Preview

Enhanced Data Encryption Algorithm for Next Generation Networks

Satisfactory Essays
Open Document
Open Document
396 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Enhanced Data Encryption Algorithm for Next Generation Networks
Enhanced Data Encryption Algorithm for Next Generation Networks ABSTRACT
In an age where data transmission over the network has become a vital aspect of communication and information sharing it is very essential to ensure robust data security. Keeping the above fact in mind, we aim to enhance the existing security standards by designing a more efficient Encryption Algorithm. In this paper we propose the idea of using a combination of AES-DES and incorporating it in the Feistal structure. Being a hybrid of two powerful encryption techniques, the algorithm would be an efficient and reliable encryption standard.
General Terms
Data Security, Hybrid Structure, Algorithm.
Keywords
AES, DES, Hybrid, Encryption Time, Avalanche Effect, Throughput, CPU Usage.
INTRODUCTION
The Internet holds an important role for data transmission and sharing. Therefore, encryption is used to secure data transmission. Encryption achieves security effects that make the secret messages unreadable. This is known as Cryptography
[1]
.
The main objective of Cryptography is to communicate securely in such a way that the true message cannot be intercepted by an attacker. There are two types of cryptographic schemes available on the basis of key. They are:
Symmetric Key Cryptography: This cryptographic scheme makes use of a single key for the encryption and decryption of the message
[1]
.
Asymmetric or Public Key Cryptography: This cryptographic scheme makes use of two keys for encryption and decryption of the message, known as the public key and private Key
[1]
.
We can classify Symmetric key cryptography into two types on the basis of their operations as:
• Stream Ciphers: In this one byte is encrypted at a particular time
[2]
.
• Block Ciphers: It takes a block of plaintext as input, and produces a corresponding output block of cipher text
[2]
.
In this paper we have attempted to use two Symmetric Block cipher

You May Also Find These Documents Helpful

  • Good Essays

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 406 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    RSA is a public-key encryption algorithm and the standard for encrypting data sent over the internet. It also happens to be one of the…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    8. symmetric-key: It only needs one key to encrypt the message. And both user only need the same key to decode the message. And the in order to create the key is by moving the bit. asymmetric-key: It needs two different keys- public key and private key. Everyone can see the public key and only the person who has private key can decode the message.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A secure and efficient protocol is used, ECC elliptic curve cryptography a public key cryptography…

    • 470 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Chapter 9 ISS

    • 620 Words
    • 3 Pages

    8 True or False: Cryptography is a mechanism for accomplishing confidentiality, integrity, authentication, and nonrepudiation.…

    • 620 Words
    • 3 Pages
    Good Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Satisfactory Essays

    |11 |Install JCrypt tool (or any other equivalent) and demonstrate Asymmetric, Symmetric crypto algorithm, Hash and |…

    • 632 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    At ABC Institute of Research, the value of the company is in the confidentiality of what it finds. If for example, ABC were to expend a great investment in finding a solution to a problem, only for DEF Research Inc. to discover their secret, ABC could suffer greatly. In the current age of networks and computers, the information you put in is only as safe as you make it. In order for ABC Institute of Research to keep their investment safe, they must protect their data at all costs. In the following, I will show how ABC can accomplish this using asymmetric cryptology to exchange a secret key and then use symmetric cryptology to ensure the confidentiality of data being sent; I will then show you the advantages and disadvantages.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Is3230 Lab 1 PKI Analysis

    • 851 Words
    • 4 Pages

    A PKI (public key infrastructure) enables users of a basically unsecure public network such as the Internet to securely and privately exchange data and money through the use of a public and a private cryptographic key pair that is obtained and shared through a trusted authority. The private key system is sometimes known as symmetric cryptography and the public key system as asymmetric cryptography. The Hash algorithm (or hash function) is an algorithm that computes a value based on a data object such as a message or file. The object is usually of variable length, possibly very large, thereby mapping the data object to a smaller data object. This is the “hash result” which is usually a fixed-size value.…

    • 851 Words
    • 4 Pages
    Better Essays
  • Good Essays

    Case Project

    • 650 Words
    • 3 Pages

    Keys form the basic foundation for public key infrastructure and it is important that each key be carefully handled. The proper management of keys includes key storage, key usage, and key-handling procedures. There are different ways to store keys; public keys can be stored by embedding the key within digital certificates, while private keys can be stored on a person’s personal computer. However, there are drawbacks to storing keys using software; software can leave openings for an…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Public key infrastructure is becoming an integral and essential element of security these days. It provides highly secure enterprise systems in companies that provide large scale rankings of data that need to be encrypted to improve security levels. With the public key infrastructure, we want to retrieve digital certificates and set up practices, ways and policies to encrypt data. Provides access to secure data exchange or networking through networks and provides access to authentication and verification. We can refer to it as an infrastructure that distributes public keys. Data Center Basics (2003).…

    • 601 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Encryption entails rearranging data in such a way that only the owner of both the encryption and decryption key can understand. It serves the purpose of passing information over networks in a “secret” form so that it cannot be interrupted by hackers who may wish to view the communications for malicious reasons. Encryption is extremely important for e-commerce as it allows confidential information such as credit and debit card details to be sent safely to the online business which is receiving these details. Web browsers are able to encrypt purchase details using an encryption method known as SSL (Secure Socket Layer). SSL is switched on when a user visits a secure server site which begins with HTTPS (Secure HyperText Protocol).…

    • 607 Words
    • 3 Pages
    Good Essays
  • Good Essays

    In this lab, you applied common cryptographic techniques to ensure confidentiality, integrity, and authentication. You created an MD5sum and SHA1 hash on a simple text file on a Linux virtual machine and compared the hash values of the original files with those generated after the file had been modified. Next, you used GnuPG to generate an encryption key pair and encrypted a message. Finally, you used the key pairs to send secure messages between two user accounts on the virtual machine and verified the integrity of the received files.…

    • 392 Words
    • 2 Pages
    Good Essays