Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
The data flows between two machines that i.e. source and destination the data should be locked in the two keys that are called Private and public keys. The algorithm that used to make strong security in data flow inside the computer network; in this research work is RSA. The algorithmused to encrypt and decrypt the flow of data between the source (A) and Destination(B). If the source (A) sends data to Destination (B) then my experiment could automates first A encrypts the message or Plaintext by using sources (A) private key and Public keys of A.In general, RSA data encrypting method useful to secure and lock data in the computer network.
The tremendous increase in the use of mobile and wireless devices with limitations on power and bandwidth postulates a new generation of Public Key Cryptography (PKC) schemes. These PKC schemes should overcome the limitations of the mobile and wireless devices and help in achieving efficiency. At the same time, the new PKC schemes should be capable enough to provide an adequate level of security for such devices. This paper brings a hybrid cryptographic encryption scheme on both client and server machines to allow encrypted password protection. This paper examines the use of hybrid cryptographic in such a constrained environment along with the other two aspects, namely its security and efficiency. This is a one-way encryption scheme: the password is never transmitted or stored as clear text on the client or server, and thus cannot be recovered. This ensures a more robust and lightweight encryption algorithm that provides integrity, authentication, confidentiality and reliability.The performance of hybrid is compared with the other PKC applications which should prove that hybrid performs better and is more suitable for constrained environments.
The symmetric key encryption is a method relatively fast. Distribution of symmetric key involves third party which increase security risk when the intruder manage to get the key. The asymmetric encryption with the use of different keys is advantage. The encryption key is shared with public, since the receiver of data keep the decryption key. The key distribution is an advantage for asymmetric key encryption however is very slow. The slowness of asymmetric algorithms gives open windows for attackers to compute for huge data. This research proposes hybrid encryption technique using Advanced Encryption Standard and Rivest Shamir Adleman, symmetric and asymmetric respectively. This work is to analyze how to encrypt data by symmetric key, then distribute key using asymmetric encryption. Analyze how securing the data and the key itself using hybrid encryption, with possible option of making it significantly secured. Practically we use RSA asymmetric, AES symmetric, hashing function and digital signature to enhance the security of data. The enhancement based on security requirements satisfied by cryptography. We discuss the main ideas and compare both algorithms, security functionalities, do analysis on functionalities. After the discussion we design a hybrid encryption technique.
E-commerce has presented a new way of doing transactions all over the world using internet. The success of ecommerce depends greatly on how its information technology is used. Over the years the rate at which ecommerce sensitive information is sent over the internet and network has increased drastically. It is for this reason that every company wants to ensure that its ecommerce information is secured. There is need for ecommerce information transmitted via the internet and computer networks to be protected. There is substantial growth in the areas of credit card fraud and identity theft because the internet is a public network with thousands of millions of users. Amongst users are crackers or hackers that carry out the credit card fraud and identity theft in numerous ways facilitated by poor internet security; a concern regarding the exchange of money securely and conveniently over the internet increases. The criticality, danger, and higher priority importance of any e-commerce money transfer makes it a hot area of research interest in modern computer science and informatics. E-commerce industry is slowly addressing security issues on their internal networks but security protection for the consumers is still in its infancy, thus posing a barrier to the development of e-commerce. There is a growing need for technological solutions to globally secure ecommerce transaction information by using appropriate data security technology. The technology solution proposed for solving this security problem is the RSA cryptosystem. This research paper focuses on securing ecommerce information sent through the computer network and internet using RSA cryptography. It elucidates the implementation of RSA algorithm and shows that ecommerce security powered with RSA cryptography is very important in ecommerce transaction. While many attacks exist, the system has proven to be very secure.
Nowadays due to advancement in network and computing technology it is easily possible for people to share their ideas with others using online external storage. For example as we all know these days online social networking sites are an important part of every day's life. People can easily share their data with others using online social network like Facebook, twitter etc. or if we take another example these day's peoples are also uploading their highly sensitive Personal Health Record (PHR) on online data server such as Microsoft Health Vault, Google Health for ease of sharing with their primary doctors or for cost saving. As peoples enjoy benefits of these new technologies at the same time they are having concern about the data that they are uploading on such online external server like Facebook, twitter, and Google health etc. Improper use of the data by such online external server or unauthorized access by outside user could be potential threat here. People would like to make their sensitive or private data which they are uploading on such online external server only accessible to authorized people with credentials they specified. To manage fine grained data access control here we have implemented Enhanced Attribute Based Encryption (EABE) method which enables data owners to define their own access policies over user attributes and enforce the policies in the data to be distributed. This method also removes Key Escrow Problem by using escrow free key issuing protocol which is constructed using secure two-party computation between the key generation center and the data-storing center. The performance and security analysis indicate that this method is efficient to securely manage the data distributed in the data sharing system.
overall notes description of security
Computer Science & Information Technology (CS & IT)
A SURVEY ON ENHANCED RSA ALGORITHMSJournal 4 Research - J4R Journal
Security Based Issues in View of Cloud Based Storage System2017 •
Science and Education Publishing
Review on Network Security and CryptographyIEEE Transactions on Consumer Electronics
Zero-configuration identity-based IP network encryptor2000 •