· 8 years ago · Jan 13, 2018, 03:44 AM
1LIAO, EDWARD HAROLD – TECHICAL WRITING
2
31. A Study of Encryption Algorithms AES, DES and RSA for Security
4
5In recent years network security has become an important issue. Encryption has come up as a solution, and plays an important role in information security system. Many techniques are needed to protect the shared data. The present work focus on cryptography to secure the data while transmitting in the network. Firstly the data which is to be transmitted from sender to receiver in the network must be encrypted using the encryption algorithm in cryptography. Secondly, by using decryption technique the receiver can view the original data. In this paper we implemented three encrypt techniques like AES, DES and RSA algorithms and compared their performance of encrypt techniques based on the analysis of its stimulated time at the time of encryption and decryption. Experiments results are given to analyses the effectiveness of each algorithm.
6
7It is related in our topic because it covers the security system using the encryption algorithm specially those AES, DES, RSA.
8
9Dr. Prerna Mahajan & Abhishek Sachdeva,†A Study of Encryption Algorithms AES, DES and RSA for Security “, Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013
10
11
12
132. Data Encryption and Decryption Using RSA Algorithm in a Network Environment
14
15One of the principal challenges of resource sharing on data communication network is its security. This is premised on the fact that once there is connectivity between computers sharing some resources, the issue of data security becomes critical. This paper presents a design of data encryption and decryption in a network environment using RSA algorithm with a specific message block size. The algorithm allows a message sender to generate a public keys to encrypt the message and the receiver is sent a generated private key using a secured database. An incorrect private key will still decrypt the encrypted message but to a form different from the original message.
16
17It is related in our topic because it covers the security system using the encryption algorithm specially RSA Algorithm it both tackles encryption and decryption.
18
19Nentawe Y. Goshwe,â€Data Encryption and Decryption Using RSA Algorithm in a Network Environment†IJCSNS International Journal of Computer Science and Network Security, VOL.13 No.7, July 2013
20
21
22
233. Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodology
24
25Commonly in encryption or decryption process some of the characters are inter changed by using some encryption and decryption algorithms (like DES, IDEA) with key. But in Bit Shifting and Stuffing (BSS) system to represent a printable character it needs only seven bits as per its ASCII value. In computer system to represent a printable character it requires one byte, i.e. 8 bits. So a printable character occupies 7 bits and the last bit value is 0 which is not useful for the character. In BSS method we are stuffing a new bit in the place of unused bit which is shifting from another printable character. So in this BSS methodology after encryption, for every eight bytes of plain text it will generate seven bytes cipher text and in decryption, for every seven bytes of cipher text it will reproduce eight bytes of plain text.
26
27It is related in our topic because it covers the security system using the encryption algorithm on characters ASCII value also checks bit shifting and stuffing or BSS.
28
29Ravi Kumar,â€Data Encryption and Decryption process Using Bit Shifting and Stuffing (BSS) Methodologyâ€, International Journal on Computer Science and Engineering (IJCSE) Vol. 3 No. 7 July 2011
30
31
32
334. An Analysis of Encryption and Decryption Application by using One Time Pad Algorithm
34
35Security of data in a computer is needed to protect critical data and information from other parties. One way to protect data is to apply the science of cryptography to perform data encryption. There is wide variety of algorithms used for encryption of data, this study used a one-time pad algorithm for encrypting data. Algorithm One Time Pad uses the same key in the encryption process and a decryption of the data. An encrypted data will be transformed into cipher text so that the only person who has the key can open that data. Therefore, analysis will be done for an application that implements a onetime pad algorithm for encrypting data. The application that implements the one time pad algorithm can help users to store data securely.
36
37It is related in our topic because it covers the security system using the encryption algorithm by using One Time Pad Algorithm that uses same key in the encryption process and also as the decryption process
38
39Bambang Eka Purnama , “An Analysis of Encryption and Decryption Application by using One Time Pad Algorithmâ€, (IJACSA) International Journal of Advanced Computer Science and Applications, Vol. 6, No. 9, 2015
40
41
42
435. Analysis and Review of Encryption and Decryption for Secure Communication
44
45The Process of Encryption and Decryption is performed by using Symmetric key cryptography and public key cryptography for Secure Communication. In this paper, we studied that how the process of Encryption and Decryption is perform in case of Symmetric key and public key cryptography using AES and DES algorithms and modified RSA algorithm.
46
47It is related in our topic because it covers analysis part of the Encryption and Decryption also focusing on Symmetric key and public key using AES and DES algorithm.
