An efficient cryptographic scheme for text message protection
-
https://doi.org/10.14419/ijet.v7i1.7.10639
Received date: March 26, 2018
Accepted date: March 26, 2018
Published date: February 5, 2018
-
Cryptography, Text message, Protection of Message -
Abstract
Interchange of information is increasing very rapidly. Transferring any information on internet arises with the biggest issue that is security. Cryptography plays an important role in achieving security. For any type of business our primary focus is mainly on the security of information for that we require a robust and unbreakable process that provides great safety. This project is concerned with the development of a secure messaging system based on cryptographic algorithm that is which is more faster, better immune to attacks, more complex, easy to encrypt. This is well featured and provides encryption/decryption that can protect message from unauthorized access. we proposed an algorithm, which uses triple keys for encryption and decryption of text to secure the information. This application is well featured and provides security that can protect message from unauthorized access. To send a message, a sender types and encrypts a text message using Three Keys algorithm with a key selected from keylist .The encrypted message is stored in database and receiver’s inbox serial number of key .The receiver, after logging into account ,selects key value and then decrypts with key to see the original message
-
References
- . ManiKandan N.K, “A Novel Cipher Security Mechanism for IEEE 802.11i”,2015, International Journal of Applied and En-gineering Research, published by Research India Publication, Volume:10, Issue:3, October 2015
- . C.N. Mathur and K.P.Subbalakshmi. “Energy Efficient Wire-lesEncryption”,Networking and Communications (MSyNC) Lab, 2005
- . Karthik,.S, Muruganadam. A,”Data Encryption and Decryp-tion by using Triple DES and Performance Analysis of Crypto System”, International Journal of Scientific Engineering and Re-search (IJSER), Vol 2, Issue 11, November 2014.
- . C. N. Mathur, K. Narayan, and K. Subbalakshmi. High Diffu-sioncipher: Encryption and error correction in a single crypto-graphic primitive. To appear in the 4th International Conference on Applied Cryptography and Network Security Conference (ACNS), June 2006.
- . M. Matsui. Linear cryptanalysis method for DES cipher. In Ad-vances in cryptology -EUROCRYPT93, Lecture Notes in Com-puter Science, volume 765, pages 1–11, 1993.
- . K. Nyberg. Differentially uniform mappings for cryptography. In EUROCRYPT ’93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 55–64, Secaucus, NJ, USA, 1994. Springer-Verlag New York, Inc.
- . L. M. S. C. of the IEEE Computer Society. Wireless lan medi-um access control (mac) and physical layer (phy) specifications. 1999.
- . S. Durai , N. Rajkumar, N. K. Manikandan and D. Manivannan “Data Entry Works in computer usingVoice Keyboard”, Indian Journal of Science and Technology, Vol 9(2), DOI:10.17485/ijst/2016/v9i2/85814, January 2016
-
Downloads
-
How to Cite
N K, M., D, M., & kumar K, A. (2018). An efficient cryptographic scheme for text message protection. International Journal of Engineering and Technology, 7(1.7), 152-155. https://doi.org/10.14419/ijet.v7i1.7.10639
