This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for providing better security and it also provide the concept of internal key generation at receiver end on the basis of 512 bits key which will entered by the sender. This internal key will store in the sender end database and send to the receiver end by other path for preventing brute force attack and other harmful attacks on security. This algorithm is more efficient for large data where existing algorithms provides efficient encryption and decryption only for 2MB data. This work provides better speed in comparison to existing algorithms for large size of files with less overhead. KeywordsInformation security, Encryption, Decryption, Cryptography, Brute force attack.Before doing this work study of all the aspects on Information security using cryptography technique and various cryptography algorithms is done. This survey is very beneficial for us to understand how to remove loop hole of security of information in public network and how to improve the efficiency and security of proposed algorithm. After the detailed study of network security using cryptography, proposed work is developed. The research paper is distributed in four sections. In section-I, presents basic introduction about Information Security using cryptography, in section-II, Existing work on Information security using cryptography and various algorithms is discussed, section-III describes proposed work, section IV gives implementation details and in section V and VI presents conclusion and references.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.