CFP last date
20 May 2024
Reseach Article

Data Encryption Techniques for USB

by Shivanku Mahna, Sravan Ch
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 104 - Number 7
Year of Publication: 2014
Authors: Shivanku Mahna, Sravan Ch
10.5120/18213-9162

Shivanku Mahna, Sravan Ch . Data Encryption Techniques for USB. International Journal of Computer Applications. 104, 7 ( October 2014), 14-17. DOI=10.5120/18213-9162

@article{ 10.5120/18213-9162,
author = { Shivanku Mahna, Sravan Ch },
title = { Data Encryption Techniques for USB },
journal = { International Journal of Computer Applications },
issue_date = { October 2014 },
volume = { 104 },
number = { 7 },
month = { October },
year = { 2014 },
issn = { 0975-8887 },
pages = { 14-17 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume104/number7/18213-9162/ },
doi = { 10.5120/18213-9162 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:35:31.290834+05:30
%A Shivanku Mahna
%A Sravan Ch
%T Data Encryption Techniques for USB
%J International Journal of Computer Applications
%@ 0975-8887
%V 104
%N 7
%P 14-17
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast data transfer speeds, about as large as 5Gbps. Host controlled USB is the fastest way of transferring material to an external device available today. It is easy, convenient and fast to access these USB devices as compared to other external devices such as CD, DVD, Floppy drive etc. USB is easy to use as they're plug and play devices and do not require any additional installation. The other big advantage of USB is that the data transmission is done at the same speeds, irrespective of the size of the data being copied. Thus USB and USB devices have become most popular interface standard for hardware connection. USB devices however lacks in security as any user can access the USB device and the data associated with it, leaving the data at huge potential risk. Thus to make the system more reliable and fast, we propose methods namely, Mutual Encryption and Key Match in order to provide security to the sensitive information on the device as well as to make the transactions or communication done using USB more encrypted.

References
  1. Gustavus J. Simmons,1979. "Symmetric and Asymmetric Encryption" in Computing Surveys, Vol. 11, No. 4, December 1979 edition.
  2. E. V. Vetvitskii, A. V. Plotnikov, D. A. Prilutskii, S. V. Selishchev, "Use of the USB Universal Serial Bus in computer systems", ,Springer online journal, July–August edition, 2000, Volume 34, Issue 4, pp 167-172
  3. W. Diffie and M. Hellman,1976. "New directions in cryptography", IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654,1976.
  4. Chul-Joon Choi, Zeen Kim and Kwangjo Kim "Schnorr Signature Scheme with Restricted Signing Capability and Its Application".
  5. Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar Reddy and Dr B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity", International Journal of Computer Science and Network Security, VOL. 8 No. 3, March 2008.
  6. T. A. El Gamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
  7. Lu Zhu, Sheng Yu and Xing Zhang, 2008. "Improvement Upon Mutual Password Authentication Scheme", 978-0-7695-3560-9/08 IEEE DOI 10. 1109/ISBIM, 2008.
Index Terms

Computer Science
Information Sciences

Keywords

Authentication USB Cryptography