48
49Vikas Agrawal , “Analysis and Review of Encryption and Decryption for Secure Communication†, International Journal of Advanced Computer Science and Applications ISSN (Online): 2347-3878 Volume 2 Issue 2, February 2014
50
51
52
536. Research and Implementation of File Encryption and Decryption
54
55Analyzed and studied on public key and private key cryptography, studied and compared the RSA and DES algorithm, achieved a basic process of file encryption and decryption, provided effectively protection to document security.
56
57It is related in our topic because it covers the implementation of private and public keys in a document or any file type also it composes of basic process for it.
58
59Lu Chang and Xu GuangMing, “Research and Implementation of File Encryption and Decryption†Republic Experiment Center, Computer Center, ZheJiang Ocean University, Zhou Shan, China
60
61
62
637. A research Paper on Cryptography Encryption and Compression Techniques
64
65Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, personal databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. Cryptography is a popular ways of sending vital information in a secret way. There are many cryptographic techniques available and among them AES is one of the most powerful techniques. The scenario of present day of information security system includes confidentiality, authenticity, integrity, no repudiation. The security of communication is a crucial issue on World Wide Web. It is about confidentiality, integrity, authentication during access or editing of confidential internal documents.
66
67It is related in our topic because it covers the techniques of encryption and decryption also it contains the most powerful technique.
68
69Sarita Kumari, “A research Paper on Cryptography Encryption and Compression Techniquesâ€, International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume 6 Issue 4 April 2017, Page No. 20915-20919 Index Copernicus value 2015
70
71
72
738. An Efficient Symmetric Cipher Algorithm for Data Encryption
74
75This paper presents an efficient algorithm for a symmetric cipher named,YC1 that employs key spaces of varying lengths to encrypt and decrypt a plain text. Information Technology plays a very pivotal role in our businesses such as accomplishing complex
76
77 It helps us to get more key techniques without limiting length of the file.
78
79Kobina Panford, Joseph & Kandabongee Yeng, “An Efficient Symmetric Cipher Algorithm for Data Encryptionâ€, International Research Journal of Engineering and Technology. 2016, 1713 - 1732.)
80
81
82
839. A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithms
84
85Encryption is the process of transforming plaintext into the ciphertext where plaintext is the input to the encryption process and ciphertext is the output of the encryption process. Decryption is the process of transforming ciphertext into the plaintext where ciphertext is the input to the decryption process and plaintext is the output of the decryption process. There are various encryption algorithms exist classified as symmetric and asymmetric encryption algorithms. Here, I present an algorithm for data encryption and decryption which is based on ASCII values of characters in the plaintext. This algorithm is used to encrypt data by using ASCII values of the data to be encrypted. The secret used will be modifying o another string and that string is used as a key to encrypt or decrypt the data. So, it can be said that it is a kind of symmetric encryption algorithm because it uses same key for encryption and decryption but by slightly modifying it. This algorithm operates when the length of input and the length of key are same.
86
87It helps us to get information about the encryption algorithm also symmetric data and ASCII values to be encrypted.
88
89Akanksha Mathur,â€A Research paper: An ASCII value based data encryption algorithm and its comparison with other symmetric data encryption algorithmsâ€, Computer Sc. Engg. JIET Group of Institutions ISSN : 0975-3397 Vol. 4 No. 09 Sep 2012
90
91
92
9310. Research on a Normal File Encryption and Decryption
94
95
96
97The advent of information technology (internet) some decades ago has brought about many changes in the way information is being disseminated and exchanged between people, between nations and as well in the whole world. Long ago, the issue of information "theft" has evolved worldwide and concerns about how to remediate it are getting the attention of experts in the area of Information Security. Today, with the current proliferation of some newly invented methods in cryptanalysis it is obvious that information security is the panacea. In this paper, our strategy used is to apply the encryption methods of the AES and MD5 following some steps in the encryption process in order to produce an outcome of file that will as a result be hashed and strongly decrypted through the robust software for file storing. The most important aspect of our application is the intervention of those elements in the process of the encryption to produce an interwoven hashed result which can escape the tricks of malicious operations by eavesdroppers. Results of the encryption have shown that the software can provide a large scale of file encryption since binary, text and any other file type can be encrypted successfully.
98
99It helps us using the binary technique in cryptanalysis information.
100
101Noor Yasin, Abdul Ghafoor Abbasi, “Research on a Normal File Encryption and Decryptionâ€, An Architecture for Source CodeProtection, Lecture Notes on Software Engineering, vol. 4, pp. 153, 2016, ISSN 23013559.
102
103
104
10511. Research and implementation of RSA algorithm for encryption and decryption
106
107
108
109Cryptographic technique is one of the principal means to protect information security. Not only has it to ensure the information confidential, but also provides digital signature, authentication, secret sub-storage, system security and other functions. Therefore, the encryption and decryption solution can ensure the confidentiality of the information, as well as the integrity of information and certainty, to prevent information from tampering, forgery and counterfeiting. Encryption and decryption algorithm's security depends on the algorithm while the internal structure of the rigor of mathematics, it also depends on the key confidentiality. Key in the encryption algorithm has a pivotal position, once the key was leaked, it means that anyone can be in the encryption system to encrypt and decrypt information; it means the encryption algorithm is useless. Therefore, what kind of data you choose to be a key, how to distribute the private key, and how to save both data transmission keys are very important issues in the encryption and decryption algorithm. This paper proposed an implementation of a complete and practical RSA encrypt/decrypt solution based on the study of RSA public key algorithm. In addition, the encrypt procedure and code implementation is provided in details.
110
111It helps us to implement the algorithm that we will use in this research its using RSA public key algorithm.
112
113V. Shyam, D. Sujatha, "FPGA implementation of an efficient and highly secure cryptoprocessor over Barreto-Naehrig curves", Green Computing Communication and Electrical Engineering (ICGCCEE) 2014 International Conference on, pp. 1-5, 2014.
114
115
116
11712. File Encryption and Decryption System Based on RSA Algorithm
118
119This paper describes a complete set of practical solution to file encryption based on RSA algorithm. With analysis of the present situation of the application of RSA algorithm, we find the feasibility of using it for file encryption. On basis of the conventional RSA algorithm, we use C + + Class Library to develop RSA encryption algorithm Class Library, and realize Groupware encapsulation with 32-bit windows platform. With reference of this Groupware on Net platform, you can realize the window application of encryption operation on any files with RSA algorithm.
120
121It covers File Encryption and Decryption on RSA more specifically on the language we will use.
122
123Wang Suli, “File Encryption and Decryption System Based on RSA Algorithmâ€, 2011 797-800. 10.1109/ICCIS.2011.150
124
125
126
12713. An ASCII value based text data encryption System
128
129Encryption is a process of generating secret text from the input text using a secret key and a encryption algorithm. Input text is referred to as plain text and the secret text generated is known as cipher text. Encryption algorithms are mainly divided into two categories which are symmetric key encryption algorithm and asymmetric key encryption algorithm. In Symmetric key encryption algorithm the same key is used by both sender and receiver but in asymmetric key algorithm sender and receiver both uses the different keys. In this paper, we present a technique based on symmetric key encryption algorithm which uses ASCII vales of input text to encrypt the data. Text data encryption techniques are very useful in data communication where one user want to send some secret messages to other users.
130
131This will help us to use symmetric key algorithm and generated text.
132
133Udepal Singh, “An ASCII value based text data encryption Systemâ€, International Journal of Scientific and Research Publications, Volume 3, Issue 11, November 2013 1 ISSN 2250-3153
134
135
136
137
138
13914. Multiphase Encryption: A New Concept in Modern Cryptography
140
141Data Security is a challenging issue of data communications today that touches many areas including secure communication channel, strong data encryption technique and trusted third party to maintain the database. The rapid development in information technology, the secure transmission of confidential data herewith gets a great deal of attention. The conventional methods of encryption can only maintain the data security. The information could be accessed by the unauthorized user for malicious purpose. Therefore, it is necessary to apply effective encryption/ decryption methods to enhance data security. The multiple encryption techniques of present time cannot provide sufficient security. In this research paper, the new encryption technique named as ―Multiphase Encryption is proposed. In this encryption technique, original data is encrypted many times with different strong encryption algorithms at each phase. This encryption technique enhances the complexity in encryption algorithm at large extent
142
143It helps us to use more algorithm also enhances the complexity of the encryption method.
144
145Himanshu Gupta and Vinod Kumar Sharma, “A New Concept in Modern Cryptographyâ€, International Journal of Computer Theory and Engineering, Vol. 5, No. 4, August 2013,
146
147
148
14915. Encryption and Decryption Techniques: A Review
150
151Image encryption is the process of hiding the important data from the unauthorized users. In present time, the security of multimedia has become necessary. One of the methods to protect data is encryption. In this paper, different techniques for the encryption and decryption of digital colored image have been reviewed.
152
153It covers a brief understanding about Encryption and Decryption.
154
155Swati Kumari, “Encryption and Decryption Techniques†Department of Electrical And Electronics, NITTTR Bhopal, M.P., India, Volume: 03 Issue: 09 | Sep-2016
156
157
158
15916. ENCRYPTING AND DECRYPTING IMAGE USING COMPUTER VISUALIZATION TECHNIQUES
160
161Today’s networks are essential to our modern world, and a thorough understanding of how they act is vital to their efficient operation. Fortunately, data on networks is plentiful; by visualizing this network data, it is possible to greatly improve our understanding and also should provide the security for network data. The motivation of this paper is on visualizing the network data associated with a network image or object that will be send in the format of image at the sender and at the receiver ends that image or object will be encrypted in the form of rich text format that will be decrypted form at the receiver end. The technique sending data in image format will provide a greatest security for World Wide Web data transmission on network. We can also visualize that what data is behind on image and rendering of the image. Finally, this proposal is trying to encrypt and decrypt image visualization using computer visualization techniques.
162
163It covers encrypting and decrypting image using computer visualization this will help us analyze more about encryption in any format.
164
165Bimal Kumar,“ENCRYPTING AND DECRYPTING IMAGE USING COMPUTER VISUALIZATION TECHNIQUESâ€, School of Information Technology and Engineering, VIT University, Vellore, VOL. 9, NO. 5, MAY 2014 ISSN 1819-6608)
166
167
168
16917. Advanced ASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique ID
170
171 Cryptography is only thanks to succeed information security. This is often done by changing the info into cipher text. The existing manner of doing this was victimization Armstrong range. Since there square measure few Armstrong numbers so a crypt-analyst will easily realize the key. During this paper, we tend to square measure proposing a brand new algorithm for cryptography technique, UPMM rule, which is applied on computer code worth of knowledge. Computer code values square measure encrypted using a key involving word numbers and distinctive alphanumeric id that is additionally reborn into computer code worth to provide authentication over the network. This paper offers a technique to send information over the network in set of 3 keys. Normally a crypt-analyst will simply determine the key but in this approach a combination of word range and matrix multiplication is employed for encrypting the info. within the same manner decryption will be done at receiver's facet by victimization inverse of encoding matrix.
172
173This will help us on other variety of cryptography because it will tackle matrix operation, palindrome and unique ID.
174
175Sanket A. Ubhad,â€Advanced ASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique ID“, IJCSMC, Vol. 4, Issue. 8, August 2015, pg.66 – 71
176
177
178
17918. Review on Image Encryption and Decryption using AES Algorithm
180
181An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in this paper. Due to increasing use of image in various fields, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 256 bit. The numbers of round for key size of 256 bits is 14. As secret key increases the security as well as complexity of the cryptography algorithms. This paper presents a algorithm in which the image is an input to AES Encryption to get the encrypted image and the encrypted image is the input to AES Decryption to get the original image.
182
183This will help us to know more about cryptography in other file type like images.
184
185Sneha Ghoradkar, “Review on Image Encryption and Decryption using AES Algorithmâ€, Department of E&TC,D.Y. Patil College of Engg, Akurdi,Pune, International Journal of Computer Applications (0975 – 8887) National Conference on Emerging Trends in Advanced Communication Technologies (NCETACT-2015)
186
187
188
18919. IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLAB
190
191With the progress in data exchange by electronic system, the need of information security has become a necessity. Due to growth of multimedia application, security becomes an important issue of communication and storage of images. This paper is about encryption and decryption of images using a secret-key block cipher called 64-bits Blowfish designed to increase security and to improve performance. This algorithm will be used as a variable key size up to 448 bits. It employs Feistel network which iterates simple function 16 times. The blowfish algorithm is safe against unauthorized attack and runs faster than the popular existing algorithms. The proposed algorithm is designed and realized using MATLAB.
192
193This will help us to know more on different methods of cryptography blowfish will be a good example of it.
194
195Pia Singh,†IMAGE ENCRYPTION AND DECRYPTION USING BLOWFISH ALGORITHM IN MATLABâ€, International Journal of Scientific & Engineering Research, Volume 4, Issue 7, July-2013 150 ISSN 2229-5518,
196
197
198
19920. A New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithm
200
201Information security is a challenging issue in today’s technological world. There is a demand for a stronger encryption which is very hard to crack. Earlier many researchers have proposed various encryption algorithms such as AES, DES, Triple DES, RSA, Blowfish etc. Some of them are most popular in achieving data security at a great extent like AES and Blowfish. But, as security level is increased, the time and complexity of algorithm is also increased. This is the major cause of decreasing the speed and efficiency of the encryption system. In this paper we have proposed a new encryption algorithm “Byte – Rotation Encryption Algorithm (BREA)†with “Parallel Encryption Model†which enhances the security as well as speed of the encryption scheme. The BREA is applied on different blocks of plaintext and executes in parallel manner through multithreading concept of single processor system. This paper is an attempt to invent a new encryption model which is secure and very fast.
202
203This will cover the current approach in encryption also new knowledge to use.
204
205Sunita Bhati,†New Approach towards Encryption Schemes: Byte – Rotation Encryption Algorithmâ€,Proceedings of the World Congress on Engineering and Computer Science 2012 Vol II WCECS 2012, October 24-26, 2012, San Francisco, USA