Journal articles on the topic 'Confidentialité Blowfish'

To see the other types of publications on this topic, follow the link: Confidentialité Blowfish.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 35 journal articles for your research on the topic 'Confidentialité Blowfish.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Et. al., Pravin Soni,. "Performance Analysis of Cascaded Hybrid Symmetric Encryption Models." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 2 (April 10, 2021): 1699–708. http://dx.doi.org/10.17762/turcomat.v12i2.1506.

Full text
Abstract:
Over a few years, there is rapid increase of exchange of data over the net has brought data confidentiality and its privacy to the fore front. Data confidentiality can be achieved by implementing cryptography algorithms during transmission of data which confirms that data remains secure and protected over an insecure network channel. In order to ensure data confidentiality and privacy, cryptography service encryption is used which makes data in unreadable form while the reverse process rearranges data in readable form and known as decryption. All encryption algorithms are intended to provide confidentiality to data, but their performance varies depending on many variables such as key size, type, number of rounds, complexity and data size used. In addition, although some encryption algorithms outperform others, they have been found to be prone to particular attacks. This paper reviews and summarizes the various common hybrid cascaded n-tier encryption models. Additionally, this paper compares and analyzes the performance of common hybrid cascaded 2-tier and 3-tier encryption models obtained during simulation based on encryption/decryption time, avalanche effect and throughput. The models compared with AES are 2-tier models (AES-TWOFISH, AES-BLOWFISH, TWOFISH-AES, BLOWFISH-AES, AES-SERPENT and SERPENT-TWOFISH) and 3-tier models (DES-BLOWFISH-AES, AES-TWOFISH-SERPENT and SERPENT-TWOFISH-AES). The hybrid cascaded model like AES-TWOFISH, AES-BLOWFISH and SERPENT-TWOFISH-AES are better hybrid models with respect to throughput and avalanche effect.
APA, Harvard, Vancouver, ISO, and other styles
2

Ezadeen, Shamil, and Auday H. Alwattar. "Survey of Blowfish Algorithm for Cloud." Technium: Romanian Journal of Applied Sciences and Technology 4, no. 6 (June 28, 2022): 18–28. http://dx.doi.org/10.47577/technium.v4i6.6791.

Full text
Abstract:
Abstract. Security is the study of encryption and decryption, data hiding, potential attacks, and performance evaluation. Many algorithms perform this purpose. Blowfish is a symmetric block cipher that uses the Feistel network. Although several works employed the Blowfish algorithm for the security of the cloud, there is still no article that lists previous studies. Cloud computing is the transmission of computer services such as servers, storage, databases, networking, software, analytics, and intelligence through the Internet ("the cloud") in order to provide faster innovation, more flexible resources, and cost savings. The most common issue with cloud computing is information security, privacy, confidentiality, and how the cloud provider ensures these services. This paper includes a survey of most previous works that were concerned with using the Blowfish algorithm in achieving cloud security
APA, Harvard, Vancouver, ISO, and other styles
3

Riza, Ferdy, Nurmala Sridewi, Amir Mahmud Husein, and Muhammad Khoiruddin Harahap. "Analisa Frekuensi Hasil Enkripsi Pada Algoritma Kriptografi Blowfish Terhadap Keamanan Informasi." Jurnal Teknologi dan Ilmu Komputer Prima (JUTIKOMP) 1, no. 1 (April 1, 2018): 11–15. http://dx.doi.org/10.34012/jutikomp.v1i1.233.

Full text
Abstract:
The ease of sending data with the development of internet technology technology is now a concern, especially the problem of data confidentiality, integrity and information security. Cryptography is one of the techniques used to maintain data confidentiality and information security, the application of cryptographic techniques for information security and data integrity is highly dependent on the formation of keys. In this study proposed a frequency analysis approach to measure the level of information security of blowfish encryption results to determine the distribution form of each character used in the text and find out the exact frequency of each character used in the test text data. The encryption algorithm and description of blowfish method against plaintext are proven to be accurate, but the longer the key character used will greatly affect the level of information security that came from encryption process, this is based on the results of the frequency analysis conducted.
APA, Harvard, Vancouver, ISO, and other styles
4

Haryono, Wasis. "Comparison Encryption of How to Work Caesar Cipher, Hill Cipher, Blowfish and Twofish." Data Science: Journal of Computing and Applied Informatics 4, no. 2 (July 31, 2020): 100–110. http://dx.doi.org/10.32734/jocai.v4.i2-4004.

Full text
Abstract:
Security is the level of confidentiality of data stored using cryptography. There are many ways you can do to improve security. In this study, the writer will use a method by encrypting the database with the Caesar Cipher Algorithm, Hill Cipher and Blowfish. Caesar Cipher, Hill Cipher and Blowfish are part of the symmetric algorithm, which means that the encryption and decryption process have the same key. The encryption and decryption process in Caesar Cipher, Hill Cipher and Blowfish Algorithms each has one key. algorithm encryption techniques using symmetric passwords have 2 types, namely block ciphers and stream ciphers. Caesar Cipher, Hill Cipher and Blowfish and Twofish Algorithms are the encryption of the block cipher that breaks or creates blocks to encrypt and obtain cipher text. Result in this paper In Caesar Cipher, it is carried out like 3 blocks of encryption. Whereas in Hill Cipher a word is divided into several blocks and each block is encrypted. In Blowfish, several iterations are performed to get the text cipher, the input is 64 bits of data that can be done as many as 16 iterations. In Twofish the input is 128 bits, in contrast to Blowfish which is only 64 bits, Twofish can also accept 256 bits long and do 16 iterations to get the cipher text. Twofish has stronger security than the 3 algorithms above, Twofish also takes up more memory and takes longer to encrypt.
APA, Harvard, Vancouver, ISO, and other styles
5

Simanullang, Harlen Gilbert, and Arina Prima Silalahi. "ALGORITMA BLOWFISH UNTUK MENINGKATKAN KEAMANAN DATABASE MYSQL." METHODIKA: Jurnal Teknik Informatika dan Sistem Informasi 4, no. 1 (March 10, 2018): 10–14. http://dx.doi.org/10.46880/mtk.v4i1.58.

