Data Security and Cryptographic Techniques: A Review

2003 ◽  
Vol 3 (1) ◽  
pp. 106-132 ◽  
Author(s):  
Kefa Rabah .
Author(s):  
Agung Lestari ◽  
Abdul Sani Sembiring ◽  
Taronisokhi Zebua

Optimization of data security techniques is very necessary so that the data or information that is secured is really safe from attack. Data that has been encrypted based on cryptographic techniques very quickly raises suspicion that the data is confidential or important. Therefore, this technique is better combined with steganography techniques. Utilization of steganography techniques can minimize the attacker's suspicion of data that is secured, because by using steganography data techniques can be hidden on certain objects. This study discusses how to encode a text based on the Merkle-Hellman Knapsack algorithm and the resulting password is hidden in a grayscale digital image as a hiding object based on the pixel value differencing algorithm. This is done to minimize suspicion and make it difficult for attackers to find out confidential or important data.Keywords: cryptography,steganography, merkle-hellmankanpsack, PVD, image


2021 ◽  
Vol 5 (6) ◽  
pp. 1113-1119
Author(s):  
Muhammad Fadlan ◽  
Haryansyah ◽  
Rosmini

One of the essential instruments in the cyber era is data. Therefore, maintaining data security is an important thing to do. One way that can be done to maintain data security is through cryptography. In cryptography, two basic techniques are commonly used, namely substitution techniques and transposition techniques. One of the weaknesses of the basic cryptographic techniques is the lower level of data security. This study proposed a super encryption model in securing data by combining cryptographic algorithms with substitution techniques, i.e., autokey cipher and transposition, i.e., columnar transposition cipher. This study used the Avalanche Effect method as a measurement tool for the proposed super encryption model. The test results have shown that the proposed super encryption model can provide a better level of security. The avalanche effect test on the five data test shows that the average AE value of the proposed super encryption model is 30.76%. This value is higher than the single autokey cipher algorithm of 1.66% and column transposition with a value of 18.03%. Other results from the five data test have shown that the proposed model has a high level of accuracy of 100% in terms of the decryption process results, which is the same as the initial data before going through the encryption process.  


2020 ◽  
Vol 4 (3) ◽  
pp. 1-10
Author(s):  
Naim BAFTIU

Cryptography is an old idea and science, but its approach exists and plays a large role in modernization today. Conventional cryptographic techniques form the basis of today's cryptographic algorithm. The different categories of algorithms have their respective features; internally, in performance and implementation. Cryptographic schemes and mechanisms have undergone continuous improvement. The application of cryptography has grown increasingly, ranging from limited use in state institutions to widespread use by private individuals and companies. The increased use of the Internet has significantly influenced the nature of applications and the way we communicate. Data security dictates the use of different cryptographic techniques. For this reason, we analyze in detail the various coding techniques by evaluating their performance and efficiency. Regarding the new paradigms in cryptography there are also new cryptographic schemes whose application requires detailed study and analysis. The classical cryptography algorithm is the oldest algorithm that was used long before the cryptographic system was discovered. Currently, the system has been widely applied to secure data, and using new methods in a way to improve existing methods. In this thesis the use of cryptographic methods using the C # programming language will be discussed.


Author(s):  
Pratiksha Satapure

Abstract: Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, nonrepudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents. Keywords: Cryptography, Hill Cipher, Homophonic Substitution Cipher, Monoalphabetic Cipher, Ceaser Cipher.


Author(s):  
Niko Surya Atmaja ◽  
S Sumijan ◽  
Y Yuhandri

The common method used to secure a MySQL database is in access control. The technique is the use of a password. To better secure the data sent cryptographic techniques need to be done. This study uses the Elgamal method in conducting cryptography. The results of this study generate MySQL databases in random form during safer delivery and can only be accessed by parties who have a password. So this research can further improve MySQL data security


2020 ◽  
Vol 4 (4) ◽  
pp. 627-634
Author(s):  
Fina Triana ◽  
Jon Endri ◽  
Irma Salamah

Information data security is an important aspect of exchanging data and information. Data and information security can be done in various ways, including by using the cesarean cipher method in cryptographic techniques. The cesarean cipher method of cryptographic technique is a substitution coding system which is done by replacing each alphabet character with other characters along the 26 alphabet characters so that the coding only occurs in the alphabet itself without any other punctuation. This study proposes a modification to the cesarean cipher technique by adding to the number of characters used, namely 256 characters in the ASCII code. The caesar cipher application or CaesarApp uses the methodology of library study, consultation, application design and application testing. The implementation of the CaesarApp application was created using the open-source Android Studio 3.5 application. The results of tests conducted on the CaesarApp application note that the modification of the caesar cipher with 256 ASCII characters results in a secure information data security application, this application has a deficiency in reading limitations on ASCII characters, so characters cannot be read properly on android users.


Author(s):  
Pahrul Irfan

Data security in the process of information exchange is very important. One way to secure the image is to use cryptographic techniques. Cryptographic algorithms applied to the image is used to randomize the position of pixels using a secret key parameters, so that images can not be recognized anymore after the encryption process. In this study, researchers used the algorithm of chaos known as algorithms compact, fast and commonly used in cryptography especially those in the image file. The results showed the image that has been through an encryption process can not be recognized because the randomization process image pixel position is performed using chaosalgorithm.


2020 ◽  
Vol 14 (1) ◽  
pp. 44-66 ◽  
Author(s):  
Neha Agarwal ◽  
Ajay Rana ◽  
J.P. Pandey ◽  
Amit Agarwal

Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their data on cloud. The data forwarded to cloud can be protected using some cryptographic techniques based on identity, attributes, and prediction. But these algorithms lack their performance when a revoked user collude with cloud; therefore, it becomes essential to develop a secure data sharing framework with some enhanced cryptographic techniques. The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption. The technique ensures the privacy, integrity, and security of the data while retrieving through the cloud. The framework is implemented in the cloud sim with java language. Experimental results proved that proposed frame work attains reasonable results compared to traditional methods.


2021 ◽  
Vol 5 (3) ◽  
pp. 806
Author(s):  
Muhammad Fadlan ◽  
Rosmini Rosmini ◽  
Haryansyah Haryansyah

Data security is an important thing that must be done in the cyber era. The use of various kinds of digital technology in helping various human activities needs to be balanced with adequate data security. One of the ways that can be used in securing data is through cryptography. Atbash cipher is one of the cryptographic techniques used in securing data. However, this algorithm has a weakness because it only uses the process of reversing the position of the characters to be secured. This study proposes a cryptographic model that can maximize data security from the atbash cipher. The proposed model is a combination of the atbash cipher with the autokey cipher. The tests carried out on the proposed model have a 100% success rate, meaning that the encrypted message resulting from the proposed encryption process has been successfully restored to its original form through the proposed decryption process. The results of this study indicate that the atbash cipher cryptographic algorithm, combined with the autokey cipher algorithm can produce an encrypted message that is more difficult to crack.


Sign in / Sign up

Export Citation Format

Share Document