Information security is crucial for all organizations. People are using information technology for storing data in the internet. Now-a-days Cloud Storage and Big Data are common among all kinds of people. Moreover mobile technology is becoming more popular. Therefore new technologies are derived from the existing encryption algorithms in order to resists the attacks from intruders. In this study we are experimenting a new technique of encrypting with two different algorithms and two different encryption keys so that it can be useful for resisting the man-in-the-middle attacks for the information over the internet. The results proved that eaves- dropper cannot determine the key-length to decrypt back to original message. Here we are using AES and XOR for encrypting and key generation is done using hash functions.
Prof. Dr. Bilal BİLGİN