2-Key Based Substitution Encryption Model for Cloud Data Storage
- April 2, 2018
- Posted by: RSIS
- Category: Computer Science and Engineering
International Journal of Research and Scientific Innovation (IJRSI) | Volume V, Issue III, March 2018 | ISSN 2321–2705
2-Key Based Substitution Encryption Model for Cloud Data Storage
Akhilesh Deep Arya1, Gaurav Kumar Ameta2
1, 2 Department of Computer Science and Engineering, Pacific Institute of Technology, Udaipur, Rajasthan, India
Abstract: In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications.
A cryptosystem consists of five parts
• A set P of plain texts
• A set C of cipher texts
• A set K of keys
• A pair of functions
Encrypt: K X P -> C
Decrypt: K X C -> P
Such that for every key k ϵ K and plaintext p ϵ P
Decrypt (k, encrypt (k, p)) = p
[1] In the paper “Substitution Based Encryption Model for Cloud Data Storage” an attempt has been made to generate an algorithm which provides security to data transmitted over internet. The algorithm considers a random matrix key and a ternary vector which on execution by a series of steps generates a sequence. This sequence is used as a sub key to build encryption model.
In this paper some enhancement to “Substitution Based Encryption Model for Cloud Data Storage” by Arya A. and Ameta G. is proposed; in particular proposed model uses double key instead of single key. Further a study on analysis of both the algorithm is presented.
Keywords: Cipher, Cryptography, Encryption Model, Substitution based model, Network Security.
I. LITERATURE REVIEW
Ayesh et al. [7] developed a framework using multi-agent systems for Internet security. The system architecture of this approach is composed of three different agent types classified on their functionalities. The first type is responsible for intrusion detection; the second type is responsible for encryption and decryption of messages, while the third type can act as the combination of the previous two types. Although this approach has provided useful security system, it does not address some other important issues such as authentication, authorization, digital signature, and verification security services.