Asymmetric Addition Chaining Cryptographic Algorithm (ACCA) for Data Security in Cloud

Author(s):  
D. I. George Amalarethinam ◽  
H. M. Leena
2020 ◽  
Vol 4 (3) ◽  
pp. 1-10
Author(s):  
Naim BAFTIU

Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


2018 ◽  
Vol 1 (2) ◽  
pp. 20-28
Author(s):  
Aditya Kurniawan ◽  
Ratna Mayasari ◽  
Muhammad Ary Murti

Data security is one of many problems that we face in IoT implementation. One of the problems with data security is we cannot assure that the data we received in the server-side is truly our data that we send from client-side or sensor-side. With that problems, comes some solutions like encryption and decryption method or some basic authentication planted on the server-side. In this research, we propose some encryption and decryption method that can be easily implemented on both server and sensor-side and then we analyze the complexity of its algorithm. This research aims to create some authentication process for the data that server-side receive from the sensor-side by creating encrypted ID consisting of 6 digits of alphanumeric and useful for identification process in system, so the server can recognize the data and validate it.


2017 ◽  
Vol 26 (09) ◽  
pp. 1750141 ◽  
Author(s):  
Soufiane Oukili ◽  
Seddik Bri

Cryptography has an important role in data security against known attacks and decreases or limits the risks of hacking information, especially with rapid growth in communication techniques. In the recent years, we have noticed an increasing requirement to implement cryptographic algorithms in fast rising high-speed network applications. In this paper, we present high throughput efficient hardware implementations of Advanced Encryption Standard (AES) cryptographic algorithm. We have adopted pipeline technique in order to increase the speed and the maximum operating frequency. Therefore, registers are inserted in optimal placements. Furthermore, we have proposed 5-stage pipeline S-box design using combinational logic to reach further speed. In addition, efficient key expansion architecture suitable for our proposed design is also presented. In order to secure the hardware implementation against side-channel attacks, masked S-box is introduced. The implementations had been successfully done by virtex-6 (xc6vlx240t) Field-Programmable Gate Array (FPGA) device using Xilinx ISE 14.7. Our proposed unmasked and masked architectures are very fast, they achieve a throughput of 93.73 Gbps and 58.57 Gbps, respectively. The obtained results are competitive in comparison with the implementations reported in the literature.


2021 ◽  
Vol 5 (3) ◽  
pp. 806
Author(s):  
Muhammad Fadlan ◽  
Rosmini Rosmini ◽  
Haryansyah Haryansyah

Data security is an important thing that must be done in the cyber era. The use of various kinds of digital technology in helping various human activities needs to be balanced with adequate data security. One of the ways that can be used in securing data is through cryptography. Atbash cipher is one of the cryptographic techniques used in securing data. However, this algorithm has a weakness because it only uses the process of reversing the position of the characters to be secured. This study proposes a cryptographic model that can maximize data security from the atbash cipher. The proposed model is a combination of the atbash cipher with the autokey cipher. The tests carried out on the proposed model have a 100% success rate, meaning that the encrypted message resulting from the proposed encryption process has been successfully restored to its original form through the proposed decryption process. The results of this study indicate that the atbash cipher cryptographic algorithm, combined with the autokey cipher algorithm can produce an encrypted message that is more difficult to crack.


2018 ◽  
Vol 7 (2) ◽  
pp. 40-43
Author(s):  
Prakhar Agrawal ◽  
Arvind Upadhyay

Steganography and cryptography are two major aspects of data security . In this paper we are going to provide the survey of different techniques of LSB based Steganography that used cryptography algorithms to secure sensitive information. Steganography is used to hide data and Cryptography is used to encrypt the data. Although cryptography and steganography individually can provide data security, every of them has a drawback. Drawback associated with Cryptography is that, the cipher text looks meaningless, so the unintended user can interrupt the transmission or make more careful checks on the information from the sender to the receiver. Drawback associated with Steganography is that when the presence of hidden information is revealed or even suspected, the message is become known[1].By combining these two methods we can solve both of the above problem. First we encrypt the data using any cryptography technique and then embed the encrypted text into the image. Steganography is the process which hides the presence of secure data during communication. On the other hand cryptography is encrypting and decrypting of secure data and information with a secrete key so that no one can be understand the message directly.


