NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security
Keywords:
Cryptography, Security, Multi level SecurityAbstract
The method of hiding a message so that only the actual recipient receives it properly and securely is referred as encryption. Encryption can contribute a technique for hiding data from intruders. As huge amount of data is stored on computers or transmitted via computers are exposed to the attackers which is at a risk. With the quick evolution of digital information transmission in electronic way, data safety is essential in information storage and transmission. The confidentiality of data has a remarkable role in various fields like ethics, law and currently in Data Systems. With the progress of human intelligence, the art of cryptography has grown to be more complicated with the aim of make data more safe and secure. Different collections of Encryption systems are being utilized in the world of Data Systems by different institutes. A new algorithm has been proposed for the security purpose of the data to be hidden from any unauthorized access. The proposed algorithm takes a 4-digit user-defined key and also generates a key which will be used to decrypt the same. The new technique is able to handle any size data efficiently and effectively for cryptography. We have used two layers cryptography technique which is totally new as far of our knowledge. It can provide more security of data than existing works in linear time.
References
[1] Diaa, S., E, Hatem M. A. K., & Mohiy M. H. (2010, May) Evaluating the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, Vol.10, No.3, (pp.213-219).
[2] Sudipta Singha Roy, Kazi Md. Rokibul Alam, Md. Asaf- Uddowla, Shaikh Akib Shahriyar, and Yasuhiko Morimoto (2017). “A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography”.
[3] Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson Education India.
[4] Deshpande, H. S., Karande, K. J., & Mulani, A. O. (2014, April). Efficient implementation of AES algorithm on FPGA. In Communications and Signal Processing (ICCSP), 2014 IEEE International Conference on (pp. 1895-1899).
[5] Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam P. Dubey (2015). “Advanced ASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id”.
[6] Nadeem, H (2006). “A performance comparison of data encryption algorithms”, IEEE Information and Communication Technologies, (pp. 84-89).
[7] Samir A. El-Seoud and Hosam F. El-Sofany (2017). “Studying Security of Data in Cloud Computing through
[8] Rashmi Welekar and Deepti Chaudhary (2015). “Secure Authentication Using Visual Cryptography”.
[9] Padate, R., & Patel, A. (2014). Encryption and decryption of text using AES algorithm. International Journal of Emerging Technology and Advanced Engineering, 4(5), 54-9.
[10] Kretzschmar, U. (2009). AES128–AC Implementation for Encryption and Decryption. TI-White Paper.
[11] Abhishek Pandya & Bobby Jasuja. (April 2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.
