scholarly journals Implementation & Comparative Analysis of RSA, Caesar Cipher and Playfair Cipher

Author(s):  
Pushkar Aneja

With the growing use of the Internet, and more people being connected with it, the security of the data becomes a major concern. It is necessary that the data can only be accessed by the intended receiver and no person in the middle makes alterations to it. This is achieved by encryption of the data using cryptography. This paper presents a comparative analysis of RSA (Rivest-Shamir-Adleman), Caesar Cipher and Playfair Cipher cryptographic techniques. This paper also presents a comparative analysis of Symmetric Key Cryptography and Asymmetric Key Cryptography. Also, this paper includes the basic working of the above-mentioned techniques along with their implementation in C language over Visual Studio Code 1.49.3.

Author(s):  
Ayan Chatterjee ◽  
Mahendra Rong

The communication through wireless medium is very popular to the developed society. More specifically, the use of the internet as well as the use of social networking sites is increasing. Therefore, information security is an important factor during wireless communication. Three major components of it are confidentiality, integrity, and availability of information among authorized users. Integrity level is maintained through various digital authentication schemes. Fuzzy logic is an important soft computing tool that increases the digital watermarking system in various ways. In this chapter, different popular and high secured watermarking schemes using fuzzy logic are analyzed with their mathematical and experimental efficiency. A comparative analysis is developed here with corresponding different parameters.


Cryptography ◽  
2020 ◽  
pp. 193-213
Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.


2016 ◽  
Vol 12 (12) ◽  
pp. 155014771668203 ◽  
Author(s):  
An Braeken ◽  
Pawani Porambage ◽  
Milos Stojmenovic ◽  
Lambros Lambrinos

The smart home field has witnessed rapid developments in recent years. Internet of Things applications for the smart home are very heterogeneous and continuously increasing in number, making user management from a security perspective very challenging. Moreover, the resource-constrained nature of most of the devices implies that any security mechanisms deployed should be lightweight and highly efficient. In this article, we propose an authentication scheme based on symmetric key cryptography, combined with a capability-based access control system, to provide the different stakeholders (residents, recurring guests, or temporary guests) end-to-end secure access to the Internet of Things devices in a smart home, managed by the home owner in an anonymous way. The operations in our scheme only include a small number of communication phases and protect the identities of the entities involved (i.e. stakeholders and end-nodes) from any outside entity. The proposed scheme ensures that even if the stakeholder’s device or the Internet of Things device is attacked, the system remains secure.


2020 ◽  
Vol 8 (5) ◽  
pp. 4214-4218

Cloud computing is hosted technology used to deliver services over internet. These services are broadly classified based on type of hosting i.e. infrastructure, platform and software. Public environment and internet connectivity make it vulnerable and unsafe for communication and storage. Confidentiality is one of the major principles to keep data privacy and protection at high level. Cryptographic techniques are used to achieve confidentiality and integrity of information during unsafe communication. This research paper observes that various cryptographic algorithms known as symmetric key cryptography and asymmetric key cryptography can be used to protect information and make it unreadable for unauthorised users. This research paper implements different security algorithms and observe their performance based on computation time over different input sizes. The complete research work concludes a comparative study and recommends different security approaches for different situations.


Author(s):  
Srinivasa K. G. ◽  
Siddesh G. M. ◽  
Srinidhi Hiriyannaiah ◽  
Anusha Morappanavar ◽  
Anurag Banerjee

The world of digital communication consists of various applications which uses internet as the backbone for communication. These applications consist of data related to the users of the application, which is confidential and integrity needs to be maintained to protect against unauthorized access and use. In the information hiding field of research, Cryptography is one of the wide techniques used to provide security to the internet applications that overcome the challenges like confidentiality, integrity, authentication services etc. In this paper, we present a novel approach on symmetric key cryptography technique using genetic algorithm that is implemented on CUDA architecture.


2017 ◽  
Vol 55 (6) ◽  
pp. 1731-1756 ◽  
Author(s):  
R.V. Gundur

Current and ex-gang members are hard-to-reach populations for research purposes. To date, researchers have resorted to embedding themselves long-term or recruiting individuals of interest within a target community. Typically, such studies provide a great deal of empirical depth but not necessarily empirical breadth given their lack of comparative analysis and generalizability. Moreover, they often rely on snowballing or chain referral methods that depend on the networks of the recruited seeds. This article explores the use of the Internet to recruit such individuals for face-to-face interviews. This strategy has been employed in settings outside criminology to good effect. This article shows that the online recruitment of current and ex-gang members not only reduces the time necessary to develop contacts but also allows researchers to triangulate data by encountering a diverse array of respondents.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 436
Author(s):  
Gowtham Tumati ◽  
Yalamarthi Rajesh ◽  
Manogna T ◽  
J Ram Kumar

Cryptographic techniques are primarily divided into two categories and they are: Symmetric key type and Asymmetric key type. In Symmetric key cryptography, during the process of encryption and decryption, the same key will be used. This is a conventional method of Cryptography. This might cause some disadvantage and give way for attacks on the algorithm. So, for this reason, the next technique comes into play. In Asymmetric key cryptography, there is a usage of a pair of keys, one for the encryption process and another for decryption process. In this technique also, there is a slight disadvantage, since there is a possibility for attackers to guess the public key from the pair of keys, thereby posing a threat to the process to an extent. In this paper, we develop an algorithm with a simple yet efficient structure using Symmetric key cryptography that could possibly decrease the chance of attacks on the algorithm.  


2020 ◽  
pp. 27-37
Author(s):  
Dragana Ćamilović

The use of the Internet, and particularly social networks, has changed the way people inform themselves about potential tourist destinations today. People are often browsing the Internet to find inspiration for their next trip. A nice photograph or a video posted on a Facebook page, for example, can motivate them to further explore the destination and become interested in visiting it. Since local tourist organizations in Serbia play an important role in promoting and supporting tourism on a local level, they need to use the marketing potential of social networks to its fullest. This paper provides an overview of the most commonly used social networking services and the benefits of their use. It also sheds light on the use of Facebook by the local tourist organizations of popular Serbian destinations. The author has investigated Facebook pages of five Serbian local tourist organizations and conducted a comparative analysis according to the number of their fans (i.e., total page likes), total page likes growth comparing to the previous week, the number of their posts in the observed week, and the engagement rates of their fans (in the observed week).


Sign in / Sign up

Export Citation Format

Share Document