Secure Text Encryption in Intranet Using Elliptic Curve Cryptography

Authors

  • Kumari A Dept. of Information Technology, Institute of Engineering & Technology, Devi Ahilya Vishwavidyalaya, Indore, India
  • Kapoor V Dept. of Information Technology, Institute of Engineering & Technology, Devi Ahilya Vishwavidyalaya, Indore, India

DOI:

https://doi.org/10.26438/ijcse/v7i6.981984

Keywords:

Intranet application, Elliptic curve cryptography, Cryptographic technique, Data security

Abstract

The intranet-based applications are safe and in-house applications hosted inside the internal network. Internet applications need internet to process client requests from the browser to web server instead they only need internal communication with an internal dedicated server. Most companies like to deploy such applications to keep their sensitive data inside the network. Army organizations are best examples instead to store data at the remote server through the internet, they prefer to use a local server with the intranet. This work observes the need for security inside intranet-based applications. It implies designing intranet application by mitigating issues evolved in existing work. This work proposed to use of Elliptic Curve Cryptography and RC6 algorithms to keep data safe and secure inside the intranet using double layer security mechanism. The complete work will be implemented using Java technology and a small application will be created to evaluate the performance of the proposed solution.

References

[1] Keerthi K, Dr. B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption”. 2017 International Conference on circuits Power and Computing Technologies [ICCPCT], 2017 IEEE.

[2] S.M. C Vigila and Munseeswaran,” Implementation of Text based cryptosystem using elliptic curve cryptography”, 2009 1st International conference on advances computing, ICAC 2009, pp.82-85,2009.

[3] L. D. Singh and K. M. Singh,” Implementation of Text Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, vol.54, no.1, pp. 73-82,2015

[4] Akshita Bhandari, Ashutosh Gupta, Debasis Das, “A framework for Data Security and Storage in Cloud Computing”. International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 2016.

[5] Milind Mathur, Ayush Kesarwani, "Comparison between DES, 3DES, RC2, RC6, BLOWFISH, and AES”. Proceedings of National Conference on New Horizons in IT – NCNHIT 2013.

[6] A Arjuna Rao, K Sujatha, A Bhavana Deepthi, L V Rajesh, “Survey paper comparing ECC with RSA, AES and Blowfish Algorithms” International Journal on Recent and Innovation Trends in Computing and Communication Volume: 5, Issue: 1, IJRITCC, January 2017.

[7] Atul Kahate “Cryptography and Network Security”, Second Edition-2003, Tata McGraw Hill New Delhi, 10th reprint-2010.

[8] M. Wiesmann, F. Pedonet, A. Schiper, B. Kemmet, G. Alonso “Database Replication Techniques: a Three Parameter Classification” published in Reliable Distributed Systems, 2000. SRDS-2000. Proceedings. The 19th IEEE Symposium on at Lausanne PP. 206-215.

[9] DV Kapoor, R Yadav “A hybrid cryptography technique to support cyber security infrastructure” - Int. J. Adv. Res. Computer. Engg. Technology, 2015

[10] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013

[11] G.L. Pavani, Ch.Ramesh, "Secure Data Retrieval using Cipher Text Policy-Attribute Based Encryption in Hybrid Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.45-48, 2017

[12] A hybrid cryptography technique for improving network security

V Kapoor, R Yadav - International Journal of Computer Applications,2016

[13] A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission 1 T Panse, V Kapoor, P Panse - 2012.

Downloads

Published

2019-06-30
CITATION
DOI: 10.26438/ijcse/v7i6.981984
Published: 2019-06-30

How to Cite

[1]
A. Kumari and V. Kapoor, “Secure Text Encryption in Intranet Using Elliptic Curve Cryptography”, Int. J. Comp. Sci. Eng., vol. 7, no. 6, pp. 981–984, Jun. 2019.

Issue

Section

Research Article