Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Data Security using Compression and Cryptography Techniques

Print
PDF
International Journal of Computer Applications
© 2015 by IJCA Journal
Volume 117 - Number 14
Year of Publication: 2015
Authors:
Ruchita Sharma
Swarnalata Bollavarapu
10.5120/20621-3342

Ruchita Sharma and Swarnalata Bollavarapu. Article: Data Security using Compression and Cryptography Techniques. International Journal of Computer Applications 117(14):15-18, May 2015. Full text available. BibTeX

@article{key:article,
	author = {Ruchita Sharma and Swarnalata Bollavarapu},
	title = {Article: Data Security using Compression and Cryptography Techniques},
	journal = {International Journal of Computer Applications},
	year = {2015},
	volume = {117},
	number = {14},
	pages = {15-18},
	month = {May},
	note = {Full text available}
}

Abstract

Data is any type of stored digital information. Security is about the protection of assets. Data security refers to protective digital privacy measures that are applied to prevent unauthorized access to computers, databases and websites. Cryptography is evergreen and developments. Cryptography protects users by providing functionality for the encryption of data and authentication of other users. Compression is the process of reducing the number of bits or bytes needed to represent a given set of data. It allows saving more data. The project aims to implement various cryptography algorithm for data security. The data will be first compressed using compression techniques and then encryption techniques will applied and then comparative analysis will be carried out for different combinations of compression and encryption techniques. If encryption and compression are done at the same time then it takes less processing time and more speed.

References

  • T. SubhamastanRao, M. Soujanya, T. Hemalatha, T. Revathi, "Simultaneous data compression and encryption" (IJCSIT) International Journal of Computer Science and Information Technologies, ISSN 0975-9646, Volume-2(5), 2011.
  • Senthil Shanmugasundaram, Robert Lourdusamy "A Comparative Study Of Text Compression Algorithms" International Journal of Wisdom Based Computing, Vol. 1 (3), December 2011.
  • Harshraj N. Shinde, Aniruddha S. Raut, Shubham. Vidhale, Rohit V. Sawant, Vijay A. Kotkar "A Review of Various Encryption Techniques" International Journal of Engineering And Computer Science ISSN: 2319-7242, Volume 3, Issue 9, September 2014.
  • Ms. Ayushi Aggarwal, Anju "Enciphering Data for Larger Files" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 3, Issue 5, May 2013.
  • Haroon Altarawneh, Mohammad Altarawneh "Data Compression Techniques on Text Files: A Comparison Study" International Journal of Computer Applications, (0975 – 8887), Volume 26– No. 5, July 2011.
  • MohiniChaudhari, Dr. KanakSaxena "Fast and Secure Data Transmission using Symmetric Encryption and Lossless Compression" International Journal of Computer Science and Mobile Computing, ISSN 2320–088X, Vol. 2, Issue. 2, February 2013.
  • "Data Compression" by Behrouz Forouzan.
  • "Huffman Compression" by webopedia.
  • Yu-Yun Chang "Tutorial: Arithmetic Coding".
  • T. D. B Weerasinghe "Analysis of a Modified RC4 Algorithm" International Journal of Computer Applications, ISSN0975 – 8887, Volume 51– No. 22, August 2012.
  • AL. Jeeva, Dr. V. Palanisamy, K. Kanagaram "Comparative Analysis of Performance Efficiency and Security Measures of Some Encryption Algorithms" International Journal of Engineering Research and Applications (IJERA), ISSN: 2277 128X, Volume 3, Issue 6, June 2013.
  • Mr. Vinod Saroha, Suman Mor, Anurag Dagar "Enhancing Security of Caesar Cipher by Double Columnar Transposition Method" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN: 2277 128X, Volume 2, Issue 10, 2012.
  • Sombir Singh, Sunil K. Maakar, Dr. Sudesh Kumar "Enhancing the Security of DES Algorithm Using Transposition Cryptography Techniques" International Journal of Advanced Research in Computer Science and Software Engineering, ISSN 2249-6343, Volume 2, Issue 1, Jan 19 2012.