cipher text
Recently Published Documents


TOTAL DOCUMENTS

201
(FIVE YEARS 98)

H-INDEX

5
(FIVE YEARS 2)

Author(s):  
Anchal Goyal ◽  
Deepinder Kaur

In this dissertation a PicPass algorithm is proposed for the solution of Key Exchange problem using Symmetric and Asymmetric key cryptography. Diffie and Hellman proposed an algorithm for key exchange. But this algorithm suffers from Man-in middle attack. So to overcome this problem Seo proposed another algorithm that uses text password for the agreement between two parties. But again the password suffers from offline dictionary attack. In this, a PicPass Protocol i.e. picture is used as a password to make an agreement between two parties. The protocol contains two function i.e. picture function as well as distortion function is used to make picture in a compact size and then it is sent to receiver. Firstly the sender encrypts the Plain Text using Secret Picture and creates the Cipher Text using Symmetric key cryptography.Then the Secret Picture will be encrypted by covered picture resulting into Encrypted Picture.Now the Cipher Text and Encrypted Picture will be placed into digital envolpe and then the envelope will be send to the receiver. The receiver will receive the digital envelope, open it and then decrypt the Encrypted Picture using his Key Picture. This will result the receiver to get the Secret Picture. Now the receiver will open the Cipher Text using the Secret Picture and get the Plain Text. In between if any person wants to predict the Encrypted Picture then he cannot guess as the picture will only be decrypted using the Secret Key which will be only with the receiver. So in this dissertation, a picture is used as a password to authenticate key exchange is that gives practical solution against offline dictionary attacks only by using both private and public key cryptography.


Author(s):  
Er. Krishan Kumar ◽  
Nidhi Singla

In this dissertation a PicPass algorithm is proposed for the solution of Key Exchange problem using Symmetric and Asymmetric key cryptography. Diffie and Hellman proposed an algorithm for key exchange. But this algorithm suffers from Man-in middle attack. So to overcome this problem Seo proposed another algorithm that uses text password for the agreement between two parties. But again the password suffers from offline dictionary attack. In this, a PicPass Protocol i.e. picture is used as a password to make an agreement between two parties. The protocol contains two function i.e. picture function as well as distortion function is used to make picture in a compact size and then it is sent to receiver. Firstly the sender encrypts the Plain Text using Secret Picture and creates the Cipher Text using Symmetric key cryptography. Then the Secret Picture will be encrypted by covered picture resulting into Encrypted Picture. Now the Cipher Text and Encrypted Picture will be placed into digital envelope and then the envelope will be send to the receiver. The receiver will receive the digital envelope, open it and then decrypt the Encrypted Picture using his Key Picture. This will result the receiver to get the Secret Picture. Now the receiver will open the Cipher Text using the Secret Picture and get the Plain Text. In between if any person wants to predict the Encrypted Picture then he cannot guess as the picture will only be decrypted using the Secret Key which will be only with the receiver. So in this dissertation, a picture is used as a password to authenticate key exchange is that gives practical solution against offline dictionary attacks only by using both private and public key cryptography.


Author(s):  
Varre Divya Sai Manikanta

Abstract: Encryption Algorithms are necessary part of the data sharing today as every bit of data need encryption so that it could be transferred from one place to another without the fear of data leaking. Every lost bit of data puts the system to danger. Encryption algorithms compose of necessary steps involving a key that helps converting plain text to cipher text. All the steps must be performed carefully to ensure that the data encrypted is found back. Thus, many algorithms are made to run sequentially and in serial. This makes the algorithm to take much computation time. Keywords: Parallelize, encryption algorithms, multi-threading.


Author(s):  
Mr. C. K Srinivas

The E-auction, one of the most common e-commerce events, allows bidders to bid directly on the Internet. As with the sealed deal, additional transaction costs are needed with intermediaries, as the third party plays an essential role between buyers and sellers in helping to negotiate both during the auction. In fact, it never confirms that a third party is trustworthy. To solve the problems, we propose the low transaction cost blockchain technology which is used to build the public bid and sealed bid smart contract. The smart contract consists of the Auctioneer address, the start time for the auction, the deadline, the current winner's address, and the current highest price. The project demonstrates the bidding framework with blockchain technology. This bidding application prepared by using Advanced Encryption Standard(AES) Algorithm. This algorithm contains AES cipher specifiers the number of repetitions of transformation rounds, that converts the input called the plain text, then into the final output called cipher text.


2021 ◽  
Vol 6 (1) ◽  
pp. 41
Author(s):  
Endaryono Endaryono ◽  
Nurfidah Dwitiyanti ◽  
Heri Satria Setiawan

<p><em>One of several algorithms in cryptography is the Hill Cpher method. This method is used in randomizing the contents of the message using a password key in the form of a matrix with the order MXM. The product in this research is a simulation design to explain how a plaintext message is converted into cipher text with encryption and decryption processes and vice versa from ciphertext to paintext through multiplication and inverse matrix operations. using Microsoft Excel (MS Excel). In this study, a matrix with order 2x2 and modulo 26 was used. This simulation design shows how the work process visually for each step in the process of changing the message content in the Hill Cipher method. It is hoped that the results of this study can be used as a learning medium by the community, especially students and lecturers, to increase understanding and broaden their horizons about the Hill Cipher method in cryptography lectures.</em><em></em></p>


Author(s):  
Revati M Wahul

To maintain the anonymity of users, cloud storage owners often outsource encrypted documents. As a consequence, it is important to establish efficient and precise cypher text search techniques. One issue would be that the connection between documents is typically obscured during the encryption process, resulting in a significant deterioration of search accuracy efficiency. Additionally, the volume of data stored in data centers has exploded. This will make it significantly more difficult to create cipher text search schemes capable of providing efficient and reliable online information retrieval on large quantities of encrypted data. The paper proposes a hierarchical clustering approach in order to accommodate additional search semantics and to satisfy the demand for fast cipher text search in a big data environment. The proposed hierarchical approach clusters documents according to their minimum importance levels and then sub-clusters them until the maximum cluster size is reached. This approach can achieve linear computational complexity throughout the search process, spite of the fact that its size of the record set grows exponentially. The minimum hash sub-tree structure is used in this paper to check the validity of search results. The results demonstrate that as the number of documents in the dataset increases, the proposed method's search time increases linearly, while the conventional method's search time increases exponentially. Additionally, the suggested method outperforms the standard method in terms of rank privacy and document relevance.


Author(s):  
Kavia .

Cryptography and Steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, the message is become known . According to my proposed work in which both steganography and cryptography are combine and give good security for data. Firstly, the encrypted images has been hidden using image steganography method. Secondly, the Hash function algorithm has been modified and used to encrypt the stego image by using 128 digit hexa-key. Therefore, two levels of security have been provided using the proposed technique. In addition, the proposed technique provides high embedding capacity and better quality stego images.


Sign in / Sign up

Export Citation Format

Share Document