Enhancing security by altering encryption keys for symmetric algorithm

×

Error message

User warning: The following theme is missing from the file system: journalijdr. For information about how to fix this, see the documentation page. in _drupal_trigger_error_with_delayed_logging() (line 1138 of /home2/journalijdr/public_html/includes/bootstrap.inc).

International Journal of Development Research

Enhancing security by altering encryption keys for symmetric algorithm

Abstract: 

Information security is crucial for all organizations. People are using information technology for storing data in the internet. Now-a-days Cloud Storage and Big Data are common among all kinds of people. Moreover mobile technology is becoming more popular. Therefore new technologies are derived from the existing encryption algorithms in order to resists the attacks from intruders. In this study we are experimenting a new technique of encrypting with two different algorithms and two different encryption keys so that it can be useful for resisting the man-in-the-middle attacks for the information over the internet. The results proved that eaves- dropper cannot determine the key-length to decrypt back to original message. Here we are using AES and XOR for encrypting and key generation is done using hash functions.

Download PDF: