CFP last date
20 March 2024
Reseach Article

Data Security using Compression and Cryptography Techniques

by Ruchita Sharma, Swarnalata Bollavarapu
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 117 - Number 14
Year of Publication: 2015
Authors: Ruchita Sharma, Swarnalata Bollavarapu
10.5120/20621-3342

Ruchita Sharma, Swarnalata Bollavarapu . Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications. 117, 14 ( May 2015), 15-18. DOI=10.5120/20621-3342

@article{ 10.5120/20621-3342,
author = { Ruchita Sharma, Swarnalata Bollavarapu },
title = { Data Security using Compression and Cryptography Techniques },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 117 },
number = { 14 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume117/number14/20621-3342/ },
doi = { 10.5120/20621-3342 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:59:23.003907+05:30
%A Ruchita Sharma
%A Swarnalata Bollavarapu
%T Data Security using Compression and Cryptography Techniques
%J International Journal of Computer Applications
%@ 0975-8887
%V 117
%N 14
%P 15-18
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. The project aims to implement various cryptography algorithm for data security. The data will be first compressed using compression techniques and then encryption techniques will applied and then comparative analysis will be carried out for different combinations of compression and encryption techniques. If encryption and compression are done at the same time then it takes less processing time and more speed.

References
  1. T. SubhamastanRao, M. Soujanya, T. Hemalatha, T. Revathi, "Simultaneous data compression and encryption" (IJCSIT) International Journal of Computer Science and Information Technologies, ISSN 0975-9646, Volume-2(5), 2011.
  2. Senthil Shanmugasundaram, Robert Lourdusamy "A Comparative Study Of Text Compression Algorithms" International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011.
  3. Harshraj N. Shinde, Aniruddha S. Raut, Shubham. Vidhale, Rohit V. Sawant, Vijay A. Kotkar "A Review of Various Encryption Techniques" International Journal of Engineering And Computer Science ISSN: 2319-7242, Volume 3, Issue 9, September 2014.
  4. Ms. Ayushi Aggarwal, Anju "Enciphering Data for Larger Files" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 3, Issue 5, May 2013.
  5. Haroon Altarawneh, Mohammad Altarawneh "Data Compression Techniques on Text Files: A Comparison Study" International Journal of Computer Applications, (0975 – 8887), Volume 26– No. 5, July 2011.
  6. MohiniChaudhari, Dr. KanakSaxena "Fast and Secure Data Transmission using Symmetric Encryption and Lossless Compression" International Journal of Computer Science and Mobile Computing, ISSN 2320–088X, Vol. 2, Issue. 2, February 2013.
  7. "Data Compression" by Behrouz Forouzan.
  8. "Huffman Compression" by webopedia.
  9. Yu-Yun Chang "Tutorial: Arithmetic Coding".
  10. T. D. B Weerasinghe "Analysis of a Modified RC4 Algorithm" International Journal of Computer Applications, ISSN0975 – 8887, Volume 51– No. 22, August 2012.
  11. AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram "Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms" International Journal of Engineering Research and Applications (IJERA), ISSN: 2277 128X, Volume 3, Issue 6, June 2013.
  12. Mr. Vinod Saroha, Suman Mor, Anurag Dagar "Enhancing Security of Caesar Cipher by Double Columnar Transposition Method" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10, 2012.
  13. Sombir Singh, Sunil K. Maakar, Dr. Sudesh Kumar "Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN 2249-6343, Volume 2, Issue 1, Jan 19 2012.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Compression Run length Huffman LZW Arithmetic coding RC4 Caesar Cipher DES.