Open Access Open Access  Restricted Access Subscription Access

A Secure GUI Method for Reliable Data Communication


Affiliations
1 Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, India
 

The need of secure and reliable data communication is getting increased day by day. Many algorithms and methods are being proposed by researchers in order to provide secure data communication. In the same context, in this paper, a new GUI (Graphical User Interface) based Peer to Peer (P2P) message transmission method is proposed. The method can provide transmission of encrypted data in a hidden way. The security analysis and advantages are also discussed to prove the utility of the proposed method. The proposed method utilizes the strength of cryptography and steganography and hence provides better security.

Keywords

Cryptography, Data Communication, Encryption, Security, Steganography.
User
Notifications
Font Size

  • . A. J. Menezes, P. C. V. Oorschot, S. A. Vanstone, Handbook of applied cryptography, 5th edition, CRC Press Inc., USA, ISBN: 9780849385230, 2001.
  • . W.Stallings, Cryptography and network security, principles and practices, seventh edition, Prentice Hall, ISBN-13:978-0134444284, ISBN-10:0134444280, 2005.
  • . V. Shukla, A. Chaturvedi, N. Srivastava, Nanotechnology and cryptographic protocols: issues and possible solutions, Nanomaterials and energy, volume 8, issue 1, 2019, 1-6, DOI: 10.1680/jnaen.18.00006
  • . V. Shukla, A. Chaturvedi, N. Srivastava, A secure stop and wait communication protocol for disturbed networks, Wireless personal communications, volume 110, 861-872, 2019, DOI: https://doi.org/10.1007/s11277019-06760-w
  • . V. Shukla, N. Srivastava, A. Chaturvedi, A bit commitment signcryption protocol for wireless transport layer security (wtls), IEEE international conference on electrical, computer and electronics engineering , 2016, 83-86, DOI: 10.1109/UPCON.2016.7894629
  • . N. Subramanian, O. Elharrouss, S.A. Maadeed, A. Bouridane, Image steganography: a review of the recent advances, IEEE access, volume 9, 2021, 23409-23423, DOI: 10.1109/ACCESS.2021.3053998
  • . V. Shukla, A.Mishra, A new sequential coding method for secure data communication, IEEE international conference on computing, power and communication technologies, 2020, 529-533, DOI: 10.1109/GUCON48875.2020.9231252
  • . P. Maniriho, T. Ahmad, Information hiding scheme for digital images using difference expansion and modulus function, Journal of king saud university - computer and information sciences, volume 31, issue 3, 2019, 335-347, DOI: https://doi.org/10.1016/j.jksuci.2018.01.011
  • . A.A. Attaby, M.F.M.M. Ahmed, A.K. Alsammak, Data hiding inside JPEG images with high resistance to steganalysis using a novel technique: DCT-M3, Ain Shams engineering journal, volume 9, issue 4, 2018, 19651974, DOI: https://doi.org/10.1016/j.asej.2017.02.003
  • . A. Chaturvedi, V. Shukla, M.K. Misra, A random encoding method for secure data communication: an extension of sequential coding, Journal of discrete mathematical sciences and cryptography, volume 24, issue 5, 2021, 1189-1204, DOI: https://doi.org/10.1080/09720529.2021.1932902
  • . M.S. Taha, M.S.M. Rahim, S.A. Lafta, M.M. Hashim, H.M. Alzuabidi, Combination of steganography and cryptography: a short survey, IOP conference series: materials science and engineering, volume 518, issue 5, 2019, 1-13, DOI: 10.1088/1757-899X/518/5/052003
  • . A. Jan, S.A. Parah, M. Hussan, B.A. Malik, Double layer security using crypto-stego techniques: a comprehensive review, Health and Technology, 2021, 123, DOI: https://doi.org/10.1007/s12553-021-00602-1
  • . S. Joshi, R. Mehra, GUI based approach for data encryption and decryption on MATLAB platform, International journal of computer applications, volume 181, number 16, 2018, 14-18, DOI: 10.5120/IJCA2018917758
  • . V. Shukla, A. Chaturvedi, N. Srivastava, A new one time password mechanism for client-server applications, Journal of discrete mathematical sciences and cryptography, volume 22, 2019, 1393-1406, DOI: 10.1080/09720529.2019.1692447
  • . J.J. Jaccard, S. Nepal, A survey of emerging threats in cybersecurity, Journal of computer and system sciences, volume 80, issue 5, 2014, 973-993, DOI: https://doi.org/10.1016/j.jcss.2014.02.005
  • . A. Khraisat, I. Gondal, P. Vamplew, J. Kamruzzaman, Survey of intrusion detection systems: techniques, datasets and challenges, Cybersecurity, volume 2, article number 20, 2019, 1-22, DOI: https://doi.org/10.1186/s42400-019-0038-7
