An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm

  • Authors

    • R. Vasantha
    • R. Satya Prasad
    2017-12-31
    https://doi.org/10.14419/ijet.v7i1.5.9145
  • Hybrid coding, Advance coding commonplace (AES), encoding commonplace (DES), Blowfish, Key length, Time quality, house quality.
  • Essential strategies vicinity unit acquainted with send the lion's share structures to collect the desired info. thanks to the imperfectness of truely the best data coding and additionally the utilization of preferred coding calculation, that wasn't accelerated in standard approaches for the time period procedure, a consolidated coding calculation is planned. This planned calculation gives new stride to stay removed from weaknesses. we will be inclined to apply a few standard algorithms to code AN data as takes as soon as. At to start with, we will be inclined to create new calculation maintaining in mind the tip purpose to provide security issue and time imperative of operation then we have a tendency to be a part of AES utilising multiplexing of keys, development in DES key size and blowfish calculation, at that time we have a propensity to code info using the deliberate calculation. this could improve the protection and muddles the coding. throughout this paper we provide each the coding and unscrambling that backings incessantly application and calculation incorporates a helpful esteem and loss of life penalty this calculation crosswise over cloud advances in encryption and decryption info over SMTP based usually utility.
  • References

    1. [1] Sowmya nag k., h.b.bhuvaneswari, nuthana.c, “Implementation of advanced encryption Standard-192 bit using multiple keys†ieeetranscation, vol 5,pg34-39,2012.

      [2] Najib A. Kofahil ,“Performance evaluation of three Encryption/ decryption algoriithms†ISSN 0-7803-8294-3 IEEE,2014

      [3] William Stallings “Cryptography and Network Securityâ€, Third Edition, Pearson Education Asia Publication, 2007

      [4] Jawahar Thakur, Des, Aes And Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysisâ€, International Journal of Emerging Technology and Advanced Engineering, ISSN 2250-2459, Volume 1, Issue 2, December 2011

      [5] Dr. Mohammed M. Alani “DES96 - Improved DES Securityâ€, 7th International Multi-Conference on Systems, Signals and Devices,2010.

      [6] Seung-johan “The improved data encryption standard (des) algorithmâ€Ieee transaction ISSN 0-7803-3567-8,volume ,issue ,December 1996.

      [7] Michael C.-J. Lin “A VLSI Implementation of the Blowfish Encryption/Decryption Algorithm†National Science Council, R.O.C, NSC 88-2215-E-007-025.

      [8] Taiping Mo “Design of secure communications network system based on data encryption and digital signature†ISSN 978-1-61284-383-4,IEEE,2011.

      [9] Daemen, J., and Rijmen, V. “Rijndael: The Advanced Encryption Standard.†D r. Dobb's Journal, March 2001, pp. 137-139

      [10] Lei Zhang, Futai Zhang, “Certificateless Partially Blind Signatures,†The 1st International Conference on Information Science and Engineering (ICISE), pp. 2883 – 2886, Dec 26-28, 2009.

      [11] Penchalaiah, N. and Seshadri, R. “Effective Comparison and Evaluation of DES and Rijndael Algorithm (AES)â€, International Journal of Computer Science and Engineering, Vol. 02, No. 05, 2010, 1641-1645.

      [12] Rivest, R. L., Shamir, A., Adelmann, L.: “A method for obtaining digital signature and public –key cryptosystemsâ€, Commun. ACM, 1978, VOL. 21, pp. 120-126

      [13] Internet Security Glossary", http://www.faqs.org/rfcs/rfc2828.html

      [14] AamerNadeem et al, "A Performance Comparison of Data Encryption Algorithms", IEEE 2005

      [15] Wireless Security Handbook,".Auerbach Publications 2005

      [16] Performance Comparison: Security Design Choices," Microsoft Developer Network October 2002. http://msdn2.microsoft.com/en-us/library/ms978415.aspx

      [17] Real 802.11 Security: Wi-Fi Protected Access and 802.11i ,". Addison Wesley 2003

      [18] Block Cipher", http://en.wikipedia.org/wiki/Block_cipher

      [19] Security In Wireless LANS And MANS ,". Artech House Publishers 2005

      [20] DES Overview", [Explains how DES works in details, features and weaknesses]

      [21] BRUCE SCHNEIER, "Applied Cryptography" , John Wiley & Sons, Inc 1996

      [22] Crypto++ benchmark", http://www.eskimo.com/~weidai/benchmarks.html [Results of comparing tens of encryption algorithms using different settings].

      [23] Coder's Lagoon",http://www.hotpixel.net/software.html [List of resources to be used under GNU]

      [24] T. Padmapriya and V.Saminadan, “Handoff Decision for Multi-user Multiclass Traffic in MIMO-LTE-A Networksâ€, 2nd International Conference on Intelligent Computing, Communication & Convergence (ICCC-2016) – Elsevier - PROCEDIA OF COMPUTER SCIENCE, vol. 92, pp: 410-417, August 2016.

      [25] S.V.Manikanthan and V.Rama“Optimal Performance Of Key Predistribution Protocol In Wireless Sensor Networks†International Innovative Research Journal of Engineering and Technology ,ISSN NO: 2456-1983,Vol-2,Issue –Special –March 2017.

      [26] Rajesh, M., and J. M. Gnanasekar. "Constructing Well-Organized Wireless Sensor Networks with Low-Level Identification." World Engineering & Applied Sciences Journal 7.1 (2016).

  • Downloads

  • How to Cite

    Vasantha, R., & Satya Prasad, R. (2017). An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm. International Journal of Engineering & Technology, 7(1.5), 191-195. https://doi.org/10.14419/ijet.v7i1.5.9145