Full text
Abstract:
The limitations of humans to maintain the security and confidentiality of stored data can have a bad impact if it is used by unauthorized parties. One way to secure shipping is to convert data into one that is not understood by encoding and insertion using cryptographic techniques. Cryptography is the study of system security, where the system needs to be secured from interference or threats from irresponsible parties. One of the cryptographic algorithms is the Blowfish Algorithm. The Blowfish algorithm is a modern cryptographic algorithm symmetrical key-shaped block cipher. The Blowfish algorithm is quite simple but strong enough because it has a long keyspace, making it difficult to attack. Encryption is done by using a certain key, so as to produce ciphertext (files that have been encrypted or encoded) that cannot be read or understood. The ciphertext can be restored as if it was decrypted using the same key when encrypting the file. The key length used can affect the security of the algorithm. The decryption flow is almost the same as the Blowfish Algorithm encryption, except in the P-array (P1, P2, ..., P18) done by invading. Information of a system is certainly stored in a database that is always possible to attack but using cryptography then the problem can be overcome. By using the Blowfish algorithm, information security in a MySQL database can be improved.
APA, Harvard, Vancouver, ISO, and other styles
6

Ren, Xun Yi, Jun Feng Zhang, Yang Yu, and Hai Ping Wan. "Hybrid Encryption Scheme of EOC Traffic." Advanced Engineering Forum 6-7 (September 2012): 907–12. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.907.

Full text
Abstract:
To improve the security of EoC network traffic, the hybrid encryption scheme was presented. The relevant encryption algorithm was analyzed, and the hybrid encryption scheme was proposed for EOC downlink traffic encryption, in which ECC algorithm is taken to produce and encrypt session key, and Blowfish algorithm is improved to encrypt the broadband-authorized frame and downlink data. The security analysis show the encryption scheme can guarantee the integrity and confidentiality of the data in the EoC transmission process.
APA, Harvard, Vancouver, ISO, and other styles
7

Quilala, Rogel Ladia, and Theda Flare Ginoy Quilala. "Document verification using quick response code with modified secure hash algorithm-1 and modified blowfish algorithm." Indonesian Journal of Electrical Engineering and Computer Science 28, no. 1 (October 1, 2022): 470. http://dx.doi.org/10.11591/ijeecs.v28.i1.pp470-479.

Full text
Abstract:
A previous study has been conducted integrating modification on secure hash algorithm 1 (SHA-1) to document integrity verification of printed documents using quick response (QR) codes. However, encryption is warranted as data is transmitted in plaintext directly to the server to prevent hacking and ensuring not only data integrity but data security as well. A more secured document integrity verification using QR code was designed and developed by successfully incorporating a better hashing algorithm– modified SHA-1 and integrating a modern encryption algorithm–modified blowfish algorithm. By integrating both, data integrity and data confidentiality is assured as compared to previous research. The developed software was checked against user requirements to check the acceptability of the software. Error rate and accuracy were also checked to see how the software performed. Based on the testing conducted, it has been found that the document integrity verification software using QR code with the integration of modified SHA-1 hash and Modified Blowfish encryption was acceptable, accurate, and more secure.
APA, Harvard, Vancouver, ISO, and other styles
8

Et. al., Dr M. Buvana,. "Optimize Cryptography Algorithm for Efficient Data Security on Cloud Computing." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 1S (April 11, 2021): 459–64. http://dx.doi.org/10.17762/turcomat.v12i1s.1905.

Full text
Abstract:
Services in the cloud environment are distributed between all servers and users. Cloud providers have problems with file protection as security is a major problem when processing and transferring information, as the original data type can be viewed, misused and lost. In the cloud computing world, cloud protection is a major concern. A variety of research projects are planned to safeguard the cloud climate. Cryptography is used to address the security problem and to achieve the CIA (confidentiality, honesty and disponibility). The most effective technique for ensuring high data transfer and storage protection is cryptography. There are certain drawbacks in traditional symmetric and asymmetrics. We will introduce a new technique of hybrid data protection and confidentiality to solve this issue. We use the ECC and Blowfish to build a hybrid algorithm in this article. The hybrid scheme output is compared to the current hybrid technique and demonstrates the high safety and confidentiality of the patient data in the proposed method. The hybrid encryption is used to remove both symmetrical and asymmetrical drawbacks.
APA, Harvard, Vancouver, ISO, and other styles
9

Rifa’i, Annas, and Lilis Cucu Sumartini. "IMPLEMENTASI KRIPTOGRAFI MENGGUNAKAN METODE BLOWFISH DAN BASE64 UNTUK MENGAMANKAN DATABASE INFORMASI AKADEMIK PADA KAMPUS AKADEMI TELEKOMUNIKASI BOGOR BERBASIS WEB-BASED." Jurnal E-Komtek (Elektro-Komputer-Teknik) 3, no. 2 (November 12, 2019): 87–96. http://dx.doi.org/10.37339/e-komtek.v3i2.133.

Full text
Abstract:
Data is a very authentic evidence that need to be saved because the data are at risk of data changes by the party who wanted to misuse the data or no effect on the data. Therefore, so that no unauthorized person to change the existing data, stored or can take the data that is very important, we need a method to be able to secure and keep data. The database is used to keep data and information. The whole system stores the data in the database, so that the contents of stored data security and confidentiality must be maintained. To maintain the security of a security that is required cryptography. With the use of databases that are in can be connected to each other, Database is not just a place to store data,Computer security system is needed at this time in line with the increase use of computers in the world. So existing data security has become seriously threatened to be accessed by people who are not responsible. Computer security becomes very important at this time because it is related to the privacy, integrity, authentication and confidentiality. Thus data need to be stored by using the correct storage techniques, so that the confidentiality and security of data is maintained. Cryptographic techniques with engineering data encryption on the database is one solution that can be used to meet the confidentiality and Data Security settings. With the existence of a cryptography that includes the encryption process, the data in the database can be encoded so that unauthorized persons can not read the information, in addition to those who know the key to describing it. Security of data / information document with a cryptographic technique that uses the Blowfish algorithm chosen method for cryptographic key modernmerupakan shaped symmetric block cipher. Blowfish algorithm which can encrypt text built in text form. Encryption is done using a specific key, resulting ciphertext that can not be understood. The ciphertext can be changed back as the beginning if the decryption using the same key in the beginning when the database mengekripsi.
APA, Harvard, Vancouver, ISO, and other styles
10

Raut, Kinjal. "A Comprehensive Review of Cryptographic Algorithms." International Journal for Research in Applied Science and Engineering Technology 9, no. 12 (December 31, 2021): 1750–56. http://dx.doi.org/10.22214/ijraset.2021.39581.

Full text
Abstract:
Abstract: The internet has revolutionized advancements, it’s conveniences and uses come at the price of new perils. To be safe from being the victim of fraud, theft and other damage security and vigilance is critical. Cryptography plays an important role in securing information and communications using a set of rules, it ensures the integrity of our data. It maintains confidentiality by protecting the privacy of personal information stored in enterprise systems. Hence Encryption is the only way to ensure that your information remains secure while it is stored and being transmitted. Cryptographic Algorithms mathematically maintain the integrity, confidentiality and authenticity of sensitive information by preventing data disclosure, data tampering and repudiation. The three main types of cryptography are Symmetric Key Cryptography, Asymmetric Key Cryptography and Hash Functions. In this Paper, several important algorithms used for encryption and decryption are defined and analysed, the algorithms are DES, AES, ECC, RSA, MD5 Keywords: Cryptography, Encryption, Decryption, AES, DES, ECC, RSA, Blowfish, MD5
APA, Harvard, Vancouver, ISO, and other styles
11

Sharma, Arvind K., and S. K. Mittal. "Cryptographic Merkle-Damgard Hash Construction: MD5 Vulnerabilities." Journal of Computational and Theoretical Nanoscience 17, no. 6 (June 1, 2020): 2435–40. http://dx.doi.org/10.1166/jctn.2020.8913.

Full text
Abstract:
Cryptography is a branch of Computer-Science which fully devotes towards further enhancements or innovations of various applications concern to information security i.e., to manage Confidentiality/ Integrity of resources. Confidentiality of resources most probably look after by ‘Encryption–Decryption’ techniques like ‘DES,’ ‘AES,’ ‘Blowfish,’ ‘Two-Fish,’ etc., were as ‘Integrity’ managed by Hash Functions, which have a distinct paramount significance in Network-Security/Computer- Security/Internet-Security. Both the ‘Integrity’ of data and ‘Authenticity’ of resource proved with the help of digest generated by the Hash algorithm. There are several hash algorithms available to provide distinct security, depends on how hard is to break it and pre-defined resource utilization (time/space). Some well-known names are MD4, MD5, SHA, JH, Skein, Grøstl, Blake, Hamsi, Fugue, Crush, Whirlpool, Tav, etc. In this article, we are focusing on vulnerabilities in the Merkle- Damgard scheme for constructing Hash-Functions with suitable implementation of MD5.
APA, Harvard, Vancouver, ISO, and other styles
12

Alshannaq, Osama, Mohd Rizuan Baharon, Jamil Abedalrahim Jamil Alsayaydeh, Montaser B. A. Hammouda, Khalid Hammouda, Mohammad Mahmoud Nawafleh, and A. I. A. Rahman. "Analysis of the Lowest Memory Consumption (Memory Usage) Through Running Different Cryptography Techniques for Different Types of Images." Journal of Physics: Conference Series 2319, no. 1 (August 1, 2022): 012027. http://dx.doi.org/10.1088/1742-6596/2319/1/012027.

Full text
Abstract:
Abstract Nowadays security of image communication systems is highly important. It is essential to provide protection for image data confidentiality from illegal users. The detection and identification of unauthorized users is still a difficult and complex task. Many researchers have proposed several works to provide security of the transmission of the image. The objective of this article is to provide a comparative study of the current techniques that have been widely used. This article concentrates on various types of cryptography algorithms that are existing, like AES, MAES, DES, 3DES, RSA, and Blowfish, and investigation the lowest energy consumption (memory usage) through running several cryptographic algorithms on different image formatting.
APA, Harvard, Vancouver, ISO, and other styles
13

Isiaka O.S., Murtala K., Ibraheem A.F., and Bolaji-Adetoro D.F. "HYBRIDIZATION OF RSA AND BLOWFISH CRYPTOGRAPHY ALGORITHMS FOR DATA SECURITY ON CLOUD STORAGE." International Journal of Engineering Technologies and Management Research 6, no. 12 (April 3, 2020): 29–34. http://dx.doi.org/10.29121/ijetmr.v6.i12.2019.471.

Full text
Abstract:
Security is provided for data according to the requirements of client. Cloud computing provides different types of services. Apart from the advantages of cloud, it has many security related issues. The topmost challenge in cloud is data security. There are more possibilities that the data are accessed by the other users of cloud storage. Data security must be addressed in the cloud storage. Cryptography is the most known technique for securing the data by encryption. It is necessary to propose encryption techniques which are suitable for cloud storage. Every cloud computing provides the different level of security. The aim of this study is to improve on the security of data or file stored on cloud storage using hybrid cryptographic algorithms for encryption. The algorithms are designed in such a way that one authenticates the authorized user and the other provides confidentiality and security for data stored on cloud.
APA, Harvard, Vancouver, ISO, and other styles
14

Singh, Pankaj, and Sachin Kumar. "Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish." International Journal of Engineering & Technology 7, no. 1.5 (December 31, 2017): 221. http://dx.doi.org/10.14419/ijet.v7i1.5.9150.

