CryptO' Roulette - A Smart Approach To Modern Encryption
- 1. Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India.
Description
Abstract: In a symmetric-key cryptosystem, where the secret key is known to both the sender who encrypts the message (let’s call her Alice) and the receiver who decrypts the message (let's call him Bob). Since the secret key is very important so it cannot be disclosed to any third party that is why it should not be exchanged through any public form of communication because if through any means these keys get leaked all the encrypted messages in the future will be compromised [1].We know that the advent of technology has increased the risks of data thefts and compromising data integrity. So, to secretly exchange the key both the parties must hold some sort of private meeting, therefore they need to establish some private communication channel. This is a difficult task practically speaking in terms of internet communications. [6] These days, the utilization of the Internet is developing quickly throughout the planet, and security is turning into a significant public concern. Already security was a significant issue for military applications yet presently the application region has been improved as more correspondence happens on the web. Cryptography is a computer science platform intended to give security to senders and receivers to communicate and recover secret data about an uncertain channel through a cycle called Encryption/Decryption. Cryptography guarantees that the message ought to be sent without change and that only authorized individuals can open and peruse the message [10].In this paper, we tried to randomize the encryption process so that the data becomes more secure and less vulnerable to hacker attacks. We will use the top 4 best existing encryption algorithms like AES, TripleDES, Rabbit, etc., and use them to randomly encrypt the different segments of the message.
Notes
Files
B33111211221.pdf
Files
(424.2 kB)
Name | Size | Download all |
---|---|---|
md5:ed970ce90b6f3bbd2dbe0ac13140760a
|
424.2 kB | Preview Download |
Additional details
Related works
- Is cited by
- Journal article: 2249-8958 (ISSN)
References
- Rao, Sandeep & Mahto, Dindayal & Khan, Danish. (2017). A Survey on Advanced Encryption Standard. International Journal of Science and Research (IJSR). 391. 10.21275/ART20164149.
- Badugu Nikhil Teja, Shweta Helchel, P.Sai Krishna Pratap Reddy, and V.Seetha Rama Rao. (2019); IMPLEMENTATION OF ADVANCED ENCRYPTION STANDARD (AES) FOR HIGH-SECURITY APPLICATIONS. Int. J. of Adv. Res. 7 (Apr). 498-504] (ISSN 2320-5407).
- Dawood, Omar A. & Hammadi, Othman. (2017). An Analytical Study for Some Drawbacks and Weakness Points of the AES Cipher (Rijndael Algorithm). 10.25212/ICoIT17.013.
- Boesgaard, Martin & Vesterager, Mette & Pedersen, Thomas & Christiansen, Jesper & Scavenius, Ove. (2003). Rabbit: A New High-Performance Stream Cipher. 2887. 307-329. 10.1007/978-3-540-39887-5_2
- P. N., C. S., and S. M. Rehman, "ASIC Implementation of Rabbit Stream Cipher Encryption for Data," 2019 IEEE International WIE Conference on Electrical and Computer Engineering (WIECON-ECE), 2019, pp. 1-4, DOI: 10.1109/WIECON-ECE48653.2019.9019903.
- Jindal, Poonam & Singh, Brahmjit. (2014). RC4 Encryption-A Literature Survey. Procedia Computer Science. 46. 10.1016/j.procs.2015.02.129.
- Kitsos, Paris & Kostopoulos, Giorgos & Sklavos, Nicolas & Koufopavlou, Odysseas. (2004). Hardware implementation of the RC4 stream cipher. 3. 1363 - 1366 Vol. 3. 10.1109/MWSCAS.2003.1562548.
- Alanazi, Hamdan & Bahaa, Bilal & Zaidan, A. & Jalab, Hamid & Shabbir, M. & Al-Nabhani, Yahya. (2010). New Comparative Study Between DES, 3DES, and AES within Nine Factors.
- Ratnadewi, Ratnadewi & Adhie, Roy & Hutama, Yonatan & Ahmar, Ansari & Setiawan, M. (2018). Implementation Cryptography Data Encryption Standard (DES) and Triple Data Encryption Standard (3DES) Method in Communication System Based Near Field Communication (NFC). Journal of Physics: Conference Series. 954. 012009. 10.1088/1742-6596/954/1/012009.
- Agrawal, Monika & Mishra, Pradeep. (2012). A Comparative Survey on Symmetric Key Encryption Techniques. Int. J. Comput. Sci. Eng.. 4.
Subjects
- ISSN: 2249-8958 (Online)
- https://portal.issn.org/resource/ISSN/2249-8958#
- Retrieval Number: 100.1/ijeat.B33111211221
- https://www.ijeat.org/portfolio-item/B33111211221/
- Journal Website: www.ijeat.org
- https://www.ijeat.org
- Publisher: Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP)
- https://www.blueeyesintelligence.org