Ritu Goyal

Work place: NorthCap University/CSE, Gurugram, 122001, India

E-mail: ritugoyal1104@gmail.com


Research Interests: Hardware Security, Information Security, Network Security


Ritu Goyal, B.Tech in IT from BSA College of Engineering & Technology. (UPTU), Uttar Pradesh, India. Worked as assistant lecturer in SGI group in CSE & IT and has around 3 years of experience. Currently pursuing M.Tech in CSE from NorthCap University, Haryana and doing her research work. Her current research interests include: cryptography, information sharing, Cyber Security.

Author Articles
New Design of Tiny-Block Hybridization in AES

By Ritu Goyal Mehak Khurana

DOI: https://doi.org/10.5815/ijcnis.2017.09.06, Pub. Date: 8 Sep. 2017

The cryptographic algorithm designed to enhance security in real life which storage track and increase speed. This is kind of Feistel cipher which real use for the processes from assorted (mixed/orthogonal) algebraic collections. AES is combined with segmentation and validation algorithm to improve the performance of the security. Also, Key expansion is done to make the AES more secure. The processes are pipelined to increase the speed of AES. Our strategies that are hybrid method which work as change the original files (data) into encoded/encrypted type using AES and Tiny Encryption Process. The hybrid Procedure is considered for easiness and improved performance. The encryption pattern, data is encoded using tiny-AES-128 encryption process and authentication SHA that alterations it into an indecipherable cipher text. In process of encryption that encodes the information which consider a random text through the idea of cryptography and then data/text for the user. Our proposed approach get minimize computational time and memory utilization which simulated in MATLAB 2014Ra.

[...] Read more.
Cryptographic Security using Various Encryption and Decryption Method

By Ritu Goyal Mehak Khurana

DOI: https://doi.org/10.5815/ijmsc.2017.03.01, Pub. Date: 8 Jul. 2017

Fast development in universal computing and the growth in radio/wireless and mobile strategies have led to the extended use of application space for Radio Frequency (RFID), wireless sensors, Internet of things (IoT). There are numerous applications that are safe and privacy sensitive. The increase of the new equipments has permitted intellectual methods of linking physical strategies and the computing worlds through numerous network interfaces. Consequently, it is compulsory to take note of the essential risks subsequent from these communications. In Wireless systems, RFID and sensor linkages are extremely organized in soldierly, profitable and locomotive submissions. With the extensive use of the wireless and mobile devices, safety has therefore become a major concern. As a consequence, need for extremely protected encryption and decryption primitives in such devices is very important than before.

[...] Read more.
Other Articles