Full text
Abstract:
Cryptography is about protecting the data from third parties or from public to read confidential data. Cryptography mainly focuses on encrypting the data or we can say converting the data and decrypting the actual data or we can say reconverting the data by different methods. These encryption and decryption methods are based on mathematical theories and are implemented by computer science practices. But as cryptography progressed ways were found to decode the secured data and view actual data. This was also done by the use of mathematical theories and computer science practices. Popular algorithms which are used in today’s world are, AES (Advance Encryption Standard), Blowfish, DES (Data Encryption Standard), T-DES (Triple Data Encryption Standard), etc. Some of the previously known algorithms were RSA (Rivest–Shamir–Adleman), ECC (Elliptic curve cryptography), etc. These algorithms have their own advantages and drawbacks. But as people were progressing more in breaking them down, these algorithms were supported by digital signatures or hash done by different algorithms like MD5, SHA, etc. By these means data integrity, data confidentiality, and authentication of data are maintained. But as the things are progressing it seems that new advancements are always needed in the field of cryptography to keep the data secure.
APA, Harvard, Vancouver, ISO, and other styles
15

Solanki, Madan, and Prof (Dr ). Vrinda Tokekar. "Design and Implementation of Strong Security Architecture for Amazon Web Service based on Cloud Applications." International Journal of Innovative Technology and Exploring Engineering 11, no. 12 (November 30, 2022): 17–22. http://dx.doi.org/10.35940/ijitee.l9324.11111222.

Full text
Abstract:
Cloud applications are becoming a necessary part of modern life. Security is one of the most important non-functional requirements of every solution. Early days, security and data privacy was just luxury part of software development and it was an optional requirement but nowadays it plays a critical role in daily life. The presented work will be made to observe the need for symmetric security algorithms in Cloud application with Amazon web service. This work observes that the current security level of existing applications recommend improved security solutions to enhance the security level as well performance of proposed architecture. This work recommends Blowfish, RC6 algorithm (symmetric key cryptography) can be used to achieve confidentiality during communication Amazon web service Platform. It also considers the MD5 algorithm to maintain the integrity and modified Kerberos algorithm to achieve authentication. The complete work will propose a security architecture having solution to achieve confidentiality, integrity with strong authentication policy for Cloud application development in Amazon web service. The strong security architecture provide for data and minimum executive time in upload and download file, different key size, file size and chunking size in file. File size divided into chunk 512 bit, 1024 bit, 2048 bit after process in Amazon web service, we are found the optimum time are chunking file size 2048 bits reduce time in encryption and decryption data process and maintain strong security data file in communication including file size 5, 10, 15 and 20 Megabyte.
APA, Harvard, Vancouver, ISO, and other styles
16

Saad, Mahaba, Khalid Youssef, Mohamed Tarek, and Hala Abdel-Kader. "Architecture of ASIP Crypto-Processor for Dynamic Runtime Security Applications." Indonesian Journal of Electrical Engineering and Computer Science 4, no. 2 (November 1, 2016): 412. http://dx.doi.org/10.11591/ijeecs.v4.i2.pp412-423.

Full text
Abstract:
<p>Nowadays, demands of data security are increasing, especially after introduction of wireless communications to the masses. Cryptographic algorithms are mainly used to obtain confidentiality and integrity of data in communication. There are a variety of encryption algorithms have been developed. This paper provides quantitative analysis and comparison of some symmetric key cryptographic ciphers (DES, 3DES, AES, Blowfish, RC5, and RC6). The quantitative analysis approach is a step towards optimizing the security operations for an efficient next generation family of network processors with enhanced speed and power performance. A framework will be proposed as a reference model for quantitative analysis of security algorithm mathematical and logical operations. This paper also provides a dynamic crypto processor used for selected symmetric key cryptographic ciphers and provides an implementation of 16bit cryptographic processor that performs logical operations and arithmetic operations like rotate shift left, modular addition 2^16, S_box operation, and key expansion operation on spartan6 lower power, xc6slx150L-1lfgg676 FPGA. Simulation results show that developed processor working with high Speed, low power, and low delay time. </p>
APA, Harvard, Vancouver, ISO, and other styles
17

Kumar, Pradeep, Kakoli Banerjee, Niraj Singhal, Ajay Kumar, Sita Rani, Raman Kumar, and Cioca Adriana Lavinia. "Verifiable, Secure Mobile Agent Migration in Healthcare Systems Using a Polynomial-Based Threshold Secret Sharing Scheme with a Blowfish Algorithm." Sensors 22, no. 22 (November 8, 2022): 8620. http://dx.doi.org/10.3390/s22228620.

Full text
Abstract:
A mobile agent is a software application that moves naturally among hosts in a uniform and non-uniform environment; it starts with one host and then moves onto the next in order to divide data between clients. The mobile paradigm is utilized in a wide assortment of medical care applications such as the medical information of a patient, the recovery of clinical information, the incorporation of information pertaining to their wellbeing , dynamic help, telemedicine, obtaining clinical data, patient administration, and so on. The accompanying security issues have grown in tandem with the complexity and improvements in mobile agent technologies. As mobile agents work in an insecure environment, their security is a top priority when communicating and exchanging data and information. Data integrity, data confidentiality and authentication, on-repudiation, denial of service, and access control, are all key security concerns with mobile agent migration. This paper proposes a Verifiable, Secure Mobile Agent Migration model, based on two polynomials (t, n), and an edge secret imparting plan with Blowfish encryption, to enable secure information transmission in clinical medical care.
APA, Harvard, Vancouver, ISO, and other styles
18

Lalita Kumar Parvataneni, Mohith, Eswara Sai Nath Adusumalli, and Rajeshbabu C. "Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud." International Journal of Engineering & Technology 7, no. 2.24 (April 25, 2018): 311. http://dx.doi.org/10.14419/ijet.v7i2.24.12071.

