NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security

Authors

  • Sourav Ghosh Dept. of Computer Science, JIS College of Engineering, West Bengal, India
  • Prithwijit Das Dept. of Computer Science, JIS College of Engineering, West Bengal, India
  • Ira Nath Dept. of Computer Science, JIS College of Engineering, West Bengal, India
  • Dharmpal Singh Dept. of Computer Science, JIS College of Engineering, West Bengal, India
  • Sudipta Sahana Dept. of Computer Science, JIS College of Engineering, West Bengal, India

Keywords:

Cryptography, Security, Multi level Security

Abstract

The method of hiding a message so that only the actual recipient receives it properly and securely is referred as encryption. Encryption can contribute a technique for hiding data from intruders. As huge amount of data is stored on computers or transmitted via computers are exposed to the attackers which is at a risk. With the quick evolution of digital information transmission in electronic way, data safety is essential in information storage and transmission. The confidentiality of data has a remarkable role in various fields like ethics, law and currently in Data Systems. With the progress of human intelligence, the art of cryptography has grown to be more complicated with the aim of make data more safe and secure. Different collections of Encryption systems are being utilized in the world of Data Systems by different institutes. A new algorithm has been proposed for the security purpose of the data to be hidden from any unauthorized access. The proposed algorithm takes a 4-digit user-defined key and also generates a key which will be used to decrypt the same. The new technique is able to handle any size data efficiently and effectively for cryptography. We have used two layers cryptography technique which is totally new as far of our knowledge. It can provide more security of data than existing works in linear time.

References

[1] Diaa, S., E, Hatem M. A. K., & Mohiy M. H. (2010, May) Evaluating the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, Vol.10, No.3, (pp.213-219).

[2] Sudipta Singha Roy, Kazi Md. Rokibul Alam, Md. Asaf- Uddowla, Shaikh Akib Shahriyar, and Yasuhiko Morimoto (2017). “A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography”.

[3] Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson Education India.

[4] Deshpande, H. S., Karande, K. J., & Mulani, A. O. (2014, April). Efficient implementation of AES algorithm on FPGA. In Communications and Signal Processing (ICCSP), 2014 IEEE International Conference on (pp. 1895-1899).

[5] Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam P. Dubey (2015). “Advanced ASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id”.

[6] Nadeem, H (2006). “A performance comparison of data encryption algorithms”, IEEE Information and Communication Technologies, (pp. 84-89).

[7] Samir A. El-Seoud and Hosam F. El-Sofany (2017). “Studying Security of Data in Cloud Computing through

[8] Rashmi Welekar and Deepti Chaudhary (2015). “Secure Authentication Using Visual Cryptography”.

[9] Padate, R., & Patel, A. (2014). Encryption and decryption of text using AES algorithm. International Journal of Emerging Technology and Advanced Engineering, 4(5), 54-9.

[10] Kretzschmar, U. (2009). AES128–AC Implementation for Encryption and Decryption. TI-White Paper.

[11] Abhishek Pandya & Bobby Jasuja. (April 2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding

Downloads

Published

2020-02-28

How to Cite

[1]
S. Ghosh, P. Das, I. Nath, D. Singh, and S. Sahana, “NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security”, Int. J. Comp. Sci. Eng., vol. 8, no. 1, pp. 19–24, Feb. 2020.