scholarly journals Design and Implementation of Rivest Shamir Adleman’s (RSA) Cryptography Algorithm in Text File Data Security

2020 ◽  
Vol 1641 ◽  
pp. 012042
Author(s):  
Hengki Tamando Sihotang ◽  
Syahril Efendi ◽  
Elvyawati M Zamzami ◽  
Herman Mawengkang

An enhanced technique to generate unique code using DNA sequences that encrypt and decrypt plaintext of characters, text file(.txt,.doc,.docx),image (jpg, jpeg), audio(.mp3) and video(.mp4) using a dynamic DNA key-based cryptography. Cryptography is always considered as secured way for transferring information over insecure channel by achieving confidentiality, privacy and integrity. Since last 10 years traditional cryptography approaches are been replaced with more efficient and effective cryptographic systems like DNA Cryptography. This system takes the DNA sequence as the input and generates a key randomly and is used to decrypt the data without non-integrity of data. This system provides two stages of data security using DNA sequences.


2013 ◽  
Vol 760-762 ◽  
pp. 946-949
Author(s):  
Shu Min Cui

ASP.NET and Web database are integrated to develop a B/S mode-based university archives management system so as to improve the efficiency and security of archives management system. Meanwhile, detailed analysis and study are made on related technologies such as systems demand analysis, overall design, database access method, and precautions for data security.


2019 ◽  
Vol 11 (3) ◽  
pp. 222-230
Author(s):  
Sarwo Budi ◽  
Arif Budimansyah Purba ◽  
Jajang Mulyana

Cryptography is a method of securing data using algorithms that have been developed continuously until now. Cryptography offers security in the form of data confidentiality, for example the confidentiality of data generated through encryption algorithms that scrambles personal information so that it cannot be read or solved by unauthorized parties. One of them is the substitution algorithm and the vigenere cipher is a classic method used for data security. The combination of these algorithm methods becomes a solution for double security as file protection. By using a cryptographic application for data security, the combination of the two method algorithms produces a data file that provides more security to the text file so that it is not easy and difficult to solve.


2020 ◽  
Vol 3 (2) ◽  
pp. 170-175
Author(s):  
Ahmad Zaki Fadilla Rangkuti ◽  
Hasanul Fahmi

Technological developments, especially in data security systems in maintaining data information security, have developed rapidly. In maintaining the security of information data, there are branches of science in its development such as cryptography. Cryptography is both the science and the art of maintaining the security of messages obtained by encoding messages to become meaningless. There are two processes in cryptography, namely encryption and decryption. To be able to secure the text file, an encryption process is carried out by changing an original text message that can be understood (plaintext) into a message that has no meaning (ciphertext) which aims to prevent the message from being known by others. Decryption is the process of returning or changing incomprehensible text code (ciphertext) into original text that can be understood (plaintext). To secure the file, the MD5 method algorithm is implemented. With that, a cryptosystem application program that is used to secure text files is created so that only certain people can process the files..


2008 ◽  
Vol 20 (01) ◽  
pp. 19-25 ◽  
Author(s):  
I.-Chi Chou ◽  
Shao-Shan Chiang ◽  
Guan-Yu Sie ◽  
Ren-Guey Lee ◽  
Chung-Chih Lin

It is important to ensure the data security of biosignals transmitted by a wireless network. This paper proposes a mobile-care device using Tame Transformation Signatures (TTS), which is a digital signature scheme from the family of asymmetric public key systems to encrypt the electrocardiogram (ECG) data. TTS has the advantages of high security, fast key generation, complex algorithm, less calculations and low signature delay. The proposed system consists of a mobile-care device to measure ECG signal, a key center to generate key pair, and a monitor center. The proposed ECG mobile-care device adopts the TI MSP430F449 microprocessor as the kernel and generates 8-byte hash codes and 10-byte signatures to sign the data. And the mobile-care device transmits the signed data through a wireless network to the server to decrypt. This paper describes the design and implementation of the proposed system in detail and also completely verifies the validity of the proposed system.


Sign in / Sign up

Export Citation Format

Share Document