Full text
Abstract:
Cloud computing [1] is the most upcoming area of the IT industry that helps the users to get rid of the hardware resources and complexity in storage and computational power. All the people started using cloud which led to many security concerns relating to the data confidentiality and integrity. This became a challenge to the widespread of the new cloud computing technology. Many measures are taken to improve the cloud security and then there came the concept of cryptography to upgrade the cloud security. Today, the main problem is to sustain data privacy [2] against unreliable cloud service providers and to provide correct query results to the authenticated users. Existing approach provide confidentiality using only one symmetric encryption algorithm which generates only one secret key to both encrypt and decrypt. But this is not so secured as the attacker can easily guess the algorithm and thereby find the key. In this journal, we proposed a randomized encryption technique in which the files are randomly encrypted by three strong algorithms AES, Triple DES and Blowfish [3] which improves the security and we are also implementing new techniques to improve security like key generation via OTP method, etc. In addition to this, we are also going to solve the storage issue of redundant or duplicate files consuming the cloud storage by using a file-level de-duplication technique which can eliminate the duplication of files uploaded into the cloud, thereby saving storage and reduce the need to buy extra storage.
APA, Harvard, Vancouver, ISO, and other styles
19

Jabbar, Arshi, and Prof Umesh Lilhore. "Design and Implementation of Hybrid EC-RSA Security Algorithm Based on TPA for Cloud Storage." SMART MOVES JOURNAL IJOSCIENCE 3, no. 11 (November 30, 2017): 6. http://dx.doi.org/10.24113/ojsscience.v3i10.148.

Full text
Abstract:
Cloud storage is one among the service provided by Cloud computing within which information is maintained, managed, secured remotely and created available to users over a network. The user concerning about the integrity of data hold on within the cloud because the user’s data will be attacked or changed by outside attacker. Therefore, a new thought referred to as information auditing is introduced that check the integrity of knowledge with the assistance of an entity referred to as Third Party Auditor (TPA). The aim of this work is to develop an auditing scheme that is secure, economical to use and possess the capabilities like privacy conserving, public auditing, maintaining the information integrity together with confidentiality. It comprises 3 entities: data owner, TPA and cloud server. The data owner performs numerous operations like splitting the file to blocks, encrypting them, generating a hash value for every, concatenating it and generating a signature on that. The TPA performs the main role of knowledge integrity check. It performs activities like generating hash value for encrypted blocks received from cloud server, concatenating them and generates signature on that. It later compares each the signatures to verify whether or not the information stored on cloud is tampered or not. It verifies the integrity of data on demand of the users. To make sure data protection or security of cloud data storage at cloud end, security architecture is designed that secures the data using encryption/decryption algorithm where the proposed algorithm is a hybrid encryption algorithm that uses the concept of EC-RSA, AES algorithm and Blowfish algorithm along with SHA-256 for auditing purpose. Presented experiment results show that the proposed concept is reasonable, it enhancing efficiency about 40% in terms of execution time i.e. encryption as well as decryption time and security and providing confidentiality of cloud data at could end.
APA, Harvard, Vancouver, ISO, and other styles
20

Chandrasekaran, Jeyamala, and S. J. Thiruvengadam. "Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/458272.

Full text
Abstract:
Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.
APA, Harvard, Vancouver, ISO, and other styles
21

Goyal, Mani, and Avinash Sharma. "A Framework for Assessing Security Strength of Cloud Computing Service." Journal of Computational and Theoretical Nanoscience 16, no. 10 (October 1, 2019): 4389–93. http://dx.doi.org/10.1166/jctn.2019.8530.

Full text
Abstract:
Cloud computing is mentioned to evolve dynamically and cloud transformation is getting easier all the time. Different cloud aspects are emerging in an efficient manner and have the potential to transform the traditional way of computing. With the advent of data sharing in cloud computing, the demand for outsourcing data has rapidly increased in the last decade. However, several security and privacy challenges exist impeding the acceptance of cloud computing. A highly secure system is required to guard an organizational entity, its resources, and assets. In this article, we propose and implement a novel architecture, the first of its kind, providing an enhanced level of security for outsourcing data in a cloud computing environment consisting of multiple independent cloud providers. The framework consists of dual encryption combining Homomorphic encryption at the client end and Blowfish cryptographic technique at the server side for authorization. The diverse security issues associated with information integrity, security, confidentiality, and authenticationmust be addressed. Simulations and analysis were performed on an Oracle virtual machine Virtual-Box and a Fog environment on Ubuntu 12.04 platform. Extensive safety measures and performance analysis considering the Encrypted file size and Encryption time demonstrate that our projected proposal is vastly proficient and satisfies the requirements for secure data sharing.
APA, Harvard, Vancouver, ISO, and other styles
22

Dener, Murat. "SDA-RDOS: A New Secure Data Aggregation Protocol for Wireless Sensor Networks in IoT Resistant to DOS Attacks." Electronics 11, no. 24 (December 15, 2022): 4194. http://dx.doi.org/10.3390/electronics11244194.

Full text
Abstract:
In a typical Wireless Sensor Network (WSN), thousands of sensor nodes can be distributed in the environment. Then, each sensor node transmits its detected data to the base station with the help of cooperation. In this type of network, data aggregation protocols are used to increase the network’s lifetime and reduce each sensor node’s communication load and energy consumption. With Data Clustering, the density of data circulating in the network is reduced, thus increasing the network’s life. Energy, delay, and efficiency are essential criteria in Data Clustering; however, security is another crucial aspect to be considered. A comprehensive solution for secure data clustering has yet to be seen when the literature is examined. In the solutions developed, data availability, which means that the WSN is resistant to Denial of Service (DOS) attacks, has been neglected too much, even though confidentiality, integrity, and authentication are met with different algorithms. This study developed a comprehensive, secure clustering protocol by considering all security requirements, especially data availability. The developed protocol uses the blowfish encryption algorithm, EAX mode, and RSA algorithm. The proposed protocol was theoretically analyzed, empirically evaluated, and simulated from many perspectives. Comparisons were made with LSDAR, SUCID, and OOP-MDCRP protocols. As a result of the study, a comprehensive security solution is provided and more successful results were obtained according to Energy Efficiency, Network Lifetime, Average Delay, and Packet delivery ratio criteria.
APA, Harvard, Vancouver, ISO, and other styles
23

AbdElminaam, DiaaSalama, Hatem M. Abdul Kader, Mohie M. Hadhoud, and Salah M. El-Sayed. "Developing and Evaluation of New Hybrid Encryption Algorithms." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 13, no. 1 (March 28, 2014): 4038–52. http://dx.doi.org/10.24297/ijct.v13i1.2926.

