multiple encryption
Recently Published Documents


TOTAL DOCUMENTS

43
(FIVE YEARS 2)

H-INDEX

8
(FIVE YEARS 0)

2021 ◽  
pp. 2008055
Author(s):  
Jiahui Du ◽  
Lan Sheng ◽  
Yuan Xu ◽  
Qiaonan Chen ◽  
Chang Gu ◽  
...  


Author(s):  
Sankaramani S. S ◽  
Sulthan Abdul Kadar H ◽  
Prason Moses M ◽  
Sivaram S ◽  
Velusamy A

To solve the problem of poor security and performance caused by traditional encryption algorithm in the cloud data storage, we propose a cascade ciphering with randomized algorithm. The multiple encryption is a process to encrypt the data multiple times using the same algorithm or different algorithms, to provide multilayer and multilevel security over unreliable wireless network during communication. The encryption algorithms are AES, MD5, SHA 129, SHA 256, Whirlpool and Blowfish.



Author(s):  
Yahia Alemami ◽  
Mohamad Afendee Mohamed ◽  
Saleh Atiewi ◽  
Mustafa Mamat

There are various ways of social communication including writing (WhatsApp, Messenger, Facebook, Twitter, Skype, etc), calling (mobile phone) and voice recording (record your voice and then send it to the other party), but there are ways to eavesdropping the calls and voice messages, One way to solve this problem is via cryptographic approach. Chaos cryptography build on top of nonlinear dynamics chaotic system has gained some footstep in data security. It provides an alternative to conventional cryptography built on top of mathematical structures. This research focuses on the protection of speech recording by encrypting it with multiple encryption algorithms, including chaotic maps (Logistic Map and Sine Maps).



2020 ◽  
Vol 28 (6) ◽  
pp. 2727-2740
Author(s):  
Juhyeng Han ◽  
Seongmin Kim ◽  
Daeyang Cho ◽  
Byungkwon Choi ◽  
Jaehyeong Ha ◽  
...  
Keyword(s):  


Author(s):  
Showkat Ahmad Bhat ◽  
Amandeep Singh

Background & Objective: Digital multimedia exchange between different mobile communication devices has increased rapidly with the invention of the high-speed data services like LTE-A, LTE, and WiMAX. However, there are always certain security risks associated with the use of wireless communication technologies. Methods: To protect the digital images against cryptographic attacks different image encryption algorithms are being employed in the wireless communication networks. These algorithms use comparatively less key spaces and accordingly offer inadequate security. The proposed algorithm described in this paper based on Rubik’s cube principle because of its high confusion and diffusion properties, Arnold function having effective scrambling power, blocking cipher with block encryption and permutation powers. The main strength of the proposed algorithm lies in the large key spaces and the combination of different high power encryption techniques at each stage of algorithm. The different operations employed on the image are with four security keys of different key spaces at multiple stages of the algorithm. Results & Conclusion: Finally, the effectiveness and the security analysis results shows that the proposed image encryption algorithm attains high encryption and security capabilities along with high resistance against cryptanalytic attacks, differential attacks and statistical attacks.



Author(s):  
Devavrat Agnihotri ◽  
Saad Ahmed ◽  
Dhanashree Darekar ◽  
Chinmay Gadkari ◽  
Sagar Jaikar ◽  
...  
Keyword(s):  


Author(s):  
Shima Ramesh Maniyath ◽  
Thanikaiselvan V.

In this study, we propose an innovative image encryption Techniques based on four different image encryption Algorithm. Our methodology integrates scrambling followed by Symmetric and Asymmetric Encryption Techniques, to make the image meaningless or disordered to enhance the ability to confront attack and in turn improve the security. This paper mainly focused on the multiple encryption Techniques with multiple keys on a single image by dividing it into four blocks. So instead of using one Encryption method a combination of four different Encryption Algorithm can make our image more secure. The Encryption is done first by using DNA as secret key, second by using RSA, third by DES and fourth by Chebyshev. The pros and cons for all the Encryption methods are discussed here. Proposed methodology can strongly encrypt the images for the purpose of storing images and transmitting them over the Internet. There are two major benefits related with this system. The first benefit is the use of Different Algorithm with different keys. The second benefit is that even though we are using four different Algorithm for a single image, the time taken for encryption and decryption is few seconds only. Our method is methodically checked, and it shows an exceptionally high level of security with very good image quality.



2019 ◽  
Vol 24 (6) ◽  
pp. 1955-1974 ◽  
Author(s):  
Jinlong Liu ◽  
Zhutian Yang ◽  
Zhilu Wu ◽  
Zhendong Yin ◽  
Xu Jiang ◽  
...  


Internet of Things (IoT) has become one of the most important fields of research as it plays a vital role in performing an assigned task with various smart devices. These connected devices work together to achieve a common goal. Numerous researchers have been working in various sectors of IoT for obtaining a betterment in the entire function of an IoT environment. Securing the data being transmitted or stored in these smart devices in one of the major fields of research. Some of the security challenges faced in an IoT environment are in the areas of user authentication, user privacy, access control, information confidentiality, trust, mobile security and policy enforcement. To overcome all these challenges. In this paper, we have proposed a system called AMES (Advanced Multiple Encryption System) which also secures the overall communication of the network. The paper briefs an overview of an IoT environment, consisting of some hackers where the user connection with the controller is blocked without the presence of integrity and confidentiality. The paper also discusses the various security benefits of RSA and SHA. The proposed AMES system is based on Hardy Wall Algorithm and MQTT protocol. The differentiation of the proposed protocol and HTTP protocol is stated clearly The experimental results are obtained for the proposed authentication scheme using NS3 simulator by showing the comparison between existing hybrid security system with our proposed authentication system. The results also state that the designed AMES authentication system using MQTT protocol can minimize the level of security threats and other complications in transmission of the data in IoT environment.



Author(s):  
Harbir Kaur ◽  
Hirday Pal Singh Gill ◽  
Dipti Sarmah
Keyword(s):  


Sign in / Sign up

Export Citation Format

Share Document