2-Key Based Substitution Encryption Model for Cloud Data Storage

Submission Deadline-30th July 2024
June 2024 Issue : Publication Fee: 30$ USD Submit Now
Submission Deadline-20th July 2024
Special Issue of Education: Publication Fee: 30$ USD Submit Now

International Journal of Research and Scientific Innovation (IJRSI) | Volume V, Issue III, March 2018 | ISSN 2321–2705

2-Key Based Substitution Encryption Model for Cloud Data Storage

Akhilesh Deep Arya1, Gaurav Kumar Ameta2

IJRISS Call for paper

  1, 2 Department of Computer Science and Engineering, Pacific Institute of Technology, Udaipur, Rajasthan, India

Abstract: In cryptography, encryption is the process of obscuring information to make it unreadable without special knowledge. This is usually done for secrecy, and typically for confidential communications.

A cryptosystem consists of five parts

• A set P of plain texts
• A set C of cipher texts
• A set K of keys
• A pair of functions
Encrypt: K X P -> C
Decrypt: K X C -> P
Such that for every key k ϵ K and plaintext p ϵ P
Decrypt (k, encrypt (k, p)) = p

[1] In the paper “Substitution Based Encryption Model for Cloud Data Storage” an attempt has been made to generate an algorithm which provides security to data transmitted over internet. The algorithm considers a random matrix key and a ternary vector which on execution by a series of steps generates a sequence. This sequence is used as a sub key to build encryption model.

In this paper some enhancement to “Substitution Based Encryption Model for Cloud Data Storage” by Arya A. and Ameta G. is proposed; in particular proposed model uses double key instead of single key. Further a study on analysis of both the algorithm is presented.

Keywords: Cipher, Cryptography, Encryption Model, Substitution based model, Network Security.

I. LITERATURE REVIEW

Ayesh et al. [7] developed a framework using multi-agent systems for Internet security. The system architecture of this approach is composed of three different agent types classified on their functionalities. The first type is responsible for intrusion detection; the second type is responsible for encryption and decryption of messages, while the third type can act as the combination of the previous two types. Although this approach has provided useful security system, it does not address some other important issues such as authentication, authorization, digital signature, and verification security services.