Professional Documents
Culture Documents
Mukesh Kumar
Abstract Data security is a method which is used to cover the important infor-
mation. Data security methods control the privacy and integrity of the important
information. The access to the database of the companies has improved. Now
companies store their business data more on computer than before. Most of the
company data is for internal use and not for the general public because business
data is highly confidential. At present, cryptographic block cipher is being used
with some logical operation and the main drawback in this method is the generation
of the secret key which is totally based on the alphabets. So with the help of loop
concept, there is a chance for the hackers to find out the secret key. But I propose
advanced algorithm for cryptography which is totally dependent on hashing func-
tion technique to generate a secret key which is further used to encrypt and decrypt
the important information. The secret key will be generated by using different key
generation algorithms which will be of higher sets of alphanumeric characters. I am
using a hashing technique for cryptography along with a new quantum-bit gener-
ation method.
Keywords Cryptography Ciphertext Data security Key generation algorithms
1 Introduction
M. Kumar (&)
H.P. University, Shimla, India
e-mail: mukesh.kumarphd2014@gmail.com
their data secret. At present, hackers are using a variety of techniques in order to
break into computer system and steal information or change important data of any
organizations (Fig. 1).
At present, cryptography has many applications area. Cryptography provides a
high level of privacy by covering confidential data of any individuals or groups.
Cryptography is used for the purpose of providing access to data in restricted way,
data integrity, and authentication. At present, a lot of research work is going on to
find out the new cryptographic algorithms based on security and complexity [1].
Simply talking about data security, then the following features come to our mind
like privateness, validation, wholeness, disownment, access control, and availability
of data.
2 Literature Review
For generating the starting key for the purpose of encryption and decryption of the
information/ message provided to use, they generally used the random key gen-
erator algorithm [2]. In that particular technique, a replacement technique is used
where they can take four words set from given input message and after getting the
encrypted data, the equivalent words in the random key matrix can be identified.
A technique is suggested by Nath in multiple sequence alignment algorithm for
searching characters from a random key matrix [3]. In this technique, they provide
arrangement for encrypting data. The random key matrix contains all possible
characters set whose value lies between 0 and 255 (ASCII code). Text/ word key
used by the end user is used for the design of the random key matrix. From the
Advanced RSA Cryptographic Algorithm for Improving Data Security 13
starting word/text key used by user, they are providing a new encryption/
decryption steps to find the random and encryption number. The author unex-
pectedly finds it very difficult to meet the two variables from two unlike input. At
this stage, it is very difficult to crack the encryption techniques which are provided
by the author, but if anybody wants to crack the techniques then they must know all
the possible pattern of the word/text key used by the user. If anybody tries to
decrypt the data, then they must know the exact key matrix used and if anybody
tries theoretically to make the random matrix then they almost have to try 65,536!
attempts. Different researcher have applied this technique on possible data files and
they have observed that it gives 100% results while applying cryptography on data.
In paper [4], a newly advanced algorithm outline symmetric algorithm is pro-
posed which is in resemblance to Rijndael algorithm. In Rijndael technique, 128
bits block for encryption are used but in AES technique, 200 bits block are used.
3 Rivest–Shamir–Adleman Algorithm
Quantum-bits Production: For the secret data of the user, first of all, find the
secret key for that data to encrypt. After getting the secret key, change the data into
hexadecimal code and after that change it into binary to get the least bits as
Quantum bits of 0 and 1.
4 Proposed Work
5 Conclusion
This presented algorithm is mainly used for block cipher techniques and possibly
this technique will take less time to encrypt a data of large size. It is not possible to
crack the encryption algorithm if you do not know the exact key value and this is
the main advantage of presented algorithm. I have used this algorithm for both
encryption and decryption while sending or receiving important message.
References
1. A Text book by William Stallings, data and computer communications, 6e William 6e 2005
2. Chatterjee D, Nath J, Dasgupta S, Nath A (2005) A new symmetric key cryptography
algorithm using extended MSA method: DJSA symmetric key algorithm, accepted for
publication in IEEE CSNT2011 to be held at SMVDU (Jammu) 03–06 June 2011
3. Nath A, Das S, Chakrabarti A (2010) Data hiding and retrieval. In: Proceedings of IEEE
international conference on computer intelligence and computer network held at Bhopal from
26–28 Nov 2010
4. Muhammad F, Chowdhury I, Matin MA Effect of security increment to symmetric data
encryption through AES methodology, 9th ACIS international conference on software
engineering, artificial intelligence, networking, and parallel/distributed computing. Phuket,
Thailand. 6–8 Aug 2008. https://doi.org/10.1109/SNPD.2008.101
5. Felten K An algorithm for symmetric cryptography with a wide range of scalability. In
published by 2nd international workshop on embedded systems, internet programming and
industial IT
6. Wang Y, Hu M (2009) Timing evaluation of the known cryptographic algorithms. International
conference on computational intelligence and security. Beijing, China, 11–14 Dec 2009.
https://doi.org/10.1109/CIS.2009.81
7. Nath A, Ghosh S, Malik MA Symmetric key cryptography using random key generator, vol 2,
pp 239–244
Author Biography