Enhancing security by altering encryption keys for symmetric algorithm

  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
  • strict warning: Declaration of views_handler_argument::init() should be compatible with views_handler::init(&$view, $options) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_argument.inc on line 744.
  • strict warning: Declaration of views_handler_filter::options_validate() should be compatible with views_handler::options_validate($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter::options_submit() should be compatible with views_handler::options_submit($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter.inc on line 607.
  • strict warning: Declaration of views_handler_filter_boolean_operator::value_validate() should be compatible with views_handler_filter::value_validate($form, &$form_state) in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/handlers/views_handler_filter_boolean_operator.inc on line 159.
  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
  • strict warning: Non-static method view::load() should not be called statically in /home4/vibu/public_html/journalijdr.com/sites/all/modules/views/views.module on line 906.
Author: 
Densy John V. and 2Dr. Agnise KalaRani, X.
Abstract: 

Information security is crucial for all organizations. People are using information technology for storing data in the internet. Now-a-days Cloud Storage and Big Data are common among all kinds of people. Moreover mobile technology is becoming more popular. Therefore new technologies are derived from the existing encryption algorithms in order to resists the attacks from intruders. In this study we are experimenting a new technique of encrypting with two different algorithms and two different encryption keys so that it can be useful for resisting the man-in-the-middle attacks for the information over the internet. The results proved that eaves- dropper cannot determine the key-length to decrypt back to original message. Here we are using AES and XOR for encrypting and key generation is done using hash functions.

Download PDF: 

CHIEF EDITOR

  

           Prof. Dr. Bilal BİLGİN

Call for Papers - 2017

    submit your paper now

   Vol. 07, Issue 03, March 2017

CURRENT ISSUE

 

Article Tracking

IMPACT FACTOR 2016

          4.753

Get your Certificate

Copyright © 2016 International Journal Development Research. All Rights Reserved.