Open Access   Article Go Back

Advanced Data Encryption/Decryption using Multi Codes for One Character

R. Durga Prasad1 , R.N.D.S.S Kiran2 , 3 , ey Krishnaji4

Section:Review Paper, Product Type: Journal Paper
Volume-3 , Issue-9 , Page no. 34-38, Sep-2015

Online published on Oct 01, 2015

Copyright © R. Durga Prasad, R.N.D.S.S Kiran, ,ey Krishnaji . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: R. Durga Prasad, R.N.D.S.S Kiran, ,ey Krishnaji, “Advanced Data Encryption/Decryption using Multi Codes for One Character,” International Journal of Computer Sciences and Engineering, Vol.3, Issue.9, pp.34-38, 2015.

MLA Style Citation: R. Durga Prasad, R.N.D.S.S Kiran, ,ey Krishnaji "Advanced Data Encryption/Decryption using Multi Codes for One Character." International Journal of Computer Sciences and Engineering 3.9 (2015): 34-38.

APA Style Citation: R. Durga Prasad, R.N.D.S.S Kiran, ,ey Krishnaji, (2015). Advanced Data Encryption/Decryption using Multi Codes for One Character. International Journal of Computer Sciences and Engineering, 3(9), 34-38.

BibTex Style Citation:
@article{Prasad_2015,
author = {R. Durga Prasad, R.N.D.S.S Kiran, ,ey Krishnaji},
title = {Advanced Data Encryption/Decryption using Multi Codes for One Character},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {9 2015},
volume = {3},
Issue = {9},
month = {9},
year = {2015},
issn = {2347-2693},
pages = {34-38},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=636},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=636
TI - Advanced Data Encryption/Decryption using Multi Codes for One Character
T2 - International Journal of Computer Sciences and Engineering
AU - R. Durga Prasad, R.N.D.S.S Kiran, ,ey Krishnaji
PY - 2015
DA - 2015/10/01
PB - IJCSE, Indore, INDIA
SP - 34-38
IS - 9
VL - 3
SN - 2347-2693
ER -

VIEWS PDF XML
3017 2561 downloads 2439 downloads
  
  
           

Abstract

Cryptography is one way of providing security using the process of encryption and decryption. An original message is known as the plaintext, while the coded message is called the cipher text. The process of converting from plaintext to cipher text is known as enciphering or encryption and that of restoring the plaintext from the cipher text is deciphering or decryption. The purpose of the proposed system is to encrypt the sending message using a very sophisticated 5-codes encryption method to encrypt the data so as to ensure no leakage of sensitive and confidential information while sending a message. The proposed technique converts each character represented as a 5 codes, each code consist of a 5 digits. In order to provide advanced level of security we proposed a multi-codes generation algorithm which generates the code dynamically every time a message is initiated from either sender or receiver. The main objective of the software is to maintain the security of information transmitted via modern means of transportation such as the internet, mobile and so on. In this work, a robust RMI-based Multi Client Chat application is designed in which multiple clients can communicate through a secure RMI communication channel by sending and receiving messages between/among them. The application uses advanced encryption and decryption algorithm which uses the character codes for encryption and decryption. Each character is represented by 5 codes, each code consists of 5 digits. For example, A= {95231, 45672, 11132, 22367, 95267}.

Key-Words / Index Term

RMI (Remote Method Invocation), Data Encryption, multi codes, Cryptography

References

[1] Roshni Padate, Amana Patel,” Encryption and Decryption of Text Using AES Algorithm “, International Journal of Emerging Technology and Advanced Engineering , ISSN 2250-2459, ISO 9001:2008 Certified Journal, Volume 4, Issue 5, May 2014.
[2] Karthik, Muruganandam, “Data Encryption and Decryption by Using Triple DES and Performance Analysis of Crypto System “, International Journal of Scientific Engineering and Research (IJSER), ISSN (Online): 2347-3878, Volume 2 Issue 11, November 2014.
[3] Rajan.S.Jamgekar, Geeta Shantanu Joshi, “File Encryption and Decryption Using Secure RSA “, International Journal of Emerging Science and Engineering (IJESE) ISSN: 2319–6378, Volume-1, Issue-4, February 2013.
[4] Prashanti.G, Deepthi.S, Sandhya Rani.K,” A Novel Approach for Data Encryption Standard Algorithm “, International Journal of Engineering and Advanced Technology (IJEAT), ISSN: 2249 – 8958, Volume-2, Issue-5, June 2013.
[5] Maryam Ahmed, Baharan Sanjabi, Difo Aldiaz, Amirhossein Rezaei, Habeeb Omotunde ,” Diffie-Hellman and Its Application in Security Protocols ”, International Journal of Engineering Science and Innovative Technology (IJESIT) Volume 1, Issue 2, November 2012 .
[6] Raymond, J.F. and Stiglic, A. (2000) Security Issues in the Diffie-Hellman Key agreement protocol.(http://crypto.cs.mcgill.ca/~stiglic/publications.html)[Accessed 17 March 2012].
[7] Shraddha Soni, Himani Agrawal, Dr. (Mrs.) Monisha Sharma, ― Analysis and Comparison between AES and DES Cryptographic Algorithm‖, International Journal of Engineering and Innovative Technology (IJEIT) Volume 2, Issue 6, December 2012, pp 362-365.
[8] Sattar J Aboud, “An efficient method for attacking RSA scheme”, IEEE 2009.
[9] About AES – Advanced Encryption Standard‖, Copyright 2007 Svante Seleborg Axantum Software AB.

[10] Grabbe J, Data Encryption Standard: The Triple DES algorithm illustrated Laissez faire city time, Volume: 2, No. 28, and 2003.
[11] Data Encryption Standard (DES), FIPS PUB 46-3 - 1999.
[12] "A public key cryptosystem and a signature scheme based on discrete locarithms" TaherElGamal 1998, Springer-Verlag.
[13] William Stallings, Network Security Essentials: Applications and Standards, 4th ed., Prentice Hall.
[14] New Approach of Data Encryption Standard Algorithm Shah Kruti R., Bhavika Gambhava.
[15] Abdul kader, Diaasalama and Mohiv Hadhoud, “Studying the Effect of Most Common Encryption Algorithms,” International Arab Journal of e-technology, Vol.2. No.1. 2014