The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
3C consist of three terms a. Cryptography b. Cascade c. Customized In brief It protects data from being viewed or modified and provides a secure means of communication over insecure channels by encrypting data multiple time using different algorithms selected by users as per their need. Thus key size and cipher text size will increase which leads to more security rather than regular, single algorithm.
In recent world, the way of transferring the secured information particularly in public sectors, has faced more challenges. To minimize these challenges, cryptographic concepts has been introduced. Cryptography is the art of technique that is used to changing the information in to unreadable format based on the user's key. Various cryptographic concepts have been introduced for text and image. Due...
Cloud computing has evolved to a great extent over the years. The concept of the cloud lies in the efficient storage of data through resource allocation at a very low cost. The building blocks of cloud are distributed virtual servers over different geographical locations. Virtual machines transfer data over the network from one physical server to another, an efficient algorithm or model is required...
RSA is the best well — known and the most widely used of public key cryptosystem. The advantage of this algorithm is that the senders who have the public key and the receivers who have private key can communicate each other via the unsecured channel secretly. However, the processes of RSA have to take very great computation cost especially in the decryption process. In this paper, the improving decryption...
DNA computing is the back bone of the DNA cryptography. DNA cryptography is becoming an alternative to the traditional cryptographic approach that exists in our day-today life. In spite security breaches overwhelm the traditional security techniques that are provided to a system. Thus, to increase the security feature with less cost and reduced computational time, we go for techniques utilizing the...
In cryptographic applications, the data sent to a remote host are encrypted at the source machine using an encryption key and then the encrypted data are sent to the destination machine, where it is decrypted to get the original data. Thus the attacker will not have the encryption key which is required to get the original data and so a hacker can do nothing with any cryptographic system. Reprogrammable...
In the global networked world, there is a phenomenal growth in data transfer and sharing. Security plays a vital role in transmitting the private data over the communication medium which tends to be open and insecure. The threat posed by an intruder in accessing the “not to be disclosed data” has been a genuine apprehension for the communication specialists. In this paper we propose a new approach...
It is well known that avalanche effect errors in received noisy ciphertexts will cause severe error propagation in block-ciphered encryption systems, thus resulting in a large reduction in the achievable throughput. However, little is known about the statistical properties of the underlying error sequences in decrypted plaintexts in block-ciphered systems when channel errors are present. A rigorous...
Data security and compression is the common requirement for most of the storage and transmission related applications. In this paper, a new method for multilevel security and compression of text data using bit stuffing and Huffman coding is presented. The proposed method comprises various processing modules for securing and compressing the text data through encryption process. The encryption process...
Exchange of data over the open networks and internet is rapidly growing so security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc. In today's world most of the multimedia applications involve images. Image encryption has applications in internet communication, multimedia systems, medical imaging, telemedicine,...
In the following paper, we are encrypting and decrypting data using 74xx logic gates. In this process a key is generated which when encapsulates with the data, makes it in encrypted form called cipher text. Then same key is used to decrypt the data. The concept used for key generation is cellular automation, and then bit by bit passing into 8∶1 MUX via 2∶1 MUX from where the final key is generated...
The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by the third party working on the same channel. The risk can be avoided using the suitable encryption algorithm. Using the best suited algorithm the transmitted data will be encrypted before...
Data encryption has been widely applied in many data processing areas. Various encryption algorithms have been developed for processing text documents, images, video, etc. If we are able to collaborate the advantages of the different existing encryption methods, then a new hybrid encryption method can be developed which offers better security and protection. So, in order to accomplish the Hybrid encryption...
Public key cryptosystem or the asymmetric crypto system is more secured than secret key method because a pair of related keys is being used at both sender and receiver's end. In this paper we propose an efficient Bernstein polynomial over Galois field GF(p). This public key cryptographic technique is used for secured transmission of image. This work considers compressing the original image using Bernstein...
In this work we have implemented and discussed the performance evaluation of Least Significant Bit (LSB) and Least Significant Digit (LSD) on various formats of multimedia data. We have shown the performance variation on different formats for which these two techniques have been applied to hide the messages. Implementation of both the algorithms has been done to explore the security and distortion...
This paper investigates the impact of data encryption and decryption in indoor broadcasting visible light communications (VLC) system embedded in the physical layer. The RSA encryption has been implemented to provide a secure data transmission in the physical layer. The paper shows that the bit error rate (BER) performance for the un-secured and secured VLC systems (8 and 12-bit) for data rates of...
Data hiding is a tremendous and fast growing multidisciplinary field, which conceals the existence of secret data. Security and the privacy of the data over internet and communication technique is a prime concern among content owner. To avoid the unauthorized access of data over communication, a novel and reliable data hiding technique is proposed in this study based on powerful standard stream cipher...
World is too large in its physical boundaries but it becomes too small due to communication. Through this communication system we can transmit various data from one location to another. This is a great thing at one level but at another level it comes with great risk. Chances of leakage of information during the communication process is always there. We could not control this leak/steeling of information...
In the way of increasing use of internet exponentially when the message is transferred from sender to receiver over the network, the attempt can be made by the hacker or cracker to break and expose the actual message. So security of message is important issue. Encryption process plays a vital role in maintaining the confidentiality of the message being transmitted over the network. In this paper existing...
This work proposes the application of Advanced Encryption Standard (AES) algorithm in Universal Asynchronous Receiver Transmitter (UART) module for secure transfer of data. The proposed architecture implements AES-128 algorithm that encrypts the data before transmission through UART transmitter and decrypts after receiving the data at UART receiver module. In this work, we present the AES-128 encryption...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.