Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  A Step Ahead for Improving Data Security  
  Authors : Tejashree D Pawar
  Cite as:

 

Cryptography allows information to be sent in secure form.Information security protects data availability, privacy and integrity. If we are protecting confidential information then cryptography provides high level of privacy of individuals and groups. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. In this paper a new cryptography algorithm which is based on block cipher concept is presented. In this algorithm logical operation like XOR and shifting operation is used. Experimental results show that proposed algorithm is very efficient and secured.

 

Published In : IJCSN Journal Volume 3, Issue 6

Date of Publication : December 2014

Pages : 521 - 524

Figures : 05

Tables : 02

Publication Link : A Step Ahead For Improving Data Security

 

 

 

Tejashree D Pawar : Faculty Of Information Technology, Government Polytechnic Pune

 

 

 

 

 

 

 

Information security

Encryption

Decryption

Cryptography

From the result its isclear that our “proposed technique” is better result producing as compared “DJSA symmetric key algorithm” and “Effect of Security Increment to Symmetric Data Encryption through AES Methodology”. If any user emphasis on security then he can use our proposed algorithm. Our method is essentially block cipher method and it will take less time if the file size is large. The important thing of our proposed method is that it is almost impossible to break the encryption algorithm without knowing the exact key value. We propose that this encryption method can be applied for data encryption and decryption in any type of public application for sending confidential data.

 

 

 

 

 

 

 

 

 

[1] DriptoChatterjee, JoyshreeNath, SuvadeepDasgupta, AsokeNath “A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm” published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26.00 © 2011 IEEE [2] Wang and Ming Hu “Timing evaluation of the known cryptographic algorithms “2009 International Conference on Computational intelligence and security. [3] key cryptography using random key generator, A.Nath, S.Ghosh, M.A.Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas(USA) 12- 15 July,2010, Vol-2,P-239-244. [4] Data Hiding and Retrieval, A.Nath, S.Das, A.Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010. [5] Neal Koblitz “A Course in Number Theory and Cryptography” Second Edition Published by Springer [6] By Klaus Felten “An Algorithm for Symmetric Cryptography with a wide range of scalability” published by 2nd International Workshop on Embedded Systems, Internet Programming and Industial IT. [7] Majdi Al-qdah& Lin Yi Hui “Simple Encryption/Decryption Application” published in International