scholarly journals A Novel Encryption Algorithm by Fusion of Modified Blowfish Algorithm and Fermat’s Little Theorem for Data Security

Nowadays, protecting sensitive factual information from hackers when it is transmitted over the broad network to communicate around the world is a huge task. To provide secure online transactions, communication, and business, researchers are insisted to develop novel security techniques. One of these approaches is on the basis of encrypting a plaintext will be in ciphertext by applying some mathematical models. This paper suggested a modified Blowfish algorithm with Fermat’s Little Theorem to provide an additional layer of security for sensitive information while sending over a non-secure channel. The performance analysis of Modified Blowfish Algorithm and Fermat’s Little Theorem (BFLT) encryption algorithm reveals consumption of memory, time consumption for encrypting and decrypting by comparing with the standard encryption algorithm. According to the analysis, this proposed encryption algorithm provides significantly upper level of performance and security and BFLT can be used for real-time implementations

2017 ◽  
Vol 4 ◽  
pp. 82-86
Author(s):  
Dawid Górniak ◽  
Piotr Kopniak

The data is often the most valuable thing that we collect on our computers. Without proper data security with encryption our valuable information may be illegally used by an unauthorised person. The article presents selected encryption methods and hash functions available in Boucy Castle library for Java programming language. The presented analysis applies to measurement of the speed of signature generation and verification. The signatures are for 240 bit encryption algorithms. In case of a hash function, the analysis refers to the speed of such functions. The fastest encryption algorithm and hash function from the research group were AES and SHA1.


Data security is the most predominant measure that should be followed in any organization to prevent uncertified access to user’s data. A data breach is a security event in which sensitive data is viewed, transmitted, stolen or used by an unauthorized individual. A number of breaches include compromised password files which reveal the passwords of millions of users in an organization. The paper is intended to identify such password breaches through honey encryption technique. Using the concept of honey words, each user has a list of sweet words corresponding to their account, out of which only one is original password and remaining are fake passwords. During Honey Encryption, Distribution-transforming encoder (DTE) is applied on the password to acquire the seed space which is then encrypted by using secret key. The proposed model can be efficiently implemented in cloud applications to highly reduce cloud data breaches.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaodan Chen ◽  
Desheng Zeng ◽  
Shuanglong Pang ◽  
Fu Jun

In order to improve data security, ensure user privacy, and solve the problems of low data access control accuracy, long time consumption, and high energy consumption in traditional methods, a cloud computing storage data access control method based on dynamic re-encryption is proposed. The principal component analysis method is used to reduce the dimension of the cloud computing storage data, and the random forest algorithm is further used to classify and process the cloud computing storage data according to the processing results. On the basis of data preprocessing, an access control tree is established to obtain the correlation of data nodes. Finally, the dynamic re-encryption method is used for data security state transformation, and the data access control of cloud computing storage is realized through key generation, encryption, re-encryption key generation, and decryption. The experimental results show that the data access control accuracy of the method in this paper is high, time consumption is small, and energy consumption is small, and it is more suitable for cloud computing systems with huge data and information.


Author(s):  
Mourad Talbi ◽  
Med Salim Bouhalel

The IoT Internet of Things being a promising technology of the future. It is expected to connect billions of devices. The increased communication number is expected to generate data mountain and the data security can be a threat. The devices in the architecture are fundamentally smaller in size and low powered. In general, classical encryption algorithms are computationally expensive and this due to their complexity and needs numerous rounds for encrypting, basically wasting the constrained energy of the gadgets. Less complex algorithm, though, may compromise the desired integrity. In this paper we apply a lightweight encryption algorithm named as Secure IoT (SIT) to a quantized speech image for Secure IoT. It is a 64-bit block cipher and requires 64-bit key to encrypt the data. This quantized speech image is constructed by first quantizing a speech signal and then splitting the quantized signal into frames. Then each of these frames is transposed for obtaining the different columns of this quantized speech image. Simulations result shows the algorithm provides substantial security in just five encryption rounds.


Author(s):  
K. Ramprakaash ◽  
S. Ramkumar ◽  
R. K. Santhosh ◽  
P. Shanmuga Priya

Steganography and Cryptography are two major fields which is widely used for data security. With the help of these technologies, data security is provided in banking system. In the proposed method, the online transactions are done virtually using hash function. Encryption of data is done by using the cryptographic hash function algorithm. The proposed approach implements an efficient algorithm for embedding the data in an image using steganography which provides the better security pattern for sending messages through a network. The authentication details of the sender and the receiver is hidden to achieve a secure transmission. The proposed approach provides better integrity and confidentiality. This paper implemented a novel methodology which can be used as a secure and highly efficient method of data hiding and data extracting.


Sign in / Sign up

Export Citation Format

Share Document