Implementation of Efficient Cryptographic Algorithm Based on Dynamic Biometric Key Generation Technique

2016 ◽  
Vol 14 (10) ◽  
pp. 1044-1048
Author(s):  
Jaishankar Mohana ◽  
Vijayan Thulasi Bai
Author(s):  
P. Gayathri ◽  
Syed Umar ◽  
G. Sridevi ◽  
N. Bashwanth ◽  
Royyuru Srikanth

As more increase in usage of communications and developing them more user friendly. While developing those communications, we need to take care of security and safety of user’s data. Many researchers have developed many complex algorithms to maintain security in user’s application. Among those one of the best algorithms are cryptography based, in which user will be safe side mostly from the attackers.  We already had some AES algorithm which uses very complex cryptographic algorithm to increase the performance and more usage of lookup tables. So the cache timing attackers will correlates the details to encrypt the data under known key with the unknown key. So, for this we provide an improvised solution. This paper deals with an extension of public-key encryption and decryption support including a private key. The private key is generated with the combination of AES and ECC. In general AES, key length is 128 bits with 10 times of iterations. But with this, users won’t get efficient security for their operations, so to increase the security level we are implementing 196-bit based encryption with 12 times round-key generation iterations. By this enhancement, we can assure to users to high level security and can keep users data in confidential way.


2017 ◽  
Vol 10 (9) ◽  
pp. 2895
Author(s):  
G. Manikandan ◽  
P. Rajendiran ◽  
V. Harish ◽  
Nooka Sai Kumar

2018 ◽  
Vol 7 (4.36) ◽  
pp. 293
Author(s):  
Mustafa M. Abd Zaid ◽  
Dr. Soukaena Hassan

The computing devices utilized as a part of an extensive class of remote correspondence systems, for example, cell phones, remote sensor systems (WSNs), vehicular ad hoc networks (VANETs), mobile ad hoc networks (MANETs), Internet of Things (IoT), body area networks (BANs) and so on, are little and asset compelled. In the current developments of the resource constraint environments, the trend is shifted towards lightweight cryptographic algorithm. Many lightweight cryptographic algorithms have been developed and also existed algorithms are modified in terms of resource constraint environments. One of such new procedures is utilizing three prime numbers for RSA cryptosystem, which is not easily breakable. Our approach using three prime number rather than two prime-dependent systems to get (n) with same length of standard RSA but less bits for prime numbers. The suggested algorithm has speed enhancement on standard RSA key generation side and decryption side by utilizing three primes and the Chinese Reminder Theorem (CRT). The results indicate that the average of speed improvement is ~80% in key generation process, ~96% in decryption process, and only 4% in the encryption process.   


Author(s):  
R. Singh

In this article we implement a client server model using limited-used key generation scheme (Kungpisdan, Le, & Srinivasan, 2004) to generate a set of session keys that are never transmitted, which means that there is no chance for the attacker to sniff the packets and retrieve keys while they are being transmitted. These session keys are used for encrypting and hashing the data to be transmitted from mobile client device to the servers in wired network and vice versa. The updating of the session keys used in this technique does not rely on any long-term shared key, instead the process is based upon the last session key used. This technique of elevating the frequency of the key update to the next possible level makes the system much more secure than the other present techniques. In addition to providing better security, this technique also enhances the performance of a limited resource device by avoiding the repeated generation of keys on it.


Author(s):  
Ayu Wandira Simatupang

The security and confidentiality of data is very important considering the rapid development of technology at this time which allows the emergence of new techniques that are misused by certain parties that can threaten security from data that are considered insignificant. Cryptography is a field of science to maintain image security. Cryptography has been implemented in many ways. The way it works is to change the original data that can be understood / read by humans (plaintext) to other forms that cannot be understood / read by humans (ciphertext). The process of transforming plaintext into chiperteks is termed encryption. While the process of returning a chipertext message to plaintext is termed decryption. Vigenere Cipher is an asymmetric cryptographic algorithm, where the key used to encrypt is different from the one used to decrypt. Vigenere Cipher is a cryptographic algorithm that uses letters and numeric values. Vigenere Cipher requires three steps in the process, namely key generation, encryption, and decryption. The process of encryption and decryption is almost the same process.


Sign in / Sign up

Export Citation Format

Share Document