CFP last date
20 May 2024
Reseach Article

Article:An Approach to Security Using Rijndael Algorithm

by Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Number 5
Year of Publication: 2010
Authors: Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao
10.5120/1204-1726

Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao . Article:An Approach to Security Using Rijndael Algorithm. International Journal of Computer Applications. 8, 5 ( October 2010), 31-35. DOI=10.5120/1204-1726

@article{ 10.5120/1204-1726,
author = { Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao },
title = { Article:An Approach to Security Using Rijndael Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { October 2010 },
volume = { 8 },
number = { 5 },
month = { October },
year = { 2010 },
issn = { 0975-8887 },
pages = { 31-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume8/number5/1204-1726/ },
doi = { 10.5120/1204-1726 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:56:43.575329+05:30
%A Srinivasan Nagaraj
%A Kishore Bhamidipati
%A G Apparao
%T Article:An Approach to Security Using Rijndael Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 8
%N 5
%P 31-35
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The existing system consisted of files with literally no file security. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic and military matters. Often Information must be stored or transferred from one place to another without being exposed to an opponent or enemy. The main aim of presenting this paper is to encrypt a java file using Rijndael Algorithm. The first aspect that has to be considered in our paper is file security and the need for file security. Key management is also related to Confidentiality. This deals with generating, distributing and storing keys .File security must be implemented so as to eliminate the problems like unauthorized access, execution of commands illicitly, destructive behavior and confidentiality reaches.

References
  1. James, N., E. Barker, L. Bassham, W. Burr, M.Dworkin, J. Foti and E. Roback, 2000. Report on the development of the advanced encryption standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce.
  2. Srdjan, C., L. Buttyan and J.-P. Hubaux, 2003. Self-organized public-key management for mobile ad hoc Networks. IEEE Trans. Mobile Computing: pp: 52-64.
  3. Philip, R., M. Bellare and J. Black OCB, 2003. A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Information System and Security, pp: 365-403.
  4. Mary, R.T., A. Essiari and S. Mudumbai, 2003. Certificate-based authorization policy in a PKI environment. ACM Trans. Information System and Security, pp:566-88.
  5. D. Alessandri, C. Cachin, M. Dacier, et al, “Towards a Taxonomy of Tntrusion Detection Systems and Attacks. MAFTIA deliverable D3”. 2001
  6. Custom Attack Simulation Language, Secure Networks. 1998.
  7. L.Me.Gassata, “A genetic algorithm as an alternative tools for security audit trails analysis”, RAID'98, 1998.
  8. S.Kumar, Classification and Detection of Computer Instructions. PhD thesis, Purdue University, 1995.
Index Terms

Computer Science
Information Sciences

Keywords

Bytes Cipher state finite field Addition multiplication