Skip to main content
Dr Abhishek Guru
  • 7024770703
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree.... more
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchain-based data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algorithms have recently been attacked by address resolution protocols (ARP), distributed denial of service attacks (DDoS), and sharding attacks in a permission-less blockchain. The existence of a byzantine adversary is perilous, and is involved in these ongoing attacks. Considering the above issues, we conducted an informative survey based on the consensus protocol attack on blockchain through the ...
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree.... more
In the current era, blockchain has approximately 30 consensus algorithms. This architecturally distributed database stores data in an encrypted form with multiple checks, including elliptical curve cryptography (ECC) and Merkle hash tree. Additionally, many researchers aim to implement a public key infrastructure (PKI) cryptography mechanism to boost the security of blockchainbased data management. However, the issue is that many of these are required for advanced cryptographic protocols. For all consensus protocols, security features are required to be discussed because these consensus algorithms have recently been attacked by address resolution protocols (ARP), distributed denial of service attacks (DDoS), and sharding attacks in a permission-less blockchain. The existence of a byzantine adversary is perilous, and is involved in these ongoing attacks. Considering the above issues, we conducted an informative survey based on the consensus protocol attack on blockchain through the latest published article from IEEE, Springer, Elsevier, ACM, Willy, Hindawi, and other publishers. We incorporate various methods involved in blockchain. Our main intention is to gain clarity from earlier published articles to elaborate numerous key methods in terms of a survey article.
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a... more
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a day's every information or data is digitalises which are stored in server, clouds and other resources. The more data we store the more organized crime is ready to devour it. Now a day's online lifestyle gives enormous opportunities to reach anyone from anywhere but this gives chances to cyber-crime. Today to control cyber-crimes we having lots of techniques, Cryptography is one of them. The Cryptography is an art of hiding data or information from unauthorized users. The importance of cryptography to securing data or information and some major cyber-crimes are studied through this research paper.
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used... more
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used separately. A hybrid encryption algorithm mixing AES and RSA algorithms is suggested in this paper to overcome the above issues in order to solve file encryption performance and security problems. The experimental results suggest that the RSA and AES hybrid encryption algorithm can not only encrypt files, but also provide the benefits of efficiency and protection of the algorithm.
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a day's every... more
Cybercrime is defined as a crime in which a computer is the object of the crime or is used as a tool to commit an offense. Cyber Security is a system of defending information, servers and network from malicious attacks. Now a day's every information or data is digitalises which are stored in server, clouds and other resources. The more data we store the more organized crime is ready to devour it. Now a day's online lifestyle gives enormous opportunities to reach anyone from anywhere but this gives chances to cyber-crime. Today to control cyber-crimes we having lots of techniques, Cryptography is one of them. The Cryptography is an art of hiding data or information from unauthorized users. The importance of cryptography to securing data or information and some major cyber-crimes are studied through this research paper.
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used... more
File encryption is an easy means of securing personal or business data protection. The RSA and AES representative encryption algorithms are not capable of satisfying the criteria of file encryption reliability and security when used separately. A hybrid encryption algorithm mixing AES and RSA algorithms is suggested in this paper to overcome the above issues in order to solve file encryption performance and security problems. The experimental results suggest that the RSA and AES hybrid encryption algorithm can not only encrypt files, but also provide the benefits of efficiency and protection of the algorithm.
To enable the sensitive sharing of data between any sender and recipient, safe contact is essential. The protection of information exchanged over an open channel has become a fundamental problem and secrecy, authentication and integrity... more
To enable the sensitive sharing of data between any sender and recipient, safe contact is essential. The protection of information exchanged over an open channel has become a fundamental problem and secrecy, authentication and integrity of data are therefore necessary. The method of shielding information against unauthorized access is Information Protection. For the purpose of keeping the transmission of information secure, cryptographic methods are used. Nearly all cryptosystems are vulnerable to cryptographic attacks of various kinds. Hence, when using variations of cryptographic algorithms, there is a need to encrypt the device. Algorithm hybridization is a valuable scheme that offers solutions to several major communication network issues. The characteristics of the algorithms used in hybrid cryptography are thus described in a thorough study of different hybrid cryptosystems suggested by various researchers.
In this paper there are modifications in the RSA algorithm by using more than four prime numbers in the combination of public and private key by using this factoring complexity of variables is increased. This is a new technique to provide... more
In this paper there are modifications in the RSA algorithm by using more than four prime numbers in the combination of public and private key by using this factoring complexity of variables is increased. This is a new technique to provide max security for data over the internet. In this technique we are using more than four prime numbers which is not easily decomposed this technique provides more efficiency and reliability over the network. In this paper we try to increase the level of security by modifying the RSA Encryption Algorithm.
As we know that present time is very hard for entire world due to the COVID-19 Pandemic for that reason the use of the internet has been increased because many countries gives order for lockdown. In this lockdown time every people using... more
As we know that present time is very hard for entire world due to the COVID-19 Pandemic for that reason the use of the internet has been increased because many countries gives order for lockdown. In this lockdown time every people using the internet for everything such as fund transfer, news, and social media and mostly for education, this increases the chance of cyber attack. In this COVID-19 scenario all education, government offices and Banks are providing their services online. The Cyber criminals take the advantage of this by using ford mails, ford organization for COVID-19 Relief fund etc. This is the major challenge of cyber security for protecting the data from cyber criminals. We know that the Cyber Security, a mechanism by which computer information and the equipments are protected from unauthorized and illegal access. Cyber Security plays an important role in the development of information technology and Internet services. Enhancing cyber security and maintaining critical information infrastructures are important to the security and economic well-being of each country. Making the Internet safer (and protecting Internet users) has been an important part of the growth of digital technologies as well as government policy. Recently, cyber security has emerged as a well-established discipline for computers and networks, with the goal of securing sensitive information contained in such systems from those who seek to acquire, manipulate, kill or prevent access to it.The war against cyber crime needs a systematic and more safe strategy. Considering that technical solutions alone can not deter any crime, it is important that law enforcement authorities are able to investigate and prosecute cyber crimes effectively. Today, several nations and governments are enforcing strict laws on cyber securities to avoid the loss of any essential information. Every person must also be trained in this information protection and must be spared from these that cyber crimes. This paper discusses the existing problems of information security, as well as several ideas for the prevention of cyber crimes.