Back to Search Start Over

Access control and Encryption of sensitive data using i-Se4GE Algorithm

Authors :
Pratik Kanani
Mamta Padole
Source :
Oriental journal of computer science and technology. 10:24-32
Publication Year :
2017
Publisher :
Oriental Scientific Publishing Company, 2017.

Abstract

Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors. Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.

Details

ISSN :
23208481 and 09746471
Volume :
10
Database :
OpenAIRE
Journal :
Oriental journal of computer science and technology
Accession number :
edsair.doi...........ab2fc4679300f3ea4a73eb6a81913b47