Enhancing security by altering encryption keys for symmetric algorithm

Densy John V. and 2Dr. Agnise KalaRani, X.

Information security is crucial for all organizations. People are using information technology for storing data in the internet. Now-a-days Cloud Storage and Big Data are common among all kinds of people. Moreover mobile technology is becoming more popular. Therefore new technologies are derived from the existing encryption algorithms in order to resists the attacks from intruders. In this study we are experimenting a new technique of encrypting with two different algorithms and two different encryption keys so that it can be useful for resisting the man-in-the-middle attacks for the information over the internet. The results proved that eaves- dropper cannot determine the key-length to decrypt back to original message. Here we are using AES and XOR for encrypting and key generation is done using hash functions.

Download PDF: 



           Prof. Dr. Bilal BİLGİN

Call for Papers - 2017

    submit your paper now

   Vol. 07, Issue 02, February 2017



Article Tracking

Get your Certificate




Copyright © 2016 International Journal Development Research. All Rights Reserved.