DEVELOPMENT OF ENCRYPTION AND DECRYPTION TECHNIQUE TO SECURE THE CONFIDENTIAL DATA

Main Article Content

Md Hussain Ahmad
Manish Madhava Tripathi

Abstract

Cryptography is the science of converting one form of data into another form, to provide security. Converting plain text to cipher text is encryption and converting cipher text to plain text is decryption. In the today’s leading world huge amount of data are stored and transferred every second. But the issue is to provide the security to that data. For this Encryption and Decryption is considered as one of the better techniques. Two types of approach are used for encryption and decryption that is Symmetric key cryptography and Asymmetric key cryptography. RSA is one of the algorithms used in Asymmetric key cryptography. RSA algorithm is better in terms of security, but this algorithm reduces the speed of mutual authentication. In this paper, we have developed a modified RSA approach where the speed of Mutual authentication is enhanced with the help of modified RSA algorithm and a strong key is used to provide better security.

 

Downloads

Download data is not yet available.

Article Details

Section
Articles

References

Keke Gai, Student Member “Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud.

Ting Yu Liu, Kuan Jen Lin “ECG Data Encryption Then Compression Using Singular Value Decompositionâ€.

Keerthi K ,Dr.B.Surendiran†Elliptic Curve Cryptography for Secured Text Encryption †2017 International.

Abdullah Al mamun, Khaleed Salah “BigCrypt for Big Data Encryption†2017 Fourth International Conference on Software Defined Systems (SDS).

Aiswarya P M and Archana Raj “BINARY RSA ENCRYPTION ALGORITHM â€, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) IEEE.

Adriana Naydenova Borodzhieva “Software Implementation of a Module for Encryption and Decryption Using the RSA Algorithm â€(2016 IEEE).

Michael Bourg, Pramod Govindan “RSA Based Biometric Encryption System Using FPGA for Increased Security †(2016 IEEE)

Joseph C. Pry and Richard K. Lomotey “Energy Consumption Cost Analysis of Mobile Data Encryption and Decryptionâ€, 2016 IEEE International Conference on Mobile Services.

CHEN Shuai “Research of Cipher Chip Core for Sensor Data Encryption†2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/r ights/index.html for more information.

Samsul Huda, AmangSudarsono†Secure Data Exchange using Authenticated Ciphertext-Policy Attributed-Based Encryption †2015 International Electronics Symposium (IES) IEEE

K.sekar, M.Padmavathamma “Comparative study of encryption algorithm over big data in cloud systems â€2016 IEEE.

Pu Yue, Li Guodong “Based on the Improved RSA Keys and Compound Chaotic System and Design of Audio.

Encryption Algorithm†2016 International Conference on Smart City and Systems Engineering IEEE.