z-logo
open-access-imgOpen Access
CryptO’Roulette A Smart Approach To Modern Encryption
Author(s) -
Varun Mishra,
Samarth Nehe,
P.G.V Sai Karthik,
Atharva Gulhane,
Navyaa Sharma
Publication year - 2022
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.b3311.0411422
Subject(s) - encryption , computer science , computer security , communication source , cryptography , public key cryptography , key (lock) , cryptosystem , the internet , internet privacy , computer network , world wide web
In a symmetric-key cryptosystem, where the secret key is known to both the sender who encrypts the message (let’s call her Alice) and the receiver who decrypts the message (let's call him Bob). Since the secret key is very important so it cannot be disclosed to any third party that is why it should not be exchanged through any public form of communication because if through any means these keys get leaked all the encrypted messages in the future will be compromised [1].We know that the advent of technology has increased the risks of data thefts and compromising data integrity. So, to secretly exchange the key both the parties must hold some sort of private meeting, therefore they need to establish some private communication channel. This is a difficult task practically speaking in terms of internet communications. [6] These days, the utilization of the Internet is developing quickly throughout the planet, and security is turning into a significant public concern. Already security was a significant issue for military applications yet presently the application region has been improved as more correspondence happens on the web. Cryptography is a computer science platform intended to give security to senders and receivers to communicate and recover secret data about an uncertain channel through a cycle called Encryption/Decryption. Cryptography guarantees that the message ought to be sent without change and that only authorized individuals can open and peruse the message [10].In this paper, we tried to randomize the encryption process so that the data becomes more secure and less vulnerable to hacker attacks. We will use the top 4 best existing encryption algorithms like AES, TripleDES, Rabbit, etc., and use them to randomly encrypt the different segments of the message.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here