Open Access Open Access  Restricted Access Subscription Access

Strengthening of Data Security Against its Attack


Affiliations
1 Department of Computer Science, Vinayak Vidyamandir, Amravati, India
2 Department of Electronics, Kamla Nehru College, Nagpur, India
 

This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form.
The focus of the presentation will lie in presenting the symmetric and asymmetric algorithms, and specifics how it differs from each other.
We propose a new algorithm Hybridizing Traditional Technology (H.T.T) which enables us to demonstrate its security against all known types of attack. It is as fast as DES on the market leading Intel Pentium/MMX platforms (and at least as fast on many others); yet we believe it to be more secured than all other algorithms.
Use of this algorithm has improved the hardware complexity and the rate of encryption/decryption. Similarities of encryption and decryption are used to provide a high performance using an efficient architecture. The efficiency of the design is quite high due to use of short and balanced combinational paths in the design.

Keywords

Asymmetric Key, Authentication, Cryptography, Digital Signature, Hash Function, Symmetric Key.
User
Notifications
Font Size

Abstract Views: 240

PDF Views: 0




  • Strengthening of Data Security Against its Attack

Abstract Views: 240  |  PDF Views: 0

Authors

Swapnil G. Deshpande
Department of Computer Science, Vinayak Vidyamandir, Amravati, India
Pradeep B. Dahikar
Department of Electronics, Kamla Nehru College, Nagpur, India

Abstract


This paper specifies cryptographic algorithm Hybridizing Traditional Technology (H.T.T) which may be used to protect sensitive data. Protection of data during transmission or while in storage may be necessary to maintain the confidentiality and integrity of the information represented by the data. The algorithms uniquely define the mathematical steps required to transform data into a cryptographic cipher and also to transform the cipher back to the original form.
The focus of the presentation will lie in presenting the symmetric and asymmetric algorithms, and specifics how it differs from each other.
We propose a new algorithm Hybridizing Traditional Technology (H.T.T) which enables us to demonstrate its security against all known types of attack. It is as fast as DES on the market leading Intel Pentium/MMX platforms (and at least as fast on many others); yet we believe it to be more secured than all other algorithms.
Use of this algorithm has improved the hardware complexity and the rate of encryption/decryption. Similarities of encryption and decryption are used to provide a high performance using an efficient architecture. The efficiency of the design is quite high due to use of short and balanced combinational paths in the design.

Keywords


Asymmetric Key, Authentication, Cryptography, Digital Signature, Hash Function, Symmetric Key.