A Hybrid Approach for Data Encryption using Random Number and Padding Base

Authors

  • Suruchi Karnani Department of Computer Science and Engineering, SR Group of Institutions, Jhansi, India
  • Mr.C.P. Singh Assistant Professor, Department of Computer Science and Engineering, SR Group of Institutions, Jhansi, India

DOI:

https://doi.org/10.24113/ijoscience.v3i5.50

Keywords:

Encryption, Random number, Padding, Complexity.

Abstract

The utilization of mobile device and wireless networks tremendously alters our way of living. As with the brilliant security, access methods and effective ways, still people face various challenges to protect their data which carry in these apparatuses. The significant part comes under the trouble because it should be unsalable and not feasible for opponents to decrypt the information. The cryptography is effective for genuine users and reduces the battery drain. This paper recommends the data encryption. Data handling acts as a double stream of bit, the encryption that is known as self technique of individuals able to create a keystream by collecting the bits casually from the stream. Users can choose the bits length as per their needs by considering the security. Afterwards, the bit stream is encoded and saved in the portable devices as a cipher text form. This process makes the computation impossible to get the real data from cipher text form while maintaining the time and space.

Downloads

Download data is not yet available.

References

Yu Chen and Wei-Shinn Ku, “Self-Encryption Scheme for Data Security in Mobile Devices”.

Ajit Singh and Rimple Gilhotra, “Data Security Using Private Key Encryption System Based On Arithmetic Coding”, International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.3, May 2011

Curry, Ian, Entrust Technologies, “Getting Acquainted With Entrust/Solo and Public-key Cryptography”, version 1.0, July 1997, “Public Key Encryption and Digital Signature: How do they work?”.

Cornelius Lowell Robling 1910-1965, “Denning, Dorothy E., (Dorothy Elizabeth), 1945- Cryptography and data security.”

W. Daniel, T. Pintaric, F. Ledermann, S. Dieter, “Towards Massively Multi-User Augmented Reality on Handheld Devices”, International Conference on Pervasive Computing, Munich, Germany, 2005.

D. E. Denning and D. K. Branstad, “A Taxonomy for Key Escrow Systems,” Communications of the ACM, Vol. 39, Issue 3, 1996.

eSTREAM, ECRYPT Stream Cipher Project, http://www.ecrypt.eu.org/stream.

Vishwa gupta, Gajendra Singh , Ravindra Gupta, “Advance cryptography algorithm for improving data security”, Volume 2, Issue 1, January 2012

A. O. Freier, P. Karlton, and P. C. Kocher, “The SSL Protocol, Version 3.0,” Internet draft, Networking Group, March 1996.

C. Galdi, A. Del Sorbo, and G. Persiano, “Distributed Certified Information Access for Mobile Devices,” Workshop in Information Security Theory and Practices (WISTP’07), Crete, Greece, May 8-11, 2007.

Y. Jiang, C. Lin, M. Shi, and X. Shen, “Multiple Key Sharing and Distribution Scheme with (n, t) Threshold for NEMO Group Communications,” IEEE Journal on Selected Areas in Communications, Vol. 24, No. 9, Sep. 2006.

A. Kent and R. Atkinson, “Security Architecture for the Internet Protocol,” RFC 2401, Networking Group, Nov. 1998.

A. J. Nicholson, M. D. Corner, and B. D. Noble, "Mobile Device Security Using Transient Authentication," IEEE Transactions on Mobile Computing, vol. 5, no. 11, pp. 1489- 1502, Nov., 2006.

S. Rafaeli and D. Hutchison, “A Survey of Key Management for Secure Group Communication,” ACM Computing Surveys, Vol. 35, Issue 3, Sept. 2003.

P. E. Sevinc, M. Strasser, and D. Basin, “Securing the Distribution and Storage of Secrets with Trusted Platform Modules,” Workshop in Information Security Theory and Practices (WISTP’07), Crete, Greece, May 8-11, 2007.

(IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 2, No.3, March 2011, “Transparent Data Encryption- Solution for Security of Database Contents”.

Karthik .S1, Muruganandam, “Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System”, Volume 2 Issue 11, November 2014.

Ahren Studer, Carnegie Mellon University, astuder@cmu.edu& Adrian Perrig, Carnegie Mellon University, “Mobile User Location-specific Encryption (MULE): Using Your Office as Your Password?”

Downloads

Published

05/31/2017

How to Cite

Karnani, S., & Singh, M. (2017). A Hybrid Approach for Data Encryption using Random Number and Padding Base. SMART MOVES JOURNAL IJOSCIENCE, 3(5), 1–6. https://doi.org/10.24113/ijoscience.v3i5.50