0% found this document useful (0 votes)
53 views6 pages

New Standards For Encryption and Secure Data Transfer

NEW STANDARDS FOR ENCRYPTION AND SECURE DATA TRANSFER

Uploaded by

kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
53 views6 pages

New Standards For Encryption and Secure Data Transfer

NEW STANDARDS FOR ENCRYPTION AND SECURE DATA TRANSFER

Uploaded by

kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

NEW STANDARDS FOR SECURE DATA TRANSFER AND ENCRYPTION

K.KASTHURI,
Assistant Professor, Department of Computer Science, Srinivasan College of Arts and Science,
Perambalur 6211 212. kkasthuri4696@gmail.com
Abstract

One of the major social concerns in the modern period is the safe sharing of information. The term
"encryption" refers to the safe transit of data or information between systems. The idea here is to create a
safe desktop application that will allow us to send encrypted images and text from one system to another,
which can then be decoded by a different system. While logging into the account, we further offer the
three lock security here. With the use of encryption, data transferred over the internet is protected from
unwanted users.
Keywords: Encryption; Decryption; Cryptography; Steganography; Cipher Text

I.INTRODUCTION

These days, one of the most crucial elements of any firm is data security. Important ideas are
those like steganography and cryptography. To send data safely, words like encryption and decryption are
introduced. Encryption is the process of converting plain text messages to cipher text messages, and
decryption is the process of turning cipher text messages back to plain text messages.
These methods allow data or information to be concealed behind voice, video, and images. A key
is created; concepts from cryptography, such as symmetric and asymmetric algorithms, are employed
here. Asymmetric encryption employs multiple keys for encryption and decryption, whereas symmetric
encryption utilizes the same key for both processes. The oldest and most well-known type of encryption
method is a symmetric algorithm.
The emergence of cybercrime, which is based on company data, created a demand for this
cryptography technology. It provides supply chain and market intelligence on vulnerabilities, botnets,
attack kits, ransomware, phishing, and other dynamic tools. Due to this.
An attack could result in a significant loss of data or the disclosure of confidential or private
company information. Thus, data Safety was among.
The Following figure illustrates the evolution of data security

Figure 1.1 Evolutions in Data Security

Two techniques were arising such as cryptography and steganography to give strong security for
data or information for the benefit of the particular organization. If we compare old techniques used for
data security with the current techniques we will get an excess benefit with new techniques as the loss of
data or cybercrimes can be controlled. Different software’s are developed for controlling and identifying
cyber attacks which are considered as an offense in the judicial system.

II. CRYPTOGRAPHY AND ITS TECHNIQUES

Cryptography or cryptology originated from Greek word “kryptos” means “hidden/secret” &
“graphein” means “to write” is a practice for secure transfer of data over the internet or secure
communication among networks in the Presence of an unauthorized user called adversaries.
Cryptography is about analyzing protocols that prevent public, unauthorized users or third parties
from reading or illegally using an organization’s private data. The terms of cryptography include
Encryption, Decryption, Key & Steganography. Using, several algorithms the pain text is encrypted into
cipher text i.e. in cryptography cipher text is the result or output generated by the encryption process done
on plain text. This cipher text is sent through a network or communication channel and when it reaches
the receivers end the cipher text is decrypted using key back into original plain text format.
Symmetric Key Cryptography
Symmetric key cryptography is also known as private key cryptography. A secret key is used to
send and receive data from one system to another. Therefore, there should be a copy of secret key with
both the sender & receiver. The key is generated at the encryption phase itself where the same key is
supposed to be used while decryption also.

The Following figure gives an overview of data is being transferred with the help of symmetric
cryptography techniques,

Figure 2.1. Symmetric Cryptography Technique

Symmetric key cryptography is considered as valuable as it is relatively inexpensive to produce a


strong key. The algorithm used for this technique is also relatively inexpensive to process. Therefore, it is
highly effective as there is no time delay in the result of encryption & decryption. The exchanging of a
key should only be with the trusted participant. We should also assure that the data exchanged, which are
encrypted in a specific key can only be decrypted by another participant that has the key.

The exchanging of a secret key should always be secured. So, there can be a major drawback in
the symmetric key as there can be leakage of data while exchanging key if they did not retain the privacy
of key. Blowfish, AES, RC4, DES, RC5, RC6 are some examples of symmetric key encryption. The most
widely used symmetric key algorithm is AES-128, AES-192 and AES-256. In this project we are
implementing the application using the DES algorithm for converting plain text into cipher text and vice
versa.

Asymmetric Key Cryptography

Asymmetric key cryptography is also known as public key cryptography. Here, asymmetric key
uses two different keys for encryption. These secret keys are exchanged over a large network. It also
ensures that the unauthorised person does not misuse the keys. There are two keys, public key & private
or secret key, where the public key is made available to anyone who wants to send the message or want to
exchange data. But, the second private key is kept secret so that you can only know.
The Following figure illustrates the asymmetric key cryptography

Figure 2.2 Asymmetric Key Cryptography

As shown in the above figure there are two keys used each for encryption and decryption
respectively. It is highly secure as compared to symmetric key cryptography. The intruder cannot misuse
the data transferring over the network. This is an important requirement for electronic commerce. It
enables to use the private key to sign data with the digital signature.

