Journal Indexing & Metrics

Total Downloads: 1
Total Views: 282
Content List:
Authors Affiliation Abstract Keywords References
Cite
Share

Using Hybrid Approach Secure Data Transmission over Medium

Ajeet Kumar Vishwakarma, Ruchir Saxena

First Published December 23,2016

Authors
  1. Ajeet Kumar Vishwakarma
  2. Ruchir Saxena
Affiliation
  • Assistant Professor Institute of Management & Computer Science NIMS University, Jaipur
  • Head of Department Institute of Management & Computer Science NIMS University Jaipur
Abstract
In this era’s of the privacy and security concerns prevailing in the environment, users are more likely to require privacy; that is traceable. There should be an authentication mechanism for the client using services needed in various real-world applications. The security of computer is related to the whole world and individual. Secure data transmission is the technique of achieving security used by decoding or encoding message to make them non-readable to encrypted so that secure data or information transmits over the internet work. In this paper, we are introducing an approach based on multiple public keys and ‘n’ prime number. Hybrid algorithm is mostly used in implementation of public key and symmetric key cryptography. This paper uses public key cryptography with two different keys and DES. In public key Cryptography, one key is used in encryption data and other key used for decryption of keys. Second key does not decrypt the data to find out readable form. Even if it is useful algorithm it is vulnerable to other person.In this research paper we are trying to develop new approach by using prime number and multiple public keys and triple DES.
Keywords

Asymmetric key cryptography, ‘n’ prime number, Cryptography,, RSA algorithm, Triple DES.

References
  1. A.Shukla, V.Kapoor, IET DAVV University, Indore, “Data Encryption and Decryption using Modified RSA Cryptography Based on Multiple Public Keys and ‘n’ Prime Number” international journal of engineering sciences &research technology 2014.
  2. Wuling Ren, Zhiqian Miao, College of Computer and Information Engineering, Zhejiang Gongshang University, “A Hybrid Encryption Algorithm Based on DES and RSA” in Bluetooth Communication Second International Conference on Modeling, Simulation and Visualization Methods2010.
  3. Rangarajan A. Vasudevan,Sugata Sanyal” Jigsaw-based Secure Data Transfer over Computer Networks
  4. Amare Anagaw Ayele ,Dr. Vuda Sreenivasarao “A Modified RSA Encryption Technique Based on Multiple public keys”International Journal of Innovative Research in Computer and Communication Engineering Vol. 1, Issue 4, June 2013.
  5. Avinash kak, Purdue University LectureNotes on “Computer and Network Security”June20, 2013
  6. en.wikipedia.org/wiki/Random_number_generation
  7. B.Persis Urbana Ivy, Purshotam Mandiwa. Mukesh Kumar “A modified RSA cryptosystem based on ‘n’ prime numbers”International Journal of Engineering and Computer Science ISSN: 2319-7242 Volume1 Issue 2 Nov 2012 Page No. 63-66
  8. en.wikipedia.org/wiki/Euclidean algorithm
  9. Maheswari Losetti, Kanaka Raju Gariga “An Enhanced RSA Algorithm for Low Computational Devices” International Journal of AdvancedResearch and Innovations Vol.1, Issue .2, pp 114-118.
  10. Rajan.S.Jamgekar, Geeta Shantanu Joshi “File Encryption and Decryption using secure RSA” International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013.
  11. XinZhou, Xiaofei Tang,”Reasearch and Implementation of RSA algorithm for Encryption and Decryption “IEEE 6th International Forum on strategic Technology pp 1118-1121
  12. XiaowenKang; Inst. of Electron. Technol., PLA Inf. Eng. Univ., Beijing; Yingjie Yang; Xin Du,”ADisaster-Oriented Strong Secure File System”Innovative ComputingInformation and Control, 2008.ICICIC ’08. Pages 557.
  13. AtulKahate, Cryptography and Network Security, Tata McGraw-Hill Publication Company Limited page no. 32.
Article Menu
Total Downloads: 1
Total Views: 786
Cite
Share
1