  • . V.Shukla, A.Chaturvedi, N.Srivastava, A new secure authenticated key agreement scheme for wireless (mobile) communication in an EHR system using cryptography, Communications on applied electronics, volume 3, number 3, 2015, 16-21, DOI: 10.5120/cae2015651903
  • . M.K. Misra, A. Chaturvedi, S.P. Tripathi, V. Shukla, A unique key sharing protocol among three users using non-commutative group for electronic health record system, Journal of discrete mathematical sciences and cryptography, volume 22, issue 8, 2019, 1435–1451, DOI: 10.1080/09720529.2019.1692450
  • . A. Chaturvedi, N. Srivastava, V. Shukla, S.P. Tripathi, M.K. Misra, A secure zero knowledge authentication protocol for wireless (mobile) ad-hoc networks, International journal of computer applications, volume 128, number 2, 2015, 36-39, DOI: 10.5120/ijca2015906437
  • . F. Aliyu, T. Sheltami, E.M. Shakshuki, A Detection and Prevention Technique for Man in the Middle Attack in Fog Computing, Procedia computer science, volume 141, 2018, 24-31
  • . M. Conti, N. Dragoni, V. Lesyk, A Survey of Man in the Middle Attacks, IEEE Communications Surveys & Tutorials ( Volume: 18, Issue: 3, thirdquarter 2016)
  • . A.Chaturvedi, N.Srivastava, V.Shukla, A secure wireless communication protocol using Diffie-Hellman key exchange, International journal of computer applications, volume 126, number 5, 2015, 35-38, DOI: 10.5120/ijca2015906060
  • . V. Shukla, A. Chaturvedi, M.K. Misra, On authentication schemes using polynomials over non commutative rings, Wireless personal communications, volume 118, issue 1, 2021, 1-9, DOI: https://doi.org/10.1007/s11277-020-08008-4
  • . A. Mallik, A. Ahsan, M.M.Z. Shahadat, J.C. Tsou, Man-in-the-middle-attack: understanding in simple words, International journal of data and network science, volume 3, issue 2, 2019, 77-92, DOI: 10.5267/j.ijdns.2019.1.001
  • . V. Shukla, M.K. Misra, A. Chaturvedi, A new authentication procedure for client-server applications using HMAC, Journal of discrete mathematical sciences and cryptography, volume 24, issue 5, 2021, 1241-1256, DOI: https://doi.org/10.1080/09720529.2021.1932908
  • . V. Shukla, A. Chaturvedi, N. Srivastava, Authentication aspects of dynamic routing protocols: associated problem & proposed solution, International journal of recent technology and engineering, volume 8, issue 2, 2019, 412-419, DOI: 10.35940/ijrte.B1503.078219
  • . V. Shukla, A. Mishra, S. Agarwal, A new one time password generation method for financial transactions with randomness analysis, Innovations in electrical and electronic engineering (Part of the lecture notes in electrical engineering book series (LNEE, volume 661)), 2020, 713-720, DOI: https://doi.org/10.1007/978-981-15-4692-1_54
  • . K. Nishat, B.R. Purushothama, Group-oriented encryption for dynamic groups with constant rekeying cost, Security and communication networks, volume 9, 2016, 4120-4137, DOI: 10.1002/sec.1593
  • . M.T. Dong, H. Xu, Group Key Management Scheme for Multicast Communication Fog Computing Networks, Processes, volume 8, issue 10, 2020, 1-20, DOI: https://doi.org/10.3390/pr8101300
  • . N. Hegde, S.S. Manvi, Secure group key management scheme for dynamic vehicular cloud computing, International journal of advanced networking and applications, volume 13, issue 1, 2021, 4821-4826, DOI: 10.35444/IJANA.2021.13103.

Abstract Views: 154

PDF Views: 0




  • A Secure GUI Method for Reliable Data Communication

Abstract Views: 154  |  PDF Views: 0

Authors

Ramesh Kumar
Rajiv Gandhi Technical University, Bhopal, Madhya Pradesh, India

Abstract


The need of secure and reliable data communication is getting increased day by day. Many algorithms and methods are being proposed by researchers in order to provide secure data communication. In the same context, in this paper, a new GUI (Graphical User Interface) based Peer to Peer (P2P) message transmission method is proposed. The method can provide transmission of encrypted data in a hidden way. The security analysis and advantages are also discussed to prove the utility of the proposed method. The proposed method utilizes the strength of cryptography and steganography and hence provides better security.

Keywords


Cryptography, Data Communication, Encryption, Security, Steganography.

References