- January 24, 2018
- Posted by: RSIS
- Categories: Computer Science and Engineering, Engineering, Information Technology
International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue XII, December 2017 | ISSN 2321–2705
Substitution Based Encryption Model for Cloud Data Storage
Akhilesh Deep Arya[1], Gaurav Kumar Ameta[2]
[1,2]Department of Computer Science and Engineering, Pacific Institute of Technology, Udaipur, Rajasthan, India
Abstract: – Cryptography is the method of converting plain readable text into non-readable, and thus achieves security by it. Technique of messages conversion from a non-readable format back to readable format without knowing how they were converted from readable format to non-readable format is known as cryptanalysis. In technical terms, the transformation of plain text into cipher text message is called as encryption, while the reverse process is known as decryption. Encryption and decryption process have mainly two elements: the key used for encryption and decryption and algorithm. According to the key used, cryptography is divided into two parts:
1. Symmetric key cryptography: Symmetric key technique uses similar key for both encryption and decryption. The key is secretly exchanged between the sender and the receiver and message transformation took place. Only the authenticated receiver is allowed to decrypt the cipher text with the help of the secret key. Since only one key is used for both encryption and decryption, this technique is also known as private key cryptography.
2. Asymmetric key cryptography: Asymmetric key cryptography involves the usage of one key for encryption and another, different key for decryption. This is also known as Public key Cryptography, as two different keys (which form a key pair) are used. One key is used for encryption and other for decryption. No other key can decrypt the message- not even the original key which is used for encryption. Public key cryptography can be used for digital signing as it supports authentication of users. In this paper an attempt has been made to generate an algorithm which provides security to data transmitted over internet. The algorithm considers a random matrix key which on execution by a series of steps generates a sequence. This sequence is used as a sub key to build encryption model.
Keywords: Cryptography, Encryption Model, Substitution based model.
I. LITERATURE REVIEW
Ayesh et al. [7] developed a framework using multi-agent systems for Internet security. The system architecture of this approach is composed of three different agent types classified on their functionalities.