Cryptographic Security using Various Encryption and Decryption Method

Full Text (PDF, 463KB), PP.1-11

Views: 0 Downloads: 0


Ritu Goyal 1,* Mehak Khurana 1

1. Northcap University,Gurugram and 122001, India

* Corresponding author.


Received: 29 Apr. 2017 / Revised: 6 May 2017 / Accepted: 2 Jun. 2017 / Published: 8 Jul. 2017

Index Terms

Cryptography, AES-128, Tiny encryption, SHA algorithm, Elgamal Encryption, RSA algorithm


Fast development in universal computing and the growth in radio/wireless and mobile strategies have led to the extended use of application space for Radio Frequency (RFID), wireless sensors, Internet of things (IoT). There are numerous applications that are safe and privacy sensitive. The increase of the new equipments has permitted intellectual methods of linking physical strategies and the computing worlds through numerous network interfaces. Consequently, it is compulsory to take note of the essential risks subsequent from these communications. In Wireless systems, RFID and sensor linkages are extremely organized in soldierly, profitable and locomotive submissions. With the extensive use of the wireless and mobile devices, safety has therefore become a major concern. As a consequence, need for extremely protected encryption and decryption primitives in such devices is very important than before.

Cite This Paper

Ritu Goyal, Mehak Khurana,"Cryptographic Security using Various Encryption and Decryption Method", International Journal of Mathematical Sciences and Computing(IJMSC), Vol.3, No.3, pp.1-11, 2017.DOI: 10.5815/ijmsc.2017.03.01


[1]JaydebBhaumi. N.D. 2012. A Modified XTEA. International Journal of Soft Computing and Engineering. vol. 2. (2). 461-464.

[2]Agrawal Modesnika, Mishra Pradeep. A Comparative Survey on Symmetric Key Encryption Technique, International Journal on Computer Science and Engineering (IJCSE). Vol. 4 No. 05 May 2012, pp. 877-882.

[3]Alam Md Imran, Khan Modeshammad Rafeek. Performance and Efficiency Analysis of Different Block Cipher Algorithms of Symmetric Key Cryptography. International Journal of Advanced Research in Computer Science and Software Engineering, Volume 3, Issue 10, October 2013, pp.713-720.

[4]Sanchez-Avila, C. Sanchez-Reillol, R, The Rijndael block cipher (AES proposal). A comparison with DES‖, 35th International Conference on Safety Technology 2001, IEEE.

[5]Murat Fiskiran, Ruby B. Lee, Workload Characterization of Elliptic Curve Cryptography and other Network Safety Algorithms for Constrained Environments‖, 2002. WWC-5. 2002.

[6]Aameer Nadeem, Dr. M.Younus Javed, A performance comparison of data Encryption Algorithm‖, Global Telecommunication Workshops, 2004 GlobeCom Workshops 2004, IEEE.

[7]Elkamchouchi, H.M; Emarah, A.-A.M; Hagras, E.A.A, A New Secure Hash Dynamic Structure Algorithm (SHDSA) for Public Key Digital Signature Schemes‖, the 23rd National Radio Science Conference (NRSC 2006).

[8]Like Zhang, Gregory B. White, Anomaly Detection for Application Level Network Attacks Using Payload Keywords‖, (CISDA 2007).

[9]Suhaila Orner Sharif, S.P. Mansoor, Performance analysis of Stream and Block cipher algorithms‖, 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE), 2010.

[10]Punita Mellu & Sitender Mali, AES: Asymmetric key coding and decoding System‖, International Journal of Information Technology and Knowledge Management, 2011, Vol, No. 4 pp. 113-117.

[11]YudhvirSingh, YogeshChaba, Information Theory test based Performance Evaluation of Coding and decoding Techniques‖ , International Journal of Information Technology and Knowledge Management, Vol 1,No.2,2008 , pp. 475-483.

[12]YanWang, Ming Hu, Timing Evaluation of known coding and decoding Algorithm‖, International Conference on Computational Intelligence and safety, 2009.

[13]Jens-Peter Kaps and Berk Sunar "Energy Comparison of AES and SHA-1 for Ubiquitous Computing Department of Electrical & Computer Engineering Worcester Polytechnic Institute 100 Institute Road, Worcester, MA 01609, U.S.A.

[14]Yashpal Jitarwal, Pawan Kumar Mangal, Sunil Kumar Suman" Enhancement of ElGamal Digital Signature Based on RSA & Symmetric Key" Computer Science & Engineering.

[15]Pankaj Kamboj "A Review Paper on 3 Step Mechanism Using RSA, AES and MD5 to Improve the Safety in Cloud Environment" Er. Lovnish Bansal, Amer R. Zerek, Mohamed A. Abuinjam "ElGamal public-key encryption" International Conference on Control, Engineering & Information Technology (CEIT'14) Proceedings - Copyright IPCO-2014 ISSN 2356-5608.

[16]Latha Parthiban and Nivetha Shree "Using modified stern series for digital signature authentication in elliptic curve cryptography" Department of Computer Science and Engineering, SSN College of Engineering, Tamil Nadu, India.

[17]J.Balakrishna, Philemon Daniel, Rajeevan Chandel "Design & Implementation of VLSI Architecture for XTEA" International Conference on Advanced Computing, Communication and Networks'11.

[18]Mehak Khurana, Meena Kumari, "Security Primitives: Block and Stream Ciphers", International Journal of Innovations & Advancement in Computer Science (IJIACS), ISSN 2347 – 8616, Vol. 4, March 2015.

[19]Mehak Khurana, Meena Kumari, "Variants of Differential and Linear Cryptanalysis", International Journal of Computer Applications (0975 – 8887) Volume 131 – No.18, PP 20-28, December 2015.