scholarly journals Secure Data Communication using Cryptography

Any type of digital information is called as data. In today's world, precarious data are growing and used in communication over internet. Hence, data security is most important factor for the internet users. The best solution is to use some cryptography algorithms which encrypts data in some cipher and transmit it over the internet and again decrypted to genuine data. Cryptography is eternal. The field of cryptography manages the technique for passing on information safely. The objective is to permit the expected recipients to get the message appropriately while interfere with snoopers from understanding the message. Key arrangement layout allows communicating parties to establish a mutual cipher key. The situation of present day of data security framework incorporates secrecy, legitimacy, trustworthiness, non-repudiation. This paper introduces a improved system for securing text-data communication benefiting the use of RSA algorithm. It is the public-key cryptosystem and is mainly used for secure data transmission[1].

2021 ◽  
pp. 1-11
Author(s):  
Omar A. Alzubi

Industrial Wireless Sensor Network (IWSN) includes numerous sensor nodes that collect data about target objects and transmit to sink nodes (SN). During data transmission among nodes, intrusion detection is carried to improve data security and privacy. Intrusion detection system (IDS) examines the network for intrusions based on user activities. Several works have been done in the field of intrusion detection and different measures are carried out to increase data security from the issues related to black hole, Sybil attack, Worm hole, identity replication attack and etc. In various existing approaches, secure data transmission is not achieved, therefore resulted in compromising the security and privacy of IWSNs. Accurate intrusion detection is still challenging task in terms of improving security and intrusion detection rate. In order to improve intrusion detection rate (IDR) with minimum time, generalized Frechet Hyperbolic Deep and Dirichlet Secured (FHD-DS) data communication model is introduced. At first, Frechet Hyperbolic Deep Traffic (FHDT) feature extraction method is designed to extract more relevant network activities and inherent traffic features. With the help of extracted features, anomalous or normal data is predicted. Followed by Statistical Dirichlet Anomaly-based Intrusion Detection model is applied to discover intrusion. Here, Dirichlet distribution is evaluated to attain secure data transmission and significantly detect intrusions in WSNs. Experimental evaluation is carried out with KDD cup 99 dataset on factors such as IDR, intrusion detection time (IDT) and data delivery rate (DDR). The observed results show that the generalized FHD-DS data communication method achieves higher IDR with minimum time.


2016 ◽  
Vol 3 (1) ◽  
Author(s):  
Mike Francoeur

There is a tendency, particularly among Western pundits and technologists, to examine the Internet in almost universally positive terms; this is most evident in any discussion of the medium’s capacity for democratization. While the Internet has produced many great things for society in terms of cultural and economic production, some consideration must be given to the implications that such a revolutionary medium holds for the public sphere. By creating a communicative space that essentially grants everyone his or her own microphone, the Internet is fragmenting public discourse due to the proliferation of opinions and messages and the removal of traditional gatekeepers of information. More significantly, because of the structural qualities of the Internet, users no longer have to expose themselves to opinions and viewpoints that fall outside their own preconceived notions. This limits the robustness of the public sphere by limiting the healthy debate that can only occur when exposed to multiple viewpoints. Ultimately, the Internet is not going anywhere, so it is important to equip the public with the tools and knowledge to be able to navigate the digital space. 


2004 ◽  
Vol 04 (02) ◽  
pp. C1-C5 ◽  
Author(s):  
LASZLO B. KISH ◽  
SWAMINATHAN SETHURAMAN

Secure encryption of data is one of the most important parts of information technology and major concern of data security, military, defense and homeland security applications. The main aim of the paper is to propose a new way of approach to encryption. We propose a new possible approach [1] to encryption, which could be a fast, simple, inexpensive, robust, flexible, and mobile way of data encryption for absolutely secure data transmission by using classical digital information. The Eavesdropper is allowed to know the received signal thus the method has a higher level of protection than that of quantum encryption. Factorization algorithms do not help to break the code. Proper scrambling operators, which are necessary for the method, are study of current research.


2018 ◽  
Vol 10 (2) ◽  
Author(s):  
Yuza Reswan ◽  
Dedy Agung Prabowo

ABSTRACTIt is now commonplace that secrecy must be truly enhanced and tightened as it weighs the emergence of the latest technology that is growing rapidly. Of course an agency, group, or individual have data that is confidential and do not want to be known by other parties hence the need for a system capable of securing the data. For this reason this research aims to create Cryptography application by applying a combination of Hill Cipher and RSA algorithm, Cryptography is also called coding language and I apply Hill Cipher because it is a classical method that uses multiplication for each encoded character while RSA is a modern method that has 2 keys ie key public and secret key where the public key is used for encryption and secret key to retranslate the original form. By applying a combination of classical and modern methods it can be more secure so it is more difficult to be solved by unwanted parties.Keyword : Data Security, Cryptography, Hill Cipher, RSAABSTRAKDi masa sekarang sudah menjadi hal yang biasa bahwa kerahasiaan harus benar – benar ditingkatkan dan diperketat karena menimbang kemunculan teknologi terbaru yang semakin pesat berkembang. Tentu sebuah Instansi, kelompok, ataupun individu memiliki data yang bersifat rahasia dan tidak ingin diketahui oleh pihak lain maka dari itu diperlukannya system yang mampu mengamankan data tersebut. Untuk itulah penelitian ini bertujuan membuat aplikasi Kriptografi dengan menerapkan kombinasi Algoritma Hill Cipher dan RSA, Kriptografi juga disebut bahasa persandian dan saya menerapkan Hill Cipher karena merupakan metode klasik yang menggunakan perkalian untuk tiap karakter yang disandikan sedangkan RSA adalah metode modern yang memiliki 2 kunci yaitu kunci publik dan kunci rahasia dimana kunci publik digunakan untuk penyandian dan kunci rahasia untuk menterjemahkan kembali k bentuk asli. Dengan menerapkan kombinasi metode klasik dan modern ini dapat lebih mengamankan sehingga lebih sulit untuk dapat di pecahkan oleh pihak – pihak yang tidak diinginkan.Kata Kunci : Pengamanan Data, Kriptografi, Hill Cipher, RSA.