2019 ◽  
Vol 3 (2) ◽  
pp. 86-100 ◽  
Author(s):  
Goklas Tomu Simbolon ◽  
Opim Salim Sitompul ◽  
Erna Budhiarti Nababan

Data security is one of the most important aspects of today's information era. Some methods are used to secure important data from hackers. The LSB is a steganographic algorithm that is often used to store data in the last bit. In order to improve the security, we combine steganography with cryptography enables. In this research LSB is modified using the multi-bit LSB model. Modifications are made to the bits of each character, the rotation by a certain amount can randomize the plaintext content before cryptographic algorithm, Vernam is performed. The bit on LSB can be inserted data as much as 1, 2, 3 or 4 - bit information. The calculation results of MSE and PSNR values indicate that the use of 1-bit LSB is superior to that of 2-, 3-, or 4-bit LSB.


SinkrOn ◽  
2022 ◽  
Vol 7 (1) ◽  
pp. 100-110
Author(s):  
Ahmad Arif ◽  
Adidtya Perdana ◽  
Arief Budiman

Data security is most important today, because the rampant data theft resulting in a lot of misuse of data by irresponsible parties so that it makes us anxious as data owners, for data storage it is usually stored in the database. From these problems the idea emerged to create a cryptographic system where the system can secure data by encrypting and decrypting also make data fully save and then the data owned by the user. This study aims to secure the data in the database by encrypting the original data without destroying the original data when later after decrypted. To perform this security, a cryptographic methodology is used with both of  method that is Vigenere Cipher and Triangle Chain Cipher algorithms which are implemented in the application because both of methodology have same root that is classical cryptographic. This application will later be used as a medium for users to secure their data in the database so that later data theft will not to be easy. After doing fully research that produces applications that can implement combination of Vigenere Cipher and Triangle Chain Cipher algorithms,data in the encrypted database field is safe because encryption has been done to the data.


2018 ◽  
Vol 1 (1) ◽  
pp. 069-077
Author(s):  
Ananda Dwi Putri ◽  
Dian Rachmawati ◽  
Heriyance Heriyance

Komunikasi dan bertukar informasi secara jarak jauh sudah sangat mudah dan praktis. Kemudahan ini menuntut peningkatan keamanan terhadap kerahasiaan data yang dikirim. Kriptografi adalah salah satu cara yang digunakan untuk menjaga kerahasian dari sebuah pesan, dimana pesan disamarkan menjadi sandi. Selain keamanan data yang perlu diperhatikan juga adalah kecepatan dalam pengiriman data tersebut. Kecepatan pengiriman ini tergantung dari ukuran informasi tersebut. Kompresi adalah proses pengubahan sekumpulan data menjadi bentuk kode dengan tujuan untuk menghemat kebutuhan tempat penyimpanan dan waktu untuk transmisi data. Dalam penelitian ini penulis mengkombinasi algoritma kriptografi Playfair Cipher dengan algoritma kompresi Run Length Encoding, serta menganalisa kedua algoritma menggunakan kompleksitas algoritma. waktu eksekusi pesan dengan 16 karakter adalah 0.54423 sekon, waktu eksekusi pesan dengan 78 karakter adalah 1.14617 sekon, dan waktu eksekusi pesan dengan 189 karakter adalah 1.51715 sekon. Hasil pengujian proses kompresi string Homogen dengan kompresi rasio rata-rata sebesar 33.83% dan sring Heterogen dengan kompresi rasio rata-rata sebesar 15,54%. Dapat disimpulkan jumlah karakter pada pesan berbanding lurus terhadap waktu. Communication and exchanging information remotely are very easy and practical. This convenience requires increased security against the confidentiality of the data sent. Cryptography is one way used to maintain the confidentiality of a message, where the message is disguised as a password. In addition to data security, the speed in sending the data also needs to be considered. This speed of delivery depends on the size of the information. Compression is the process of converting a set of data into a code form with the aim of saving storage needs and time for data transmission. In this study, the researcher combined the Playfair Cipher cryptographic algorithm with the Run Length Encoding compression algorithm and analyzed both algorithms using algorithmic complexity. Message execution time with 16 characters was 0.54423 seconds. Message execution time with 78 characters was 1.14617 seconds, and message execution time with 189 characters was 1.51715 seconds. The result test was an average of 33.83% for the Homogeneous string compression process with compression ratios, and 15.54% for the Heterogeneous string with compression ratios. It could be concluded that the number of characters in the message was directly proportional to time. 


Author(s):  
Fursan Thabit ◽  
Associted Prof. Sharaf Alhomdy ◽  
Abdulrazzaq H.A. Al-Ahdal ◽  
Prof. Dr. Sudhir Jagtap

Sign in / Sign up

Export Citation Format

Share Document