Info: Zenodo’s user support line is staffed on regular business days between Dec 23 and Jan 5. Response times may be slightly longer than normal.

Published April 30, 2022 | Version CC BY-NC-ND 4.0
Journal article Open

CryptO' Roulette - A Smart Approach To Modern Encryption

  • 1. Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India.

Description

Abstract: In a symmetric-key cryptosystem, where the secret key is known to both the sender who encrypts the message (let’s call her Alice) and the receiver who decrypts the message (let's call him Bob). Since the secret key is very important so it cannot be disclosed to any third party that is why it should not be exchanged through any public form of communication because if through any means these keys get leaked all the encrypted messages in the future will be compromised [1].We know that the advent of technology has increased the risks of data thefts and compromising data integrity. So, to secretly exchange the key both the parties must hold some sort of private meeting, therefore they need to establish some private communication channel. This is a difficult task practically speaking in terms of internet communications. [6] These days, the utilization of the Internet is developing quickly throughout the planet, and security is turning into a significant public concern. Already security was a significant issue for military applications yet presently the application region has been improved as more correspondence happens on the web. Cryptography is a computer science platform intended to give security to senders and receivers to communicate and recover secret data about an uncertain channel through a cycle called Encryption/Decryption. Cryptography guarantees that the message ought to be sent without change and that only authorized individuals can open and peruse the message [10].In this paper, we tried to randomize the encryption process so that the data becomes more secure and less vulnerable to hacker attacks. We will use the top 4 best existing encryption algorithms like AES, TripleDES, Rabbit, etc., and use them to randomly encrypt the different segments of the message.

Notes

Published By: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP) © Copyright: All rights reserved.

Files

B33111211221.pdf

Files (424.2 kB)

Name Size Download all
md5:ed970ce90b6f3bbd2dbe0ac13140760a
424.2 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2249-8958 (ISSN)

References

  • Rao, Sandeep & Mahto, Dindayal & Khan, Danish. (2017). A Survey on Advanced Encryption Standard. International Journal of Science and Research (IJSR). 391. 10.21275/ART20164149.
  • Badugu Nikhil Teja, Shweta Helchel, P.Sai Krishna Pratap Reddy, and V.Seetha Rama Rao. (2019); IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) FOR HIGH-SECURITY APPLICATIONS. Int. J. of Adv. Res. 7 (Apr). 498-504] (ISSN 2320-5407).
  • Dawood, Omar A. & Hammadi, Othman. (2017). An Analytical Study for Some Drawbacks and Weakness Points of the AES Cipher (Rijndael Algorithm). 10.25212/ICoIT17.013.
  • Boesgaard, Martin & Vesterager, Mette & Pedersen, Thomas & Christiansen, Jesper & Scavenius, Ove. (2003). Rabbit: A New High-Performance Stream Cipher. 2887. 307-329. 10.1007/978-3-540-39887-5_2
  • P. N., C. S., and S. M. Rehman, "ASIC Implementation of Rabbit Stream Cipher Encryption for Data," 2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), 2019, pp. 1-4, DOI: 10.1109/WIECON-ECE48653.2019.9019903.
  • Jindal, Poonam & Singh, Brahmjit. (2014). RC4 Encryption-A Literature Survey. Procedia Computer Science. 46. 10.1016/j.procs.2015.02.129.
  • Kitsos, Paris & Kostopoulos, Giorgos & Sklavos, Nicolas & Koufopavlou, Odysseas. (2004). Hardware implementation of the RC4 stream cipher. 3. 1363 - 1366 Vol. 3. 10.1109/MWSCAS.2003.1562548.
  • Alanazi, Hamdan & Bahaa, Bilal & Zaidan, A. & Jalab, Hamid & Shabbir, M. & Al-Nabhani, Yahya. (2010). New Comparative Study Between DES, 3DES, and AES within Nine Factors.
  • Ratnadewi, Ratnadewi & Adhie, Roy & Hutama, Yonatan & Ahmar, Ansari & Setiawan, M. (2018). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). Journal of Physics: Conference Series. 954. 012009. 10.1088/1742-6596/954/1/012009.
  • Agrawal, Monika & Mishra, Pradeep. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. Int. J. Comput. Sci. Eng.. 4.

Subjects

ISSN: 2249-8958 (Online)
https://portal.issn.org/resource/ISSN/2249-8958#
Retrieval Number: 100.1/ijeat.B33111211221
https://www.ijeat.org/portfolio-item/B33111211221/
Journal Website: www.ijeat.org
https://www.ijeat.org
Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
https://www.blueeyesintelligence.org