DEVELOPMENT OF ENCRYPTION AND DECRYPTION TECHNIQUE TO SECURE THE CONFIDENTIAL DATA
Main Article Content
Abstract
Cryptography is the science of converting one form of data into another form, to provide security. Converting plain text to cipher text is encryption and converting cipher text to plain text is decryption. In the today’s leading world huge amount of data are stored and transferred every second. But the issue is to provide the security to that data. For this Encryption and Decryption is considered as one of the better techniques. Two types of approach are used for encryption and decryption that is Symmetric key cryptography and Asymmetric key cryptography. RSA is one of the algorithms used in Asymmetric key cryptography. RSA algorithm is better in terms of security, but this algorithm reduces the speed of mutual authentication. In this paper, we have developed a modified RSA approach where the speed of Mutual authentication is enhanced with the help of modified RSA algorithm and a strong key is used to provide better security.
Â
Downloads
Article Details
COPYRIGHT
Submission of a manuscript implies: that the work described has not been published before, that it is not under consideration for publication elsewhere; that if and when the manuscript is accepted for publication, the authors agree to automatic transfer of the copyright to the publisher.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgment of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work
- The journal allows the author(s) to retain publishing rights without restrictions.
- The journal allows the author(s) to hold the copyright without restrictions.
References
Keke Gai, Student Member “Privacy-Preserving Data Encryption Strategy for Big Data in Mobile Cloud.
Ting Yu Liu, Kuan Jen Lin “ECG Data Encryption Then Compression Using Singular Value Decompositionâ€.
Keerthi K ,Dr.B.Surendiran†Elliptic Curve Cryptography for Secured Text Encryption †2017 International.
Abdullah Al mamun, Khaleed Salah “BigCrypt for Big Data Encryption†2017 Fourth International Conference on Software Defined Systems (SDS).
Aiswarya P M and Archana Raj “BINARY RSA ENCRYPTION ALGORITHM â€, 2016 International Conference on Control, Instrumentation, Communication and Computational Technologies (ICCICCT) IEEE.
Adriana Naydenova Borodzhieva “Software Implementation of a Module for Encryption and Decryption Using the RSA Algorithm â€(2016 IEEE).
Michael Bourg, Pramod Govindan “RSA Based Biometric Encryption System Using FPGA for Increased Security †(2016 IEEE)
Joseph C. Pry and Richard K. Lomotey “Energy Consumption Cost Analysis of Mobile Data Encryption and Decryptionâ€, 2016 IEEE International Conference on Mobile Services.
CHEN Shuai “Research of Cipher Chip Core for Sensor Data Encryption†2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/r ights/index.html for more information.
Samsul Huda, AmangSudarsono†Secure Data Exchange using Authenticated Ciphertext-Policy Attributed-Based Encryption †2015 International Electronics Symposium (IES) IEEE
K.sekar, M.Padmavathamma “Comparative study of encryption algorithm over big data in cloud systems â€2016 IEEE.
Pu Yue, Li Guodong “Based on the Improved RSA Keys and Compound Chaotic System and Design of Audio.
Encryption Algorithm†2016 International Conference on Smart City and Systems Engineering IEEE.