Enhancing security by altering encryption keys for symmetric algorithm

Author: 
Densy John V. and 2Dr. Agnise KalaRani, X.
Abstract: 

Information security is crucial for all organizations. People are using information technology for storing data in the internet. Now-a-days Cloud Storage and Big Data are common among all kinds of people. Moreover mobile technology is becoming more popular. Therefore new technologies are derived from the existing encryption algorithms in order to resists the attacks from intruders. In this study we are experimenting a new technique of encrypting with two different algorithms and two different encryption keys so that it can be useful for resisting the man-in-the-middle attacks for the information over the internet. The results proved that eaves- dropper cannot determine the key-length to decrypt back to original message. Here we are using AES and XOR for encrypting and key generation is done using hash functions.

Download PDF: 

CHIEF EDITOR

  

           Prof. Dr. Bilal BİLGİN

Call for Papers - 2017

    submit your paper now

   Vol. 07, Issue 01, January 2017

CURRENT ISSUE

 

Article Tracking

Get your Certificate

IMPACT FACTOR CERTIFICATE

 

 

Copyright © 2016 International Journal Development Research. All Rights Reserved.