z-logo
open-access-imgOpen Access
Access control and Encryption of sensitive data using i-Se4GE Algorithm
Author(s) -
Mamta Padole,
Pratik Kanani
Publication year - 2017
Publication title -
oriental journal of computer science and technology
Language(s) - English
Resource type - Journals
eISSN - 2320-8481
pISSN - 0974-6471
DOI - 10.13005/ojcst/10.01.04
Subject(s) - encryption , computer science , probabilistic encryption , on the fly encryption , multiple encryption , 40 bit encryption , computer network , link encryption , communication source , computer security , attribute based encryption , 56 bit encryption , filesystem level encryption , timestamp , client side encryption , key (lock) , public key cryptography
Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here