An efficient cryptographic scheme for text message protection

  • Authors

    • Manikandan N K
    • Manivannan D
    • Antony kumar K
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.10639
  • Cryptography, Text message, Protection of Message
  • Interchange of information is increasing very rapidly. Transferring any information on internet arises with the biggest issue that is security. Cryptography plays an important role in achieving security. For any type of business our primary focus is mainly on the security of information for that we require a robust and unbreakable process that provides great safety. This project is concerned with the development of a secure messaging system based on cryptographic algorithm that is which is more faster, better immune to attacks, more complex, easy to encrypt. This is well featured and provides encryption/decryption that can protect message from unauthorized access. we proposed an algorithm, which uses triple keys for encryption and decryption of text to secure the information. This application is well featured and provides security that can protect message from unauthorized access. To send a message, a sender types and encrypts a text message using Three Keys algorithm with a key selected from keylist .The encrypted message is stored in database and receiver’s inbox serial number of key .The receiver, after logging into account ,selects key value and then decrypts with key to see the original message

  • References

    1. [1]. ManiKandan N.K, “A Novel Cipher Security Mechanism for IEEE 802.11iâ€,2015, International Journal of Applied and Engineering Research, published by Research India Publication, Volume:10, Issue:3, October 2015

      [2]. C.N. Mathur and K.P.Subbalakshmi. “Energy Efficient WirelesEncryptionâ€,Networking and Communications (MSyNC) Lab, 2005

      [3]. Karthik,.S, Muruganadam. A,â€Data Encryption and Decryption by using Triple DES and Performance Analysis of Crypto Systemâ€, International Journal of Scientific Engineering and Research (IJSER), Vol 2, Issue 11, November 2014.

      [4]. C. N. Mathur, K. Narayan, and K. Subbalakshmi. High Diffusioncipher: Encryption and error correction in a single cryptographic primitive. To appear in the 4th International Conference on Applied Cryptography and Network Security Conference (ACNS), June 2006.

      [5]. M. Matsui. Linear cryptanalysis method for DES cipher. In Advances in cryptology -EUROCRYPT93, Lecture Notes in Computer Science, volume 765, pages 1–11, 1993.

      [6]. K. Nyberg. Differentially uniform mappings for cryptography. In EUROCRYPT ’93: Workshop on the theory and application of cryptographic techniques on Advances in cryptology, pages 55–64, Secaucus, NJ, USA, 1994. Springer-Verlag New York, Inc.

      [7]. L. M. S. C. of the IEEE Computer Society. Wireless lan medium access control (mac) and physical layer (phy) specifications. 1999.

      [8]. S. Durai , N. Rajkumar, N. K. Manikandan and D. Manivannan “Data Entry Works in computer usingVoice Keyboardâ€, Indian Journal of Science and Technology, Vol 9(2), DOI:10.17485/ijst/2016/v9i2/85814, January 2016

  • Downloads

  • How to Cite

    N K, M., D, M., & kumar K, A. (2018). An efficient cryptographic scheme for text message protection. International Journal of Engineering & Technology, 7(1.7), 152-155. https://doi.org/10.14419/ijet.v7i1.7.10639