Full text
Abstract:
Wireless Sensor networks consist of hundreds or thousands of low cost, low power and self-organizing nodes which are highly distributed. As wireless sensor networks continue to grow, so does the need for effective security mechanisms because sensor networks may interact with sensitive data. Encryption algorithms play good roles in information security systems (ISS). Those algorithms consume a significant amount of computing resources such as battery power. Wireless Sensor networks are powered by a battery which is a very limited resource. At present, various types of cryptographic algorithms provide high security to information on networks, but there are also has some drawbacks. The present asymmetric encryption methods and symmetric encryption methods can offer the security levels but with many limitations. For instance key maintenance is a great problem faced in symmetric encryption methods and less security level is the problem of asymmetric encryption methods even though key maintenance is easy. To improve the strength of these algorithms, we propose a new hybrid cryptographic algorithm in this paper. The algorithm is designed using combination of two symmetric cryptographic techniques and two Asymmetric cryptographic techniques. This protocol provides three cryptographic primitives, integrity, confidentiality and authentication. It is a hybrid encryption method where elliptical curve cryptography (ECC) and advanced encryption (AES) are combined to provide node encryption. RSA algorithm and Blowfish are combined to provide authentication and (MD5) for integrity. The results show that the proposed hybrid cryptographic algorithm gives better performance in terms of computation time and the size of cipher text.This paper tries to present a fair comparison between the new protocols with four existing different hybrid protocols according to power consumption. A comparison has been conducted for those protocols at different settings for each protocol such as different sizes of data blocks, and finally encryption/decryption speed. Experimental results are given to demonstrate the effectiveness of each algorithm.
APA, Harvard, Vancouver, ISO, and other styles
24

Alabdulrazzaq, Haneen, and Mohammed N. Alenezi. "Performance Evaluation of Cryptographic Algorithms: DES, 3DES, Blowfish, Twofish, and Threefish." International Journal of Communication Networks and Information Security (IJCNIS) 14, no. 1 (April 15, 2022). http://dx.doi.org/10.17762/ijcnis.v14i1.5262.

Full text
Abstract:
With the advancement of the Internet, many individuals and organizations have started to use it to store and send personal or business information. Some of this information is highly confidential and that, in turn, raises an issue of data privacy and confidentiality. Major advances in the Internet have also aided intruders in getting unauthorized access to confidential information. Information Security is the art of securing data from illegitimate access while ensuring integrity, availability, and confidentiality of data. Information Security is achieved through cryptographic encryption and decryption algorithms. Encryption hides confidential information by converting it to an unreadable form while the reverse process of retrieving data from the unreadable or encrypted form is known as decryption. Many cryptographic algorithms exist today and selecting which one to use depends on several factors and measures. This paper conducts a comparison of the encryption speed for five different cryptographic symmetric block-cipher algorithms: DES, 3DES, Blowfish, Twofish, and Threefish. The simulation is done using Python with various text file sizes. The results show that Blowfish outperforms the rest of the algorithms that were tested.
APA, Harvard, Vancouver, ISO, and other styles
25

Seada Abdu Wakene, Sisay Muleta Hababa, Gutema Seboka Daba, and K S Ananda Kumar. "Data Storage Security in Mobile Cloud Computing (MCC) using Improved Blowfish Algorithm." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, November 15, 2021, 100–111. http://dx.doi.org/10.32628/cseit217620.

Full text
Abstract:
Mobile cloud computing (MCC) combines cloud computing and mobile computing to deliver vast computational resources to mobile consumers, network operators, and cloud computing providers. You may access your data from anywhere in the globe using any mobile device that is linked to the Internet. Cloud computing provides access to data in real-time whenever and wherever want. Any conventional mobile device can benefit from MCC's infrastructure, computational capacity, software, and platform services. Network security, web application security, data access, authentication, authorization, data confidentiality, and data breach are all concerns of MCC's security. Because mobile devices lack sufficient storage and processing power, their data storage capacity is limited. Users of mobile devices may inadvertently provide sensitive information over the network or through the application. Therefore, data security is the main concern for mobile device users. The objective of this paper is to find a solution that can enhance technical requirements with relation to user’s data security and privacy in mobile cloud computing. To achieve this improved blowfish encryption algorithm is used to encrypt each user’s data security and where the shared secret key is hash down using message digest called secured hash function. Hashing can increase the integrity and privacy of user data. The proposed algorithm is evaluated with a normal blowfish algorithm and 3DES with different parameters. Improved blowfish algorithm shows better performance than normal blowfish algorithm and 3DES. In this work, we have developed web-based application where the Amazon MySQL RDS database is used for data storage.
APA, Harvard, Vancouver, ISO, and other styles
26

"Two Layer Image Encryption using Symmetric Key Algorithms." International Journal of Innovative Technology and Exploring Engineering 9, no. 7 (May 10, 2020): 1056–59. http://dx.doi.org/10.35940/ijitee.g5285.059720.

