RSIS International

Submission Deadline: 17th December 2024
Last Issue of 2024 : Publication Fee: 30$ USD Submit Now
Submission Deadline: 20th December 2024
Special Issue on Education & Public Health: Publication Fee: 30$ USD Submit Now
Submission Deadline: 05th January 2025
Special Issue on Economics, Management, Psychology, Sociology & Communication: Publication Fee: 30$ USD Submit Now

International Journal of Research and Scientific Innovation (IJRSI) | Volume IV, Issue XII, December 2017 | ISSN 2321–2705

Substitution Based Encryption Model for Cloud Data Storage

Akhilesh Deep Arya[1], Gaurav Kumar Ameta[2]

[1,2]Department of Computer Science and Engineering, Pacific Institute of Technology, Udaipur, Rajasthan, India

IJRISS Call for paper

Abstract: – Cryptography is the method of converting plain readable text into non-readable, and thus achieves security by it. Technique of messages conversion from a non-readable format back to readable format without knowing how they were converted from readable format to non-readable format is known as cryptanalysis. In technical terms, the transformation of plain text into cipher text message is called as encryption, while the reverse process is known as decryption. Encryption and decryption process have mainly two elements: the key used for encryption and decryption and algorithm. According to the key used, cryptography is divided into two parts:

1. Symmetric key cryptography: Symmetric key technique uses similar key for both encryption and decryption. The key is secretly exchanged between the sender and the receiver and message transformation took place. Only the authenticated receiver is allowed to decrypt the cipher text with the help of the secret key. Since only one key is used for both encryption and decryption, this technique is also known as private key cryptography.

2. Asymmetric key cryptography: Asymmetric key cryptography involves the usage of one key for encryption and another, different key for decryption. This is also known as Public key Cryptography, as two different keys (which form a key pair) are used. One key is used for encryption and other for decryption. No other key can decrypt the message- not even the original key which is used for encryption. Public key cryptography can be used for digital signing as it supports authentication of users. In this paper an attempt has been made to generate an algorithm which provides security to data transmitted over internet. The algorithm considers a random matrix key which on execution by a series of steps generates a sequence. This sequence is used as a sub key to build encryption model.

Keywords: Cryptography, Encryption Model, Substitution based model.

I. LITERATURE REVIEW

Ayesh et al. [7] developed a framework using multi-agent systems for Internet security. The system architecture of this approach is composed of three different agent types classified on their functionalities.





Subscribe to Our Newsletter

Sign up for our newsletter, to get updates regarding the Call for Paper, Papers & Research.