2020 ◽  
Vol 8 (5) ◽  
pp. 5560-5563

Wireless Sensor Network (WSN) extends the advantages of small price, quick employment, and shared transaction medium, although it induces a lot of security and secrecy challenges. In this paper, the Elliptic Curve Cryptography based Secure Data Communication and Enhance sensor Reliability (SDER) in WSN. In this scheme, an Elliptic Curve Cryptography (ECC) Weierstrass function is used to verify the sensor reliability, and ECC cryptography technique is useful for providing the data security in the network. The simulation result demonstrates that the SDER reduces both the packet loss rate and the network delay.


JURTEKSI ◽  
2019 ◽  
Vol 6 (1) ◽  
pp. 1-10
Author(s):  
Sebastian Suhandinata ◽  
Reyhan Achmad Rizal ◽  
Dedy Ongky Wijaya ◽  
Prabhu Warren ◽  
Srinjiwi Srinjiwi

Abstract:Computer data security relies on preventing data theft from irresponsible parties by using cryptography method. Some cryptography algorithms have good and poor performance in encrypting and decrypting data depending on the key types. Therefore the purpose of this research is to measure the performance of the hybrid algorithm, consisting a symmetric keyBlowfish algorithm and an asymmetric key RSA algorithm, in encrypting and decrypting multiple types of data such as documents, photos, audios, and videos. The result is the performance of the hybrid algorithm is almost on par with Blowfish and provides a more secure data encryption and decryption by taking advantage of RSA algorithm. The average encryption performance of hybrid algorithm is 0.85s on document, 1.06s on photo, 3.38s on audio, and 15.56s on video. While the average decryption performance of hybrid algorithm is 1.01s on document, 1.38s on photo, 4.3s on audio, and 27.56s on video.            Keywords:Hybrid cryptography, Data security, Performance, Blowfish, RSA  Abstrak:Keamanan data komputer berhubungan dengan pencegahan dari pencurian data oleh pihak yang tidak bertanggung jawab, salah satu cara pengamanan data komputer yaitu dengan teknik kriptografi. Beberapa metode kriptografi memiliki performa yang baik dan buruk tergantung dengan tipe kuncinya. Maka dari itu, tujuan dari penelitian ini adalah mengukur tingkat kecepatan kriptografi hybrid, terdiri dari algoritma simetris Blowfish dan algoritma asimetris RSA, dengan beberapa tipe data seperti dokumen, foto, audio dan video. Hasil dari penelitian ini adalah algoritma hybrid memiliki performa yang tidak jauh berbeda dari algoritma Blowfish dan membuat proses enkripsi dan dekripsi data lebih aman dengan keunggulan dari algoritma RSA. Rata-rata kecepatan enkripsi algoritma hybrid untuk dokumen 0,85 detik, gambar 1,06 detik, audio 3,38 detik, dan video 15,56 detik. Sedangkan rata-rata kecepatan dekripsi algoritma hybrid untuk dokumen 1,01 detik, gambar 1,38 detik, audio 4,3 detik, dan video 27,56 detik. Kata kunci:Kriptografihybrid, Keamanan data, Performa, Blowfish, RSA 


2016 ◽  
Vol 2 (1) ◽  
pp. 86
Author(s):  
Aihua Wen

Internet users have given two existing phrases in Chinese, “Jiang Zhen” and “Lao Siji” new second definitions. “Jiang Zhen” which exists in some southern Chinese dialects is gradually becoming a new Mandarin phrase. The phrase’s meaning is being transformed and this new meaning is being used by Chinese netizens. This new and transformed meaning has spread quickly throughout the internet. On the other hand, “Lao Siji” now has several new meanings and has become more popular in online and real life conversations. From the three dimensions of language namely semantics, syntax and pragmatics, the two new phrases have their intrinsic connotations. Currently, different sections of the public hold different attitudes to these two new phrases, so their vitality is still waiting for the test of time.


2021 ◽  
Vol 2021 ◽  
pp. 1-1
Author(s):  
Umair Khadam ◽  
Muhammad Munwar Iqbal ◽  
Meshrif Alruily ◽  
Mohammed A. Al Ghamdi ◽  
Muhammad Ramzan ◽  
...  


2020 ◽  
Vol 4 (2) ◽  
pp. 124
Author(s):  
Reza Rizki Pratama Suroso ◽  
Hesti Hasyim Hasyim

This article aims to discuss about the importance of Information Technology in overcoming the Covid-19 virus. Information technology will continue to grow in line with the fast number of internet users. Based on the data obtained, it reaches that there are 175.4 million internet users in Indonesia. Based on the results of qualitative analysis, by direct observation, it can be concluded that the internet has become a medium that provides information to the public about the dangers and prevention efforts of COVID 19. However, the weaknesses of information technology included that the difficulty of filtering correct or wrong information. So, the users must sort and respond to any information from internet technology. The public needs to be aware of the covid-19 virus outbreak which has spread to hundreds of countries in the world, including Indonesia. Therefore, information technology should reach remote villages. With regard to the health aspect, information technology should reach out to the health center units and integrated with urban hospitals.


Sign in / Sign up

Export Citation Format

Share Document