Full text
Abstract:
Security of data (text, audio, and images) is becoming more complex with the increment in its amount. In order to upsurge the reliability, the captcha (Completely Automated Public Turing test to tell Computers and Humans Apart) is used to ensure authenticity. In contrast, even these captchas can be hacked and security can be easily impeached, aim of these captchas is to identify if the user is genuine or else if it is just a robot trying to spam the system. This paper presents auxiliary hybridization of AES and Blowfish cryptographic algorithms for image encipherment and decipherment. Here, AES is using Blowfish as its subroutine where Blowfish encrypts and decrypts the AES encoded image. This is then handed to AES for second level decryption. Here the image which is to be encrypted is applied to AES algorithm, its output is further used as an input for Blowfish algorithm. Output of this doubly encrypted image is then decrypted in the reverse order of encipherment. This auxiliary hybridization adds security to the image rendering it the capacity to become useful in highly important organizations. Private key cryptography uses single secret key at both, the sender and the receiver end. Using symmetric key cryptographic algorithm for this process makes the complete process fast and more secure in comparison to when asymmetric cryptographic algorithms are used for the same purpose. Moreover, symmetric key cryptographic algorithms are more suitable for larger files and images. These also help in maintaining the confidentiality of the data.
APA, Harvard, Vancouver, ISO, and other styles
27

Alwazzeh, Muneer, Sameer Karaman, and Mohammad Nur Shamma. "Man in The Middle Attacks Against SSL/TLS: Mitigation and Defeat." Journal of Cyber Security and Mobility, July 1, 2020. http://dx.doi.org/10.13052/jcsm2245-1439.933.

Full text
Abstract:
Network security and related issues have been discussed thoroughly in this paper, especially at transport layer security network protocol, which concern with confidentiality, integrity, availability, authentication, and accountability. To mitigate and defeat Man-in-the-middle-attacks, we have proposed a new model which consists of sender and receiver systems and utilizes a combination of blowfish (BF) and Advanced Encryption Standard (AES) algorithms, symmetric key agreement to distribute public keys, Elliptic Curve Cryptography (ECC) to create secret key, and then Diffe Hellman (DH) for key exchange. Both SHA-256 hashing and Elliptic Curve Digital Signature Algorithm (ECDSA) have been applied for integrity, and authentication, respectively.
APA, Harvard, Vancouver, ISO, and other styles
28

"Security and Confidentiality of the Data using Block Level in Health Care System." International Journal of Recent Technology and Engineering 8, no. 2 (July 30, 2019): 2947–51. http://dx.doi.org/10.35940/ijrte.b2656.078219.

Full text
Abstract:
Nowadays rapid development of cloud computing in smart healthcare system has significantly improved the quality of health. However, data security and user privacy are a major concern for smart healthcare systems. These days any kind of data can be used for malicious purposes. Many harmful entities constantly try to gain access to the personal data of internet users. This data includes sensitive information that doctors store of patients and is often stored using some kind of third party cloud providing service that is not very secure. To take care of this issue, in this paper, Symmetric Balanced Incomplete Block Design (SBIBD) is utilized for key Security so that unauthorized client can’t get access to the data easily. It also allows the patients immediate and easy access to the data using unique user ID. This system makes use of double encryption using Blowfish algorithm to ensure maximum security of data and the concept of block level is used where data is stored using multiple blocks.
APA, Harvard, Vancouver, ISO, and other styles
29

"An Encryption Algorithm for Enhanced Image Security." International Journal of Engineering and Advanced Technology 9, no. 1S5 (December 30, 2019): 81–84. http://dx.doi.org/10.35940/ijeat.a1020.1291s52019.

Full text
Abstract:
Image security finds its applications in many areas such as bio-metric, digital signatures, watermarking, confidentiality of medical and data in transit. It has become necessary to secure the images in order to protect the confidential data. Cryptography is one of the methodologies through which image data can be secured for storing or transmission purposes by encrypting the same and decrypt it when needed. The main challenge in image encryption is generating cipher which takes less computational without compromising the security. In this paper, we present a symmetric encryption algorithm which outperforms the existing algorithms such as AES, DES, Blowfish and etc which require more computational time on bulk amounts of data.
APA, Harvard, Vancouver, ISO, and other styles
30

"Security Enhancement in Cryptography for Mobile Device Outsourced in Cloud Computing." International Journal of Innovative Technology and Exploring Engineering 9, no. 8 (June 10, 2020): 971–75. http://dx.doi.org/10.35940/ijitee.h6780.069820.

Full text
Abstract:
Mobile devices often store data in cloud computing storage based on the increasing availability of the users. But security is the major issue in cloud computing. Sensitive information is stored and provided across internet to make sure that the data is protected with security. In this paper, the concept of data privacy is given more importance with regard to the major problem of reducing outsourced data usage. Mobile computing has memory storage and power resources as limitations. But cryptography is a concept which provides some sort of security enhancement that ensures the authentication and the availability of data integrity with confidentiality. Certain algorithms are used for ensuring an increase in security such as AES, DES, and Blowfish. Experimental results are computed and analyzed to level up the performance using cryptographic algorithms. Results are shown in order to assure resistance among the above techniques. Choosing an apt algorithm will quench the requirements of the future.
APA, Harvard, Vancouver, ISO, and other styles
31

Kaviya, K., K. K. Shanthini, and M. Sujithra. "Evolving Cryptographic Approach for Enhancing Security of Resource Constrained Mobile Device Outsourced Data in Cloud Computing." International Journal of Scientific Research in Computer Science, Engineering and Information Technology, January 5, 2019, 101–6. http://dx.doi.org/10.32628/cseit195111.

Full text
Abstract:
Mobile cloud computing in the increasing popularity among users of mobile device enables to store their data in cloud. Security is the major concern when the sensitive information is stored and transferred across the internet. It is essential to make sure that the data is secured and protected. In this paper, we discussed the problem of privacy of data with reducing the resources usage. Moreover, mobile cloud computing has limitations in resources such as power energy, processor, Memory and storage. Cryptography ensures the confidentiality, authentication, availability, and integrity of the data. This is done through cryptographic algorithms such as Data Encryption Standard (DES), Blowfish and Advanced Encryption Standard (AES). The experimental results evaluated and compared the performance of the encryption algorithms. The performance metrics used are encryption and decryption time, CPU and Memory utilization. Evaluation results showed a significant improvement in reducing the resources, amongst all the techniques, choosing a suitable encryption algorithm based on different parameters that are best fit to the future user requirements is considered.
APA, Harvard, Vancouver, ISO, and other styles
32

Barhoom, Tawfiq, and Mahmoud Abu Shawish. "Text File Privacy on the Cloud Based on Diagonal Fragmentation and Encryption." Journal of Engineering Research and Technology 8, no. 1 (March 3, 2021). http://dx.doi.org/10.33976/jert.8.1/2021/3.

