Skip to main content

2018 | OriginalPaper | Buchkapitel

A Secure File Transfer Using the Concept of Dynamic Random Key, Transaction Id and Validation Key with Symmetric Key Encryption Algorithm

verfasst von : Saima Iqbal, Ram Lal Yadav

Erschienen in: Proceedings of First International Conference on Smart System, Innovations and Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

As there is enormous increase or rise in the data exchange by the electronic system, the requirements of information security have become a compulsion. The most important concern in the communication system which is between sender and receiver is the security of the information which is to be transmitted. To get rid of the intruders, various cryptographic algorithms are used for example, AES, DES, Triple DES, Blowfish, etc. In this paper, authors have attempted to transfer file securely using randomly generated keys with Blowfish symmetric algorithm for encryption process. A unique transaction id is also generated which is used to fetch the random key which will be used for decryption at the receiver end. A validation key is also proposed which is used to validate that file is decrypted by the intended user only. The combination of random key, validation key, and transaction id as proposed will provide more robustness to secure transfer of file using Blowfish symmetric key encryption.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Himani Agrawal and Monisha Sharma: Implementation and analysis various symmetric cryptosystems, Indian Journal of Science and Technology in Vol. 3 No. 12, ISSN:0974-6846. pp. 1173–1176, (Dec 2010). Himani Agrawal and Monisha Sharma: Implementation and analysis various symmetric cryptosystems, Indian Journal of Science and Technology in Vol. 3 No. 12, ISSN:0974-6846. pp. 1173–1176, (Dec 2010).
2.
Zurück zum Zitat Pratap Chandra Mandal: Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish, Journal of Global Research in Computer Science, Volume 3, No. 8, (2012). Pratap Chandra Mandal: Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish, Journal of Global Research in Computer Science, Volume 3, No. 8, (2012).
3.
Zurück zum Zitat Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan: Dynamic Key Cryptography and Applications, International Journal of Network Security, Vol. 10, No. 3, PP. 161–174, (May 2010). Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan: Dynamic Key Cryptography and Applications, International Journal of Network Security, Vol. 10, No. 3, PP. 161–174, (May 2010).
4.
Zurück zum Zitat Shantayoti Vashishtha on: Evaluating the performance of Symmetric key algorithms: AES(Advance Encryption Standard) and DES(Data Encryption Standard), IJCEM, International Journal of Computational Engineering and Management, Vol. 15 Issue 4, pp 43–49(2012). Shantayoti Vashishtha on: Evaluating the performance of Symmetric key algorithms: AES(Advance Encryption Standard) and DES(Data Encryption Standard), IJCEM, International Journal of Computational Engineering and Management, Vol. 15 Issue 4, pp 43–49(2012).
5.
Zurück zum Zitat Deepika, Manpreet: A Review on Various Key Management Techniques for Security Enhancement in WSN, International Journal of Engineering Trends and Technology (IJETT) – Volume 34 Number 4-(2016). Deepika, Manpreet: A Review on Various Key Management Techniques for Security Enhancement in WSN, International Journal of Engineering Trends and Technology (IJETT) – Volume 34 Number 4-(2016).
6.
Zurück zum Zitat Zeenat Mahmood, J. L Rana, Prof. Ashish khare: Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG), International Journal of Computer Applications (0975–8887) Volume 50– No.19, (2012). Zeenat Mahmood, J. L Rana, Prof. Ashish khare: Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG), International Journal of Computer Applications (0975–8887) Volume 50– No.19, (2012).
7.
Zurück zum Zitat Ms NehaKhatri – Valmik and Prof. V. K Kshirsagar: Blowfish Algorithm, IOSR Journal of Computer Engineering (IOSR- JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 16, Issue2, Ver. X, PP 80–83, (2014). Ms NehaKhatri – Valmik and Prof. V. K Kshirsagar: Blowfish Algorithm, IOSR Journal of Computer Engineering (IOSR- JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 16, Issue2, Ver. X, PP 80–83, (2014).
8.
Zurück zum Zitat Maulik P. Chaudhari and Sanjay R. Patel: A Survey on Cryptography Algorithms, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, issue 3, ISSN: 2321-7782, (March 2014). Maulik P. Chaudhari and Sanjay R. Patel: A Survey on Cryptography Algorithms, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, issue 3, ISSN: 2321-7782, (March 2014).
9.
Zurück zum Zitat Pratap Chand Mandal: Superiority of blowfish algorithm, International Journal of Advance Research in Computer Science and Software Engineering. Pratap Chand Mandal: Superiority of blowfish algorithm, International Journal of Advance Research in Computer Science and Software Engineering.
11.
Zurück zum Zitat Jayagopal Narayanaswamy, Raghav V. Sampangi and Srinivas Sampalli: HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption, ICISSP 2015-1st International Conference on Information System Security and Privacy (2015). Jayagopal Narayanaswamy, Raghav V. Sampangi and Srinivas Sampalli: HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption, ICISSP 2015-1st International Conference on Information System Security and Privacy (2015).
Metadaten
Titel
A Secure File Transfer Using the Concept of Dynamic Random Key, Transaction Id and Validation Key with Symmetric Key Encryption Algorithm
verfasst von
Saima Iqbal
Ram Lal Yadav
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-5828-8_26