Randomly Generated Algorithms and Dynamic Connections

Authors

  • Harmanpreet Singh Department of Computer Science Engineering, VIT University, Vellore, Tamil Nadu
  • Amritpal Singh Danewalia Department of Computer Science Engineering, VIT University, Vellore, Tamil Nadu
  • Deepak Chopra Department of Computer Science Engineering, VIT University, Vellore, Tamil Nadu
  • Naveen Kumar N Department of Computer Science Engineering, VIT University, Vellore, Tamil Nadu

Keywords:

Communication System Security, Computer Network Security, Data Security, Internetworking, Network

Abstract

In the modern computer world, maintaining the information is very difficult. Some interrupts may occur on the local system (attack) or network based systems (network attack). Without security measures and controls in place, our data might be subjected to an attack. Several passive attacks like wire-tapping, port scanning etc. are well known that are used to monitor communication between nodes and also further used in other types of active attacks like man-in-the-middle attack etc. The man-in-the-middle attack, in cryptography and computer security is a form of active eavesdropping in which independent connections are made by the attacker with the victims so that attacker can relay messages between them. The entire conversation is controlled by the attacker making the victims believe that they are communicating with each other privately. Our approach to stop these types of attack is described as, once the initial authentication is done between the communicating nodes, they can start communicating using some standard encryption algorithm like DES, TEA or public key cryptography. But instead of using the same static communication channel and encryption algorithm, we will switch between different algorithms after a certain interval of time which has already been available with nodes.

 

References

Derek Williams, “The Tiny Encryption Algorithm (TEA), CPSC 6128 – Network Security”, Columbus State University, 2008.

Prof K.Govinda, Dr.E.Sathiyamoorth, “Multilevel cryptography technique using graceful codes”, Journal of Global Research in Computer Science, 2011.

Matt Blumenthal,Encryption: “Strengths and Weaknesses of Public-key Cryptography”, Department of Computing Sciences, Villanova University, Villanova, PA 19085 CSC 3990 – Computing Research Topics

Niraj Kumar, Prof. Sanjay Agrawal, “Issues and Challenges in Symmetric Key based Cryptographic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, 2013.

C. Onwubiko, A. P. Lenaghan, “Managing Security Threats and Vulnerabilities for small to Medium Enterprises”, IEEE International Conference on Intelligence and Security Informatics 2007.

H Sathu, Network Security: “A Layered Ap-proach”, NZ Journal of Applied Computing & Information, 2002.

Yunhong GU, Robert L. Grossman, “UDP-based data transfer for high-speed wide area networks”, Science Direct, 2007.

Downloads

Published

2014-02-28

How to Cite

[1]
H. Singh, A. S. Danewalia, D. Chopra, and N. Kumar N, “Randomly Generated Algorithms and Dynamic Connections”, Int. J. Sci. Res. Net. Sec. Comm., vol. 2, no. 1, pp. 1–4, Feb. 2014.

Issue

Section

Technical Article

Similar Articles

<< < 12 13 14 15 16 17 18 19 20 21 > >> 

You may also start an advanced similarity search for this article.