Full text
Abstract:
Despite the growing reliance on cloud services and software, privacy is somewhat difficult. We store our data on remote servers in cloud environments that are untrusted. If we do not handle the stored data well, data privacy can be violated with no awareness on our part. Although it requires expensive computation, encrypting the data before sending it appears to be a solution to this problem. So far, all known solutions to protect textual files using encryption algorithms fell short of privacy expectations. Thus is because encrypting cannot stand by itself. The encrypted data on the cloud server becomes full file in the hand causing the privacy of this data to be intrusion-prone, thus allowing intruders to access the file data once they can decrypt it. This study aimed to develop an effective cloud confidentiality model based on combining fragmentation and encryption of text files to compensate for reported deficiency in encryption methods. The fragmentation method used the strategy of dividing text files into two triangles through the axis. Whereas the encryption method used the Blowfish algorithm. The research concluded that high confidentiality is achieved by building a multi-layer model: encryption, chunk, and fragmentation of every chunk to prevent intruders from reaching the data even if they were able to decrypt the file. Using the privacy accuracy equation (developed for the purpose in this research), the model achieved accuracy levels of 96% and 90% when using 100 and 200 words in each chunk on small, medium, and large files respectively.
APA, Harvard, Vancouver, ISO, and other styles
33

"Enhancing Image Security by employing Blowfish Algorithm further embedding text and Stitching the RGB components of a Host Image." International Journal of Recent Technology and Engineering 8, no. 2S11 (November 2, 2019): 3801–8. http://dx.doi.org/10.35940/ijrte.b1499.0982s1119.

Full text
Abstract:
‘Privacy, privacy everywhere but not a safety method to implement it’: a harsh reality of today’s world. With the precipitation of more data (2 x 1019 bits of data is created in every 86400 seconds) in computer networks, involvement of meta-data in the form of images is essential. To keep data safe and secure in order to inculcate privacy, to eradicate any kind of eavesdropping, and to maintain confidentiality, integrity and availability of it, certain security measures are needed to make in account for. So in order to make it available, we required a technique through which we can securely transfer any kind of data over a network. In practise the information security can be achieved either by using Cryptography or Steganography. The process described in this paper is not a mediocre it is more scrupulous towards the security because it involves image encryption, steganography and image stitching. Initially we are encrypting an image using Blowfish algorithm then we are embedding the secret text into this encrypted image by modifying the least significant bit (LSB) of the image by our data. Moreover, to enhance the privacy and security we are stitching the above resultant image with the red, green and blue (RGB) components of a host image and thereby producing an image more secure than the one which the existing systems can form for data transmission..
APA, Harvard, Vancouver, ISO, and other styles
34

Khalaf, Ali Mahmood, and Kamaljit Lakhtaria. "A SURVEY ON SYMMETRIC-KEY AND ASYMMETRIC- KEY ALGORITHMS BASED CRYPTOGRAPHY." Towards Excellence, March 31, 2022, 361–77. http://dx.doi.org/10.37867/te140134.

Full text
Abstract:
Information security is extremely important in terms of maintaining the security of information (text, image, audio, video) and its confidentiality, and as a result of the massive expansion in the field of technology and communications, and the emergence of the role of the internet, and for rapid communication in the transmission of this information (text, image, audio, video) There was a need to secure this information from penetration and make it incomprehensible to people who are not authorized to access this information (text, image, audio, video). Where many algorithms and techniques have appeared to protect this information, namely: Cryptography algorithms, and Steganography techniques. Cryptography is one of the techniques of information security, which studies the secure communication between the sender and receiver of the message, which is the process of converting plain text into cipher text through the use of mathematical operations. In our research paper, a comparative study and analysis of symmetric key and key asymmetric encryption algorithms in terms of effectiveness, key size, time, complexity, functionality, attacks, and research on the most prominent recent technologies such as AES, BLOWFISH, RC2, RC4, CAST, SERPENT, TEA, E-DES, RSA, DIFFIE HELLMAN, and DSA are the safest. Compared to other technologies, faster encryption time, security, speed, and flexibility according to the results
APA, Harvard, Vancouver, ISO, and other styles
35

Das, Proteeti, Najmul Hoque Munshi, and Subhasis Maitra. "New Key-Dependent S-Box Generation Algorithm on AES." Micro and Nanosystems 13 (July 26, 2021). http://dx.doi.org/10.2174/1876402913666210726163822.

Full text
Abstract:
Aims: Cryptography means 'hidden secrets'. The primary purpose of cryptography is to protect network and data over a wireless communication channel. The cryptographic approach secures the data of a network from any internal or external attacks. Background: There are several kinds of cryptographic techniques that are Data Encryption Standard (DES), RSA (Rivest- Shamir- Adleman), Advanced Encryption Standard (AES), Blowfish, Twofish etc. Out of these algorithms, AES shows wide acceptance for its superiority in providing confidentiality to secret information. Another cause for extensive acceptance is, AES is simple, convenient to implement, low charge and higher security. Several changes have been proposed to modify in recent times by cryptographers and researchers all around the world. Objective: This research paper offers a new key-dependent s-box generation algorithm for AES. Methods: A list of irreducible polynomials of degree 8 is used to generate the s-box depending on the secret key to provide more invulnerable ciphertext in comparison to standard AES. This design of this proposed model is easy and convenient to implement than different dynamic s-box technology algorithm. Results : The metrics chosen for overall performance evaluation are Frequency Distribution, Chi-square Test, Avalanche Effect, and Strict Avalanche Criterion. Conclusion: The proposed algorithm satisfies the desired property of these metrics and provides better security in contrast to standard AES.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography