Skip to main content

2018 | OriginalPaper | Buchkapitel

Encryption and Decryption Technique Using Java

verfasst von : Ankur Saxena, Neeraj Kaushik, Nidhi Kaushik

Erschienen in: Cyber Security

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In today’s communication era, sharing of data is increasing significantly. The data being transmitted is vulnerable to several approaches. Consequently, the information security is one of the most challenging facts of communication. This research will represent a view on the modern state in the field of encryption, in particular on private key block ciphers which are widely applied for bulk data and connection encryption. Encryption is the contrivance of converting plain text into the cipher text in which plain text is taken the input for the encryption process, and cipher text is considered as the output. Decryption is the mechanism of changing cipher text into the plaintext. This technique runs on any web server or application server. The core thought is to encrypt secret information before transmitting it to interested websites. A J2EE information model is employed to test the integrity of the mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Saxena A, Jakhmola R (2011) Securing confidential data using Java/J2EE. Int J Sci Technol Manag 2(3):54–59 Saxena A, Jakhmola R (2011) Securing confidential data using Java/J2EE. Int J Sci Technol Manag 2(3):54–59
2.
Zurück zum Zitat DSarkar D, Jaiswal A, Saxena A (2015) Understanding architecture and framework of J2EE using web application. Int J Comput Sci Inf Technol 6(2):1253–1257 DSarkar D, Jaiswal A, Saxena A (2015) Understanding architecture and framework of J2EE using web application. Int J Comput Sci Inf Technol 6(2):1253–1257
3.
Zurück zum Zitat Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2(7):226–233 Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2(7):226–233
4.
Zurück zum Zitat Saxena A, Chaurasia (2014) Key and value paired data using java hash table. Int J Eng Manag Res 4(1):81–89 Saxena A, Chaurasia (2014) Key and value paired data using java hash table. Int J Eng Manag Res 4(1):81–89
5.
Zurück zum Zitat Mahajan P Dr, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol Netw Web Secur 13(15):15–22 Version 1.0 Mahajan P Dr, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol Netw Web Secur 13(15):15–22 Version 1.0
6.
Zurück zum Zitat Prashant G, Deepthi S, SandhyaRani K (2013) A novel approach for data encryption standard algorithm. Int J Eng Adv Technol (IJEAT) 2(5):264 Prashant G, Deepthi S, SandhyaRani K (2013) A novel approach for data encryption standard algorithm. Int J Eng Adv Technol (IJEAT) 2(5):264
7.
Zurück zum Zitat Agarwal V, Agarwal S, Deshmukh R (2014) Analysis and review of encryption and decryption for secure communication. Int J Sci Eng Res (IJSER) 2(2):1–3 Agarwal V, Agarwal S, Deshmukh R (2014) Analysis and review of encryption and decryption for secure communication. Int J Sci Eng Res (IJSER) 2(2):1–3
9.
Zurück zum Zitat Chen† Q, Tang Z, Li Y, Niu Y, Mo J (2011) Research on encryption algorithm of data security for wireless sensor network. J Comput Inf Syst 7(2):369–376 Chen† Q, Tang Z, Li Y, Niu Y, Mo J (2011) Research on encryption algorithm of data security for wireless sensor network. J Comput Inf Syst 7(2):369–376
10.
Zurück zum Zitat Bhati S, Bhati A, Sharma SK (2012) A new approach towards encryption schemes: byte—rotation encryption algorithm. In: Proceedings of the world congress on engineering and computer science 2012, vol II WCECS 2012, October 24–26 Bhati S, Bhati A, Sharma SK (2012) A new approach towards encryption schemes: byte—rotation encryption algorithm. In: Proceedings of the world congress on engineering and computer science 2012, vol II WCECS 2012, October 24–26
Metadaten
Titel
Encryption and Decryption Technique Using Java
verfasst von
Ankur Saxena
Neeraj Kaushik
Nidhi Kaushik
Copyright-Jahr
2018
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-8536-9_40