Weitere Kapitel dieses Buchs durch Wischen aufrufen
As there is enormous increase or rise in the data exchange by the electronic system, the requirements of information security have become a compulsion. The most important concern in the communication system which is between sender and receiver is the security of the information which is to be transmitted. To get rid of the intruders, various cryptographic algorithms are used for example, AES, DES, Triple DES, Blowfish, etc. In this paper, authors have attempted to transfer file securely using randomly generated keys with Blowfish symmetric algorithm for encryption process. A unique transaction id is also generated which is used to fetch the random key which will be used for decryption at the receiver end. A validation key is also proposed which is used to validate that file is decrypted by the intended user only. The combination of random key, validation key, and transaction id as proposed will provide more robustness to secure transfer of file using Blowfish symmetric key encryption.
Bitte loggen Sie sich ein, um Zugang zu diesem Inhalt zu erhalten
Sie möchten Zugang zu diesem Inhalt erhalten? Dann informieren Sie sich jetzt über unsere Produkte:
Himani Agrawal and Monisha Sharma: Implementation and analysis various symmetric cryptosystems, Indian Journal of Science and Technology in Vol. 3 No. 12, ISSN:0974-6846. pp. 1173–1176, (Dec 2010).
Pratap Chandra Mandal: Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish, Journal of Global Research in Computer Science, Volume 3, No. 8, (2012).
Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan: Dynamic Key Cryptography and Applications, International Journal of Network Security, Vol. 10, No. 3, PP. 161–174, (May 2010).
Shantayoti Vashishtha on: Evaluating the performance of Symmetric key algorithms: AES(Advance Encryption Standard) and DES(Data Encryption Standard), IJCEM, International Journal of Computational Engineering and Management, Vol. 15 Issue 4, pp 43–49(2012).
Deepika, Manpreet: A Review on Various Key Management Techniques for Security Enhancement in WSN, International Journal of Engineering Trends and Technology (IJETT) – Volume 34 Number 4-(2016).
Zeenat Mahmood, J. L Rana, Prof. Ashish khare: Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG), International Journal of Computer Applications (0975–8887) Volume 50– No.19, (2012).
Ms NehaKhatri – Valmik and Prof. V. K Kshirsagar: Blowfish Algorithm, IOSR Journal of Computer Engineering (IOSR- JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 16, Issue2, Ver. X, PP 80–83, (2014).
Maulik P. Chaudhari and Sanjay R. Patel: A Survey on Cryptography Algorithms, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, issue 3, ISSN: 2321-7782, (March 2014).
Pratap Chand Mandal: Superiority of blowfish algorithm, International Journal of Advance Research in Computer Science and Software Engineering.
Blowfish-algorithm-history-and-background-computerscienceessay.phpSmith, T.F., Waterman, M.S.: Identification, https://www.ukessays.com/essays/computer-science.
Jayagopal Narayanaswamy, Raghav V. Sampangi and Srinivas Sampalli: HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption, ICISSP 2015-1 st International Conference on Information System Security and Privacy (2015).
- A Secure File Transfer Using the Concept of Dynamic Random Key, Transaction Id and Validation Key with Symmetric Key Encryption Algorithm
Ram Lal Yadav
- Springer Singapore
Neuer Inhalt/© ITandMEDIA, Best Practices für die Mitarbeiter-Partizipation in der Produktentwicklung/© astrosystem | stock.adobe.com