scholarly journals Data Security Using Armstrong Numbers

Author(s):  
S. Belose ◽  
M. Malekar ◽  
S. Dhamal ◽  
G. Dharmawat ◽  
N.J. Kulkarni

In the real world, it is difficult to transmit data from one place to another with security. To ensure secured data transmission, universal technique called cryptography is used, which provides confidentiality of the transmitted data. In this paper Encryption and decryption process uses Armstrong number which is referred as a secret key. To make the Authentication between two intended users along with the security, server is used. With the help of server, both sender and receiver will get validated. Then actual data could be transmitted by any of the means.

Author(s):  
Meenakshi R. K ◽  
A. Arivazhagan

<p>The demand of satellite communication, the security algorithms are to be designed in the board. The information from the satellite to the ground is required the data security with the cryptographic algorithms. Advanced encryption standard (AES) is one of the promising cryptographic algorithms for the terrestrial communication. In this paper, the encryption and decryption is mainly focused on the cipher block chaining (CBC) mode for achieving the high secured data transmission. For efficient data transmission, the AES algorithm is implemented by using CBC mode. The proposed work is designed by using RTL modeling and also the minimum numbers of logical elements are used for implementation. </p>


2020 ◽  
Vol 8 (4) ◽  
pp. 475
Author(s):  
Maria Okta Safira ◽  
I Komang Ari Mogi

In this paper two methods are used, namely the vigenere cipher method and the RSA method. The vigenere cipher method is an example of a symmetric algorithm, while RSA is an example of an asymmetric algorithm. The combination of these two methods is called hybrid cryptography which has the advantage in terms of speed during the encryption process. Each process, which is encryption and decryption, is carried out twice, so that security can be ensured. In the process of forming the key used the RSA method. In the encryption process using public keys that have been generated before when the key is formed. This public key is used in sending data to the recipient of a secret message where this key is used for the data encryption process. The Secret key is kept and will be used during the decryption process. There is a system architecture that describes how clients and servers communicate with each other over the internet using the TCP protocol where the client here is an IoT device and the server is a server. 


2021 ◽  
pp. 145-155
Author(s):  
C. Thirumarai Selvi ◽  
R. S. Sankarasubramanian ◽  
M. MuthuKrishnan

2020 ◽  
Vol 17 (5) ◽  
pp. 2163-2171
Author(s):  
G. Manikandan ◽  
U. Sakthi

In secure communication key management plays an important role. Ensuring of security and trust worthiness in any transmission taking place via Wireless Sensor Networks (WSN) can be done using thoughtfully designed key management models. Here, the method of clustering is used to increase the system performance. Also, an effective key generation method is proposed for secured data transmission for the clustered wireless sensor networks. This method uses Chinese Remainder Theorem (CRT) for generating secret key for each cluster and merges with cluster head ID to generate a unique 144-bit encryption keys. Since, CRT uses random numbers for generating keys, separate active keys that are dynamic to ensure secured data transmission. The proposed model provides a positive impact by improving the lifetime, reducing the delay time, memory requirements and energy consumption, when compared with other existing state of art methods. Moreover, it protects data from brute-force attack, forward as well as backward secrecy and node compromised attack.


Author(s):  
Meera Tamboli

Steganography exists from many years in a variety of forms and has been used in a variety of domains. There are various types of steganographic techniques that are used to hide data in various file formats. The proposed model uses three layers of security using three algorithms namely, LSB, DES and AES. The software allows the user to encrypt the secret message which gets protected by undergoing three layers of encryption. The output of the encryption process which is the steno image can be sent across through any medium along with the secret key to decrypt. The end user then uses a unique key to extract and decrypt the secret message from the image. There are many reasons to hide data but the simplest is the need to prevent unauthorized persons from accessing the secret information.


An enhanced technique to generate unique code using DNA sequences that encrypt and decrypt plaintext of characters, text file(.txt,.doc,.docx),image (jpg, jpeg), audio(.mp3) and video(.mp4) using a dynamic DNA key-based cryptography. Cryptography is always considered as secured way for transferring information over insecure channel by achieving confidentiality, privacy and integrity. Since last 10 years traditional cryptography approaches are been replaced with more efficient and effective cryptographic systems like DNA Cryptography. This system takes the DNA sequence as the input and generates a key randomly and is used to decrypt the data without non-integrity of data. This system provides two stages of data security using DNA sequences.


Data transmission with protection is main concept which is getting demand now a days for which number of encryption of data techniques are developed and now in this paper Advanced Encryption Standard (AES) Algorithm is used and is implemented on FPGA kit using vertex-3 family. We use 128 bits consists of input, key data, output data for this design. It is called an iterative looping with replacement box, key, loop in this design for both encryption and decryption of data. We use Xilinx software platform for simulation of our design that is AES by which area utilization and throughput is increased for achieving low power consumption, high data security, reduced latency and easy architectural design. This data operation is applicable in many areas.


Security in Cloud Network is essential and data security is required when data is transmitted from the sender device to receiver end and vice versa. Sometimes, the eavesdroppers might steal sensitive data which is dangerous for the users of the cloud network. The goal of the paper is to propose a newer dimension to Cloud Computing - ‘Security as a Service by verification using Information System in Cloud Network’ in which an authentication procedure is used from the user side to ensure the privacy of the network. AES algorithm is used to encrypt the Unique Identification Number (UID) provided by the user to hide from the eavesdroppers and decrypt the same at the receiver end. In this algorithm, the same key is used for encryption and decryption process. Therefore, the sender and the receiver must know and use the same secret key. We have introduced an Information System that keeps track of all users and helps during the verification. Decryption of the encrypted UID will also be done in this system. It also helps to manage session of all users who have logged into the system and tries to access the information with the UID. If the user shares one’s UID with other personnel and if it causes any problem of insecurity in organizational network, then it will also be caught by the Information System. This helps to protect the cloud network from the trespassers and increases security of the network.


2017 ◽  
Vol 7 (1.5) ◽  
pp. 221
Author(s):  
Pankaj Singh ◽  
Sachin Kumar

Cryptography is about protecting the data from third parties or from public to read confidential data. Cryptography mainly focuses on encrypting the data or we can say converting the data and decrypting the actual data or we can say reconverting the data by different methods. These encryption and decryption methods are based on mathematical theories and are implemented by computer science practices. But as cryptography progressed ways were found to decode the secured data and view actual data. This was also done by the use of mathematical theories and computer science practices. Popular algorithms which are used in today’s world are, AES (Advance Encryption Standard), Blowfish, DES (Data Encryption Standard), T-DES (Triple Data Encryption Standard), etc. Some of the previously known algorithms were RSA (Rivest–Shamir–Adleman), ECC (Elliptic curve cryptography), etc. These algorithms have their own advantages and drawbacks. But as people were progressing more in breaking them down, these algorithms were supported by digital signatures or hash done by different algorithms like MD5, SHA, etc. By these means data integrity, data confidentiality, and authentication of data are maintained. But as the things are progressing it seems that new advancements are always needed in the field of cryptography to keep the data secure.


2021 ◽  
Vol 2 (1) ◽  
pp. 11-15
Author(s):  
Rishabh Singh ◽  
Ghanendra Kumar ◽  
Chakresh Kumar

This project proposes the design of ultrafast communication circuit which can enable the high speed secured data transmission at 50 Gb/s and 100 Gb/s by the use of distributed Raman amplifier, EDFA (Erbium – doped fiber amplifier), filter, single mode fiber along with Fiber Bragg Grating (FBG) and attenuators. The simulation of the suggested optical circuit involves the use of parameters of Raman amplifier and EDFA and other components included in the optical structure. The design also includes the use of encryption and decryption techniques to ensure secured communication. Thus, realization of these circuits at 50 Gb/s and 100 Gb/s will enable the future optical communication applications for ultrafast data transmission to large distances.


Sign in / Sign up

Export Citation Format

Share Document