scholarly journals Improved Approach of Rail Fence for Enhancing Security

In the era of a global village, a huge amount of people are connected to the web through their PC, mobile and any type of communication tool for communication purposes, hence we require a safe approach that provides security and protection from unauthorized clients and misuses of data and information. Cryptography is a widespread technique to guarantee security for the internet-based communication framework. Many cipher technique have developed but the rail Fence is the simplest and amusing cryptographic algorithm until now. In this technique, the plain text is organized as crosswise and read it from top to the bottom row produces the cipher text. An inadequate quantity of keys is its weakness. This paper redesigned the current rail fence by applying the three basic phases: substitution phase once and transposition phases uses twice. The proposed technique ensures that the resultant cipher text is a fusion of various symbols precise by a chart. The proposed algorithm eliminates the limitation of the existing algorithm and significantly improves the performance by transforming the plain text unrecognizable and unpredictable.

2018 ◽  
Vol 7 (2) ◽  
pp. 880
Author(s):  
G Manikandan ◽  
R Jeeva Dharani ◽  
R Maya

Information security is a key challenge in today’s information era where a huge volume of data is being generated on the internet as a result of the online transaction. This data needs to be protected from the unauthorized users on the web. Cryptography is used to ensure the confidentiality and integrity of data in the virtual world. The strength of the cryptographic algorithm relies on the complexity involved in retrieving the original content from the unintelligible information. The system proposed in this paper focuses on the use of a different mechanism to increase complexity involved in the cryptanalysis. Different cryptographic techniques are used to create a modified plain text and modified key. The newly generated key is used to encrypt the modified plaintext to generate the ciphertext. From the security analysis, it is evident that the time taken for cryptanalysis by the proposed scheme is more when compared with the existing systems.  


2020 ◽  
Vol 8 (5) ◽  
pp. 1836-1839

The password system is the most conventional method among validation techniques on the internet and is operated more easily and effectively than other methods. However, it is a vulnerable method against attacks such as eavesdropping or replay attack. To prevail over this problem, OTP (One Time Password) technique is used. The most popular OTP is HOTP algorithm, which is based on one-way hash function SHA-1. The recent researches show the weakness of the hash function. So, in this paper we created a module which uses another cryptographic algorithm. Cryptography in the current world serves an important role in data security. Cryptography means writing of secret codes (cipher text) which is in an unintelligible form and cannot be read unless we have a perfect key to decode it. The proposed method is AES algorithm (128 bit) followed by Middle Square method to generate an OTP. As OTP is a 4-6 bit number we will decrease the AES output to a 4-6 bit through Middle Square method and this OTP can be used as a security tool in many cases like online transaction purposes.


A novel cryptographic algorithm, namely Significant Secure Biometric Key (SSBK) algorithm is proposed.The novel algorithm is compared with the existing cryptographic algorithms like Advanced Encryption Standard (AES), key exchange algorithm like Diffie-Helman and also with Symmetric Random Biometric Key (SRBK) algorithm, and finally we prove the proposed algorithm is superior than existing algorithm based on few parameters. A sample plain text is taken and converted to cipher text and the key from the biometric feature is used for encryption and decryption. In the key generation process, the bi-modal biometrics, namely Ear and Lip features are taken. The concatenated key values obtained from ear and lip can be of minimum 8 bits to the maximum of 1024 bits based on the type of algorithm used.


2000 ◽  
Vol 24 (8) ◽  
pp. 312-313
Author(s):  
Trevor Hicks ◽  
Ben Stubbs ◽  
Martin Briscoe

The last 10 years has seen a phenomenal growth in the internet which is currently used by over 200 million people around the world, including 12.5 million in the UK (NUA, 2000). This rapid growth is set to continue and by the end of the year most of Britain's 24 million mobile phone users will be able to access the web through the latest generation of telephones (Daily Telegraph, 6 January 2000). This growth in popularity stems from the internet's ease of use and the huge amount of information from around the globe that can be accessed 24 hours a day. Success has, of course, brought problems and the internet has been criticised for being slow, for containing inaccurate and even dangerous material and for being a home to viruses waiting to attack unwary surfers.


10.28945/2424 ◽  
2001 ◽  
Author(s):  
Edward Weiss ◽  
Alex Koohang

Higher education institutions are increasingly embracing the Internet as a tool to support academic courses and/or programs. Little research has been done to assess students' attitudes toward the Web-based instructions and communication tools that supplement academic courses and/or programs. The purpose of this study was to assess students’ attitudes toward the on-line asynchronous communication tool used as a required part of the MBA curriculum at a medium-sized university in the Midwest. The on-line asynchronous communication tool known as the Higher education institutions are increasingly embracing the Internet as a tool to support academic courses and/or programs. Little research has been done to assess students' attitudes toward the Web-based instructions and communication tools that supplement academic courses and/or programs. The purpose of this study was to assess students' attitudes toward the on-line asynchronous communication tool used as a required part of the MBA curriculum at a medium-sized university in the Midwest. The on-line asynchronous communication tool known as the MBA web-support/discussion forum is the nucleus of the interaction between students and faculty, and among students. It simulates the traditional classroom discussion activities among groups and between students and faculty. It also allows posing of course information, syllabi, office hours, and weekly assignments/activities. A Likert-type questionnaire consisting of 20 items was constructed and administered to 74 MBA students. The results of this study showed that respondents did not express high positive attitudes toward the on-line asynchronous communication tool. The discussion is focused on three elements that might be responsible for learners' attitudes toward on-line communication tool used to deliver Web-base courses or programs. These elements are on-line instructional design, building on-line community, and training. Recommendations are made based on the findings of this study.


2001 ◽  
Vol 120 (5) ◽  
pp. A735-A735
Author(s):  
C STREETS ◽  
J PETERS ◽  
D BRUCE ◽  
P TSAI ◽  
N BALAJI ◽  
...  

Author(s):  
Petar Halachev ◽  
Victoria Radeva ◽  
Albena Nikiforova ◽  
Miglena Veneva

This report is dedicated to the role of the web site as an important tool for presenting business on the Internet. Classification of site types has been made in terms of their application in the business and the types of structures in their construction. The Models of the Life Cycle for designing business websites are analyzed and are outlined their strengths and weaknesses. The stages in the design, construction, commissioning, and maintenance of a business website are distinguished and the activities and requirements of each stage are specified.


Sign in / Sign up

Export Citation Format

Share Document