CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

An Asymmetric Key based Disk Encryption Scheme

by Dhiman Sarma
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 181 - Number 24
Year of Publication: 2018
Authors: Dhiman Sarma
10.5120/ijca2018918030

Dhiman Sarma . An Asymmetric Key based Disk Encryption Scheme. International Journal of Computer Applications. 181, 24 ( Oct 2018), 26-27. DOI=10.5120/ijca2018918030

@article{ 10.5120/ijca2018918030,
author = { Dhiman Sarma },
title = { An Asymmetric Key based Disk Encryption Scheme },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2018 },
volume = { 181 },
number = { 24 },
month = { Oct },
year = { 2018 },
issn = { 0975-8887 },
pages = { 26-27 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume181/number24/30035-2018918030/ },
doi = { 10.5120/ijca2018918030 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:09:55.103616+05:30
%A Dhiman Sarma
%T An Asymmetric Key based Disk Encryption Scheme
%J International Journal of Computer Applications
%@ 0975-8887
%V 181
%N 24
%P 26-27
%D 2018
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper prompts to understand an asymmetric key based improved disk encryption scheme designed in a tree structure, and analyses the security of encrypted disk data. Conventional disk encryption software use encryption cryptography based on symmetric key, and unable to protect the secret key due to design and implementation weaknesses. Hence, a disk encryption scheme is proposed here which uses asymmetric key cryptography to ensure stronger data security by utilizing the advantage of having two keys over one keyed symmetric key cryptography. The conceptual model includes entangling asymmetric key cryptography with tree structure to provide multiple encrypted layers embedded within the nodes from leaf to root.

References
  1. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68-73.
  2. N. Goots, B. Izotov, A. Moldovyan, and N. Moldovyan, Modern Cryptography: Protect Your Data with Fast Block Ciphers, ed 2003.
  3. Nedjah, N., and Mourelle, L.d.M. 2005. Embedded Cryptographic Hardware: Design & Security.
  4. Gupta, P.C. 2014. Cryptography and Network Security.
  5. National Institute of Standards and Technology (NIST). 2001. Federal Information Processing Standards Publication 197 Advanced Encryption Standard (AES).
  6. Mollin, R.A. 2007. An Introduction to Cryptography.
  7. Menezes, A.J., Vanstone, S.A., and Oorschot, P.C.v. 2001. Handbook of Applied Cryptography.
  8. Dent, A.W., and Mitchell, C.J. 2005. User’s Guide to Cryptography and Standards.
  9. Thorsteinson, P., and Ganesh, G.G.A. 2004. Net Security and Cryptography.
  10. Patel, D. 2008. Information Security: Theory and Practice.
  11. Stinson, D.R. 2005. Cryptography: Theory and Practice.
  12. Lipschutz, S. 2010. Data Structure with C.
  13. Rivest, R., Shamir, A., and Adleman, L. 1978. A Method for Obtaining Digital Signatures and Public Key Cryptosystem.
  14. Schmeh, K. 2006. Cryptography and Public Key Infrastructure on the Internet.
  15. Sarma, D., 2012. Security of Hard Disk Encryption. Masters Thesis. Identifiers: urn:nbn:se:kth:diva-98673(URN), Royal Institute of Technology.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Asymmetric Key Disk Security Disk Encryption Scheme Message authentication code