This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for providing better security and it also provide the concept of internal key generation at receiver end on the basis of 512 bits key which will entered by the sender. This internal key will store in the sender end database and send to the receiver end by other path for preventing brute force attack and other harmful attacks on security. This algorithm is more efficient for large data where existing algorithms provides efficient encryption and decryption only for 2MB data. This work provides better speed in comparison to existing algorithms for large size of files with less overhead.
KeywordsInformation security, Encryption, Decryption, Cryptography, Brute force attack.Before doing this work study of all the aspects on Information security using cryptography technique and various cryptography algorithms is done. This survey is very beneficial for us to understand how to remove loop hole of security of information in public network and how to improve the efficiency and security of proposed algorithm. After the detailed study of network security using cryptography, proposed work is developed. The research paper is distributed in four sections. In section-I, presents basic introduction about Information Security using cryptography, in section-II, Existing work on Information security using cryptography and various algorithms is discussed, section-III describes proposed work, section IV gives implementation details and in section V and VI presents conclusion and references.
Abstract-This paper proposes security technique for the confidential data which is the combination of three techniques, first is image compression that is based on wavelet transformation which will compress confidential image and reduce the size of the image, second is cryptography that is based on symmetric key which will encrypt the confidential image, and third is steganography that is based on least significant bit (LSB) which will embedded encrypted information inside a cover image. Therefore the purpose of the proposed technique is the high security and quality of the reconstructed cover image.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.