A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security

Authors

  • V. Kapoor Department of Information Technology, Institute of Engineering and Technology, DAVV, Indore, India

Keywords:

Brute-force attack, Cryptography, Cryptographic algorithm, Encryption key, Information Security

Abstract

Information is a valuable asset. As an asset information needs to be secured from cryptanalysis attacks. Security by encoding a message to make them non readable is the art and science of cryptography. Cryptographic algorithms are computationally rigorous function and guzzle a large amount of CPU time and space complication at the time of encryption. In this research paper we have proposed a reliable, an efficient and a more secure system by using our proposed algorithm for encryption and decryption. The Encryption key is long and consists of 128 bits. In cryptography, information should be confidential not only when it is stored in the computer, it should maintain its confidentiality when it is transmitted from one computer to another. For this purpose here we proposed an integrated cryptographic scheme. This scheme is based on a new cryptographic algorithm, message digest algorithm MD5 and RSA Algorithm. Proposed Encryption Algorithm is used to achieve confidentiality, whereas Message Digest Algorithm MD5 is used to verify the integrity of the message. RSA is adopted to encrypt the key of the encryption algorithm and to generate the digital signature. Four major security principles such as Authentication, Confidentiality, Integrity of Data and Non-Repudiation are achieved together using this scheme.

 

References

Bhatele, K. Sinhal, A.; Pathak, “A novel approach to the design of a new hybrid security protocol architecture” Advanced Communication Control and Computing Technologies (ICACCCT), 2012 IEEE International C0nference on page(s): 429-433 Print ISBN; 978-1-4673-2045-0

Atul Kahate, Cryptography and Network Security Second Edition.

Mehran Mozaffari-Kermani and Arash Reyhani-Masoleh, “Efficient and High Performace Parallel Hardware Architecture for the AES –GSM” IEEE Transaction On Computers, vol.61,no.8, August 2012.

Introduction of cryptography by H. Delfs and H. Knebl springer Verlag berlin Heidelberg 2007.

Henry Beker & Fresd piper, “Cipher System, the protection of communications”, A willey inter-science publication 1982.

El-Mageed, T., Hamdy, N., Amer, F., and Kerisha, Y.,”Cipher System and Cryptanalysis Techniques: An overview of the basic principles”. The Egyptian Computer Journal, ISSR, Cairo UNIV, VOL (28), No.1,2000.

Akanksha Mathur, “A Research paper: An ASCII value based datta encryption algorithm and its comparision with other symmetric data encryption algorithms”, International journal on Computer Science and Engineering (IJCSE). Vol. 4 No. 09. Pp. 1650-1657, September 2012.

http://en.wikipedia.org/wiki/Cryptographic_hash_function

Behrouz A. Forouzan: “Cryptography and Network security” McGraw Hill companies (special indian edition, Science, 2011)

http://www.webopedia.com/TERM/M/message_digest.html

Trishna Panse, V. Kapoor, “An Integrated Scheme based on Triple DES, RSA and MD5 to Enhance the Secutity in Bluetooth Communiation”, International Journal of Computer Applications, Vol. 50- No.7, July 2012

Zhao Yong-Xia, Zhen Ge, “MD5 Research” Multimedia and Information Technology (MMIT), Second International Conference on (Volume:2 ) 2010.

.Vishwa gupta,. Gajendra Singh, Ravindra Gupta, “Advance cryptography algorithm for improving data security”, International Journal of Advance Research in Computer Science and Software Engineering, Vol.2-Issue 1, January 2012

Neal Koblitz “A Course in Number Theory and Cryptography” Second Edition Published by Springer-Verlag.

B. Schneier, Applied Cryptography, John Wiley & Sons, New York, 1994.

Dorothy Elizabeth, “Cryptography and Data Security”, Addison-Wesley, 1982.

Donghua Xu, Chenghuai Lu, and Andre D. Santos, “Protecting Web Usage of Credit Cards Using One-Time Pad Cookie Encryption”, Proc. Annual Computer Security Applications Conference (ACSAC), 2002.

William Stallings “Cryptography and Network Security”, 3rd Edition, Prentice-Hall Inc., 2005.

Bruce Shnier “Applied Cryptography Second Edition Protocols. Algorithms, and Source, and Source Code in C”, John Wiley and Sons, Inc., 1996.

B. Schneier ,Applied Cryptography, John Wiley &Sons, New York, 1994.

Rivest, R.L., Robshaw, M.J.B., Sidney, R., & Yin, Y.L(2000). “The Case for RC6 as the AES.” AES Round 2 Public Comments. URL: http://csrc.nist.gov/CryptoToolkit/aes

Downloads

Published

2014-06-30

How to Cite

[1]
V. Kapoor, “A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security”, Int. J. Sci. Res. Net. Sec. Comm., vol. 1, no. 2, pp. 39–46, Jun. 2014.

Issue

Section

Research Article