The following are the major asymmetric encryption algorithms encryption or digital signing data,
1. Diffie-Hellman key agreement.
2. Rivest Shamir Adleman (RSA).
3. Elliptic Curve Cryptography (ECC).
4. EI Gamal.
5. Digital Signature Algorithm (DSA).

I.STEGANOGRAPHY
Steganography originated from Greek word which means covered writing. It hides a secret
message within an ordinary message and it is extracted at its destination end. Steganography takes
cryptography a step farther by hiding an encrypted message behind some other data and no one suspects
that it exists. Even if anyone scans the data they fail to know that it contains any secret message behind it.
Some of the techniques used in steganography such as least significant bit insertion and noise
manipulation, transform domain and image transformation.

II. APPLICATIONS
Currently, the economy of India is highly depended on various financial issues & their day to day
transactions are very high for public, private & government sectors. Financial data transaction in the
banking and financial industry is generally reliable. All these credential transaction and data transferring
is done through internet. Some of its applications are the security of confidential data of industries or
organization, security in social media, digital signature, database security & so on
 Defence Forces
In the defence system, the transfer of confidential data should always be secure. One of the ways in
communication is done via the internet for sharing information. The content sharing might be sensitive
which has to be kept secure from unauthorised users. If there occurs any leakage of data, then it can cause
harm to the whole defence system as well as to the nation. Here the data is encrypted and a private key is
shared among the authorized sender and receiver. Due to which they ensure the secrecy of
communication.
 Database Security
Volumetric data from IT industries or various organizations address their security objectives and
mandates at the number of system and environments. There will be a need to guard those data from
intruders. It is necessary to encrypt the sensitive data in a database, or address the mandates in the cloud.
These are some of the reasons for which data security is considered on a large scale among industries.

 E-Commerce (online shopping, net banking)


Nowadays, E-Commerce is considered the vastly used application on the internet among worldwide.
Buying and selling of products require the bank details wherein we have to provide all the information of
our bank account including the Account number, credit card pin, etc. One of the major cybercrime done is
theft of money from your bank account. To avoid this one should ensure the secrecy of confidential
information like credit card numbers during the transaction. The encryption of data or information is the
best way to avoid such cyber attacks.

III.CONCLUSION

Today, when everything from banking to shopping is done online, data security for data transfers over the
internet is crucial. Data security aids in preventing hackers and unauthorised users from accessing any
data knowledge about both online and offline. The process of encryption plain text into cipher text and
then employing decryption to turn the cipher text back into plain text is known as cryptography. Any
image that is extracted at the destination end can have the original message hidden underneath it thanks to
steganography. An overview of data security for safe internet transfer is provided in this paper. We will
provide some application-based, practical analysis on the applications covered in this paper in the future.
REFERENCES:

1. Manole VELICANU, Gheorghe MATEI ,“DATABASE VS DATA WAREHOUSE”, in Revista


Informatica Economică, nr. 3 (43)/2010
2. Sanu Kumar “ASPECT OF DATA MINING AND DATAWAREHOUSING”, The international
journal of technology enhancements and emerging engineering research,.
3. Ishaq Azhar Mohammed, "ARTIFICIAL INTELLIGENCE: THE KEY TO SELF-DRIVING
IDENTITY GOVERNANCE", International Journal of Creative Research Thoughts (IJCRT),
ISSN:2320-2882, Volume.4, Issue 4, pp.664-667, November 2016, Available at
:http://www.ijcrt.org/papers/IJCRT1134112.pdf
4. Kalpana Rangra Dr. K. L. Bansal,, “ COMPARATIVE STUDY OF DATA MINING TOOLS”,
International Journal of Advanced Research in Computer Science and Software Engineering.
5. Drew Cardon, “DATABASE VS DATA WAREHOUSE: A COMPARATIVE REVIEW”,
HealthCatalyst
6. Muhammad Bilal Shahid, Umber Sheikh, Basit Raza, Munam Ali Shah, Ahmad Kamran, Adeel
Anju, QaisarJavaid ,“APPLICATION OF DATA WAREHOUSE IN REAL LIFE: STATE-OF-
THE-ART SURVEY FROM USER PREFERENCES’ PERSPECTIVE”, in (IJACSA)2016
7. Milija SUKNOVIĆ, Milutin ČUPIĆ, Milan MARTIĆ, “DATA WAREHOUSING AND DATA
MINING - A CASE STUDY”, Yugoslav Journal of Operations Research
8. Mehmed Kantardzic,“DATA - MINING APPLICATIONS”, Data Mining: Concepts,
Models, Methods, and Algorithms, Second Edition
9. Ishaq Azhar Mohammed, "Identity and Access Management for the Internet of Things",
International Journal of Emerging Technologies and Innovative Research (www.jetir.org),
ISSN:2349-5162, Vol.5, Issue 5, page no.1299-1303, May-2018, Available
:http://www.jetir.org/papers/JETIR1805954.pdf
10. Kanika Passi, ,“ REVIEW ON ROLE OF DATA WAREHOUSE IN BUSINESS INTELLIGENCE”,
IJARCET

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy