Open Access Open Access  Restricted Access Subscription Access

Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm


Affiliations
1 Department of Computer Science and Engineering Maharaja Sayajirao, University of Baroda, Baroda, India
2 Department of Information Technology, University of Mumbai, Mumbai, India
 

Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.


Keywords

I-Se4GE, Cryptocat, TestSecure, MME, HS, Attacks.
User
Notifications
Font Size

  • S. Sharma, J. Bisht, “Performance Analysis of Data Encryption Algorithms,” IJSROSET, 3(1), 1-5, 2015.
  • Jacobs School of Engineering. (2014,January,10). Computer Science and Engineering. [Online]. Available :https://cseweb.ucsd.edu/~mihir/cse207/w-asym.pdf
  • Cryptocat. (2016,Feb,16). Cryptocat. [Online]. Available: https://crypto.cat/
  • True private Messaging . (2016, March, 20). [Online], Available : http://www.whoishostingthis.com/blog/2015/04/29/im-encryption/
  • Security-in-a-Box . (2016, March, 25). [Online], Available : https://securityinabox.org/en/guide/textsecure/android
  • How Secure is Text Secure? . (2016, March, 20). [Online], Available : https://eprint.iacr.org/2014/904.pdf
  • Naked Security . (2016, March, 27). [Online], Available : https://nakedsecurity.sophos.com/2013/07/06/cryptocat-encrypted-group-chats-may-have-been-crackable-for-7-months/
  • Health BI . (2016, March, 28). [Online], Available : http://www.healthbi.com/secure-messaging-careful-pitfalls/
  • Schneier on Security (2016, March, 29). [Online], Available : https://www.schneier.com/essays/archives/1998/01/security_pitfalls_in.html
  • J. Cao and M. Ma, “A Survey on Security Aspects for LTE and LTE-A Networks,” IEEE, Communication Surveys and Tutorials, 16(1), 283-302, 1955.
  • R. Nossenson, “Long-Term Evolution Network Architecture,” IEEE, International conference on Microwave, Communications, Antennas and Electronics Systems, 2009, pp.1-4.
  • Y. Huang, F. Leu and J. Liu, “A Secure Wireless Communication System Integrating PRNG and Diffie-Hellman PKDS by Using a Data Connection Core,” IEEE International conference on Broadband Wireless Computing, Communication and Applications, 2013, 360-365.
  • P.Kanani, V.Kaul, K.Shah,” Hybrid PKDS in 4G” ,ICSPCT 2014, pp- 323-328.
  • Java Cryptography Architecture standard algorithm name documentation. (2016,May,2015). [Online]. Available: http://docs.oracle.com/javase/7/docs/technotes/guides/security/StandardNames.html#CipherM. Young, The Technical Writer’s Handbook, Mill Valley, CA: University Science, 1989.

Abstract Views: 338

PDF Views: 2




  • Access Control and Encryption of Sensitive Data Using i-Se4GE Algorithm

Abstract Views: 338  |  PDF Views: 2

Authors

Mamta Padole
Department of Computer Science and Engineering Maharaja Sayajirao, University of Baroda, Baroda, India
Pratik Kanani
Department of Information Technology, University of Mumbai, Mumbai, India

Abstract


Encryption, itself doesn’t prevent interception, but denies the message content to the interceptor. For technical reasons, an encryption scheme usually uses a pseudo-random encryption key generated by an algorithm. It is impossible to decrypt the message without possessing the key, but, for a well-designed encryption scheme, large computational resources and skills are required to decrypt it. An authorized recipient can easily decrypt the message with the key provided by the originator to recipients, but not to unauthorized interceptors.

Data hiding is the skill of hiding messages in such a ways the only the sender and the receiver of the message knows that the message has been hidden. In the context of secured information transmission and reception, efficient techniques for data encryption and decryption are very much essential. In this paper, a message transfer application is developed which mainly focusses on secret message transfer between two parties. Used scheme not only focusses on text but also the encryption of images and videos. A unique algorithm i-Se4GE is used for the transfer of keys required for the encryption and decryption of messages. This algorithm makes use of a set of random numbers, timestamp of the two users, a set of public keys and dynamic keys. The algorithm uses a two-step authentication request-reply process which provides it a double layer security.


Keywords


I-Se4GE, Cryptocat, TestSecure, MME, HS, Attacks.

References





DOI: https://doi.org/10.13005/ojcst%2F10.01.04