CFP last date
22 April 2024
Reseach Article

Asymmetric Key based Secure Data Transfer Technique

Published on March 2013 by Anupam Mondal, Joy Samadder, Ivy Mondal, Neha Majumder, Sudipta Sahana
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 3
March 2013
Authors: Anupam Mondal, Joy Samadder, Ivy Mondal, Neha Majumder, Sudipta Sahana
5df45597-c174-4833-bab0-7afc08897336

Anupam Mondal, Joy Samadder, Ivy Mondal, Neha Majumder, Sudipta Sahana . Asymmetric Key based Secure Data Transfer Technique. International Conference on Computing, Communication and Sensor Network. CCSN2012, 3 (March 2013), 22-24.

@article{
author = { Anupam Mondal, Joy Samadder, Ivy Mondal, Neha Majumder, Sudipta Sahana },
title = { Asymmetric Key based Secure Data Transfer Technique },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 3 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 22-24 },
numpages = 3,
url = { /specialissues/ccsn2012/number3/10864-1028/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Anupam Mondal
%A Joy Samadder
%A Ivy Mondal
%A Neha Majumder
%A Sudipta Sahana
%T Asymmetric Key based Secure Data Transfer Technique
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 3
%P 22-24
%D 2013
%I International Journal of Computer Applications
Abstract

Data security is one of the important issues in network communication. Secure data transfer become more essential and important, as security is a major concern in the field of message transformation over internet. Data, that is likely to be kept hidden from all people except the authorized users, could not be sent as plain text. Each data has its own features; therefore different techniques are used to protect data from unauthorized access. In recent years, Cryptography and Steganography are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. Cryptography is the technology that involves converting a message text into an unreadable cipher. Steganography is an art of embedding information in a cover image without causing statistically significant variations to the cover image, so a carrier is needed to transfer information. In this paper, we have tried to introduce a new approach to encrypt secret information which is based on the concept of triangularization. Since the encryption and decryption is done on a binary file by means of successful implementation of XOR operation and this standard should be effective on any type of data such as text or multimedia files.

References
  1. S. Z. S. Idrus,S. A. Aljunid,S. M. Asi, ''Performance Analysis of Encryption Algorithms Text Length Size on Web Browsers,'' IJCSNS International Journal of Computer Science and Network Security, VOL. 8 No. 1, January 2008 ,PP 20-25.
  2. S. Hirani, ''Energy Consumption of Encryption Schemes in Wireless Devices Thesis,'' university of Pittsburgh, April 9,2003. Retrieved October 1, 2008, at: portal. acm. org/ citation. cfm?id=383768
  3. Diaa Salama Abdul. Elminaam, Hatem Mohamed Abdul Kader and Mohie Mohamed Hadhoud, "Performance Evaluation of Symmetric Encryption Algorithms", International Journal of Computer Science and Network Security, VOL. 8 No. 12, December 2008.
  4. Sedat Akleylek, "On the avalanche effect of MISTY1, KASUMI and KASUMI-R," Master's thesis, Middle East Technical University, Feb 2008
  5. O. Dunkelman, N. Keller and A. Shamir, "A Practical-Time Attack on the A5/3 Cryptosystem Used in Third Generation GSM Telephony," Cryptology ePrint Archive, Report 2010/013, Feb 2010
  6. M. Haleem, C. Chetan, R. Chandramouli and P. Subbalakshmi, "Opportunistic Encryption: A rade-Off between Security and Throughput nWireless Networks," IEEE Transaction on Dependaple and Secure Computing, vol. 4, no. 4, pp. 313-324, Oct 2007
  7. W. Stallings, ''Cryptography and Network Security 4th Ed,'' Prentice Hall , 2005,PP. 58
  8. Coppersmith, D. "The Data Encryption Standard (DES) and Its Strength Against Attacks. "I BM Journal of Research and Development, May 1994,pp. 243
  9. Bruce Schneier. The Blowfish Encryption Algorithm Retrieved October 25, 2008, www. schneier. com blowfish. html
  10. Daemen, J. , and Rijmen, V. "Rijndael: The Advanced Encryption Standard. "D r. Dobb's Journal, March 2001,PP. 137-139
Index Terms

Computer Science
Information Sciences

Keywords

Security Cryptography Steganography Encryption Decryption Triangularization