CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

Performance Analysis of Multiple Keys used for Data Security

by Hitesh Mittal, Ajay Kakkar
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Number 14
Year of Publication: 2014
Authors: Hitesh Mittal, Ajay Kakkar
10.5120/16664-6654

Hitesh Mittal, Ajay Kakkar . Performance Analysis of Multiple Keys used for Data Security. International Journal of Computer Applications. 95, 14 ( June 2014), 29-32. DOI=10.5120/16664-6654

@article{ 10.5120/16664-6654,
author = { Hitesh Mittal, Ajay Kakkar },
title = { Performance Analysis of Multiple Keys used for Data Security },
journal = { International Journal of Computer Applications },
issue_date = { June 2014 },
volume = { 95 },
number = { 14 },
month = { June },
year = { 2014 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume95/number14/16664-6654/ },
doi = { 10.5120/16664-6654 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:20:34.400343+05:30
%A Hitesh Mittal
%A Ajay Kakkar
%T Performance Analysis of Multiple Keys used for Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 95
%N 14
%P 29-32
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms almost make it impossible for a hacker to get access of node which is being protected by multiple keys. Keeping in view the importance of dynamic keys for secure data transmission this work focused on the use of dynamic keys for data security.

References
  1. A. J. Elbirt, W. Yip, B. Chetwynd and C. Paar, "An FPGA Based Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 9, No. 4, pp. 545-557, 2001.
  2. Hua Li and J. Li, "A New Compact Dual-Core Architecture for AES Encryption and Decryption", IEEE Canadian Journal of Electrical and Computer Engineering, Vol. 33, No. 3, pp. 209-213, 2008.
  3. Jason H. Li, B. Bhattacharjee, M. Yu and Levy, "A Scalable Key Management and Clustering Scheme for Wireless Adhoc and Sensor Networks", Journal of Future Generation Computer Systems, Elsevier Science Publishers, Vol. 24, pp. 860-869, 2008.
  4. E. Bertino, N. Shang and S. S. Wagstaff, "An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting", IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 2, pp. 65-70, 2008.
  5. H. Chien, "Efficient Time-Bound Hierarchical Key Assignment Scheme", IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10, pp. 1301-1304, 2004.
  6. H. C. Williams, "A Modification of the RSA Public-Key Encryption Procedure", IEEE Transactions on Information Theory, Vol. 26, No. 6, pp. 726-729, 1980.
  7. M. E. Hellman, "An Extension of the Shannon Theory Approach to Cryptography", IEEE Transactions on Information Theory, Vol. 23, No. 3, pp. 289-294, 1977.
  8. T. Elgamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
  9. M. Y. Wang, C. P. Su, C. L. Horng, C. W. Wu and C. T. Huang, "Single and Multi-core Configurable AES Architectures for Flexible Security", IEEE Transactions on Very Large Scale Integration Systems, Vol. 18, No. 4, pp. 541-552, 2010.
  10. K. Bhatele, A. Sinhal and M. Pathak, "A Novel Approach to the Design of a New Hybrid Security Protocol Architecture", IEEE International Conference on Advanced Communication Control and Computing Technologies, pp. 429-433, 2012.
  11. R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM Magazine, Vol. 21, No. 2, pp. 120-126, 1978.
Index Terms

Computer Science
Information Sciences

Keywords

Encryption Plain Text Cipher Text Key Decryption Security