo, S. (2018). HS1-RIV: Improved Efficiency for Authenticated Encryption.International Journal of Engineering & Technology, 7(2.7), 502-506. doi:http://dx.doi.org/10.14419/ijet.v7i2.7.10871

      [22] Pillai, A., S. Vasanthi, M., Kadikar, R., & Amutha, B. (2018). Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation. International Journal of Engineering & Technology, 7(2.24), 47-54. doi:http://dx.doi.org/10.14419/ijet.v7i2.24.11997

      [23] Buchade, S., & Devale, P. (2018). A study on searchable encryption schemes. International Journal of Engineering & Technology, 7(2), 617-620. doi:http://dx.doi.org/10.14419/ijet.v7i2.10995

      [24] Vurukonda, N., Trijan kumar, S., Rajasekhar Reddy, J., Adithya, A., & Babu Boddu, S. (2018). A secure attribute-Based encryption scheme in cloud computing. International Journal of Engineering & Technology, 7(2.20), 90-92.

      doi:http://dx.doi.org/10.14419/ijet.v7i2.20.11761

      [25] Noorbasha, F., & Suresh, K. (2018). FPGA implementation of RGB image encryption and decryption using DNA cryptography. International Journal of Engineering & Technology, 7(2.8), 397-403. doi:http://dx.doi.org/10.14419/ijet.v7i2.8.10469

      [26] Aradhyamath, S., & Paulose, J. (2018). Multi-key Modified Tiny Encryption Algorithm for HealthCare.International Journal of Engineering & Technology, 7(2), 559-563. doi:http://dx.doi.org/10.14419/ijet.v7i2.9894

      [27] Vasantha, R., & Satya Prasad, R. (2017). An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm. International Journal of Engineering & Technology, 7(1.5), 191-195. doi:http://dx.doi.org/10.14419/ijet.v7i1.5.9145

      [28] Shankar, K., and P. Eswaran (2017). RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography. China Communications, 14(2), 118-130.

  • Downloads

  • How to Cite

    Aminudin, N., Maseleno, A., K, S., Hemalatha, S., Sathesh kumar, K., ., F., Irviani, R., & Muslihudin, M. (2018). Nur Algorithm on Data Encryption and Decryption. International Journal of Engineering & Technology, 7(2.26), 109-118. https://doi.org/10.14419/ijet.v7i2.26.14363