An efficient encryption-secure communication using symmetric key

  • Authors

    • Nahida Nigar Southern University Bangladesh
    2019-06-30
    https://doi.org/10.14419/ijet.v7i4.26613
  • Cryptography, Symmetric key, AES, 3DES.
  • To stop unauthorized disclosure of confidential information we need to secure our data. To secure data we need to use a secure cryptographic system. The conventional systems of data security are not suitable for multimedia as well as different data types. This paper is concerned with the development of a secure communication system which will satisfy some aspects such as reliability, maintainability, security, and user-friendliness. This project is based on the conventional method of cryptography known as symmetric key encryption technique named AES and 3DES made the system faster, better immune to attacks, greater complexity, easier encryption/decryption, and much more advanced security feature included. This project work is designed and developed for secure communication on different platforms. Unlike any other application, this software can encrypt any length of a video message, audio, text, etc. using a key and then decrypts the ciphertext with the same key to see the plaintext on the receiving end. Whatever the data is encrypted the ciphertext will be in text type which will give more security to the data because the hacker cannot guess the data type to hack. Comparing with other security based application system, the proposed system can be used for any type of communication in both online and offline.

     

     

  • References

    1. [1] Rivest RL (1990) Cryptology. Handbook of Theoretical Computer Science.

      [2] Rahman, M. M., T. Akter, and A. Rahman. "Development of Cryptography-Based Secure Messaging System." J Telecommun Syst Manage 5.142 (2016): 2167-0919.

      [3] Alanazi, Hamdan, et al. "New comparative study between DES, 3DES, and AES within nine factors." arXiv preprint arXiv:1003.4085 (2010)

      [4] Meyer, Carl H., and Stephen M. Matyas. CRYPTOGRAPHY: A new dimension in computer data security: A guide for the design and implementation of secure systems. Wiley, 1982.

      [5] Nigar, Nahida, and Muhammad Anwarul Azim. "Fairness Comparison of TCP Variants over Proactive and Reactive Routing Protocol in MANET." International Journal of Electrical and Computer Engineering (IJECE) 8.4 (2018). https://doi.org/10.11591/ijece.v8i4.pp2199-2206.

      [6] Nigar, Nahida. "Comparative Performance Evaluation of TCP with Identical and Cross-Variant Congestion Control."

      [7] Van Tilborg, Henk CA. An introduction to cryptology. Vol. 52. Springer Science & Business Media, 2012.

      [8] William, Stallings. "Cryptography and network security: principles and practice." Prentice-Hall, Inc (1999): 23-50.

      [9] Sommerville, Ian. Software engineering. Boston: Pearson, 2011.

      [10] Wakefield, Cameron, Henk-Evert Sonder, and Wei Meng Lee. VB. Net Developer's Guide with Cdrom. Syngress Publishing, 2001.

      [11] Rohilla, Charu, et al. "Encryption and Decryption for Secure Communication."

      [12] Saraireh, Saleh. "A Secure Data Communication system using cryptography and steganography." International Journal of Computer Networks & Communications 5.3 (2013): 125. https://doi.org/10.5121/ijcnc.2013.5310.

      [13] Daemen, Joan, and Vincent Rijmen. The design of Rijndael: AES-the advanced encryption standard. Springer Science & Business Media, 2013.

      [14] Barker, William C. Recommendation for the triple data encryption algorithm (TDEA) block cipher. National Institute of Standards and Technology, 2004. https://doi.org/10.6028/NIST.SP.800-67ver1.

  • Downloads

  • How to Cite

    Nigar, N. (2019). An efficient encryption-secure communication using symmetric key. International Journal of Engineering & Technology, 7(4), 6510-6514. https://doi.org/10.14419/ijet.v7i4.26613