CFP last date
20 December 2024
Reseach Article

Optimal Keyless Algorithm for Security

by Neha, Paramjeet Singh, Shaveta Rani
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 124 - Number 10
Year of Publication: 2015
Authors: Neha, Paramjeet Singh, Shaveta Rani
10.5120/ijca2015905620

Neha, Paramjeet Singh, Shaveta Rani . Optimal Keyless Algorithm for Security. International Journal of Computer Applications. 124, 10 ( August 2015), 28-32. DOI=10.5120/ijca2015905620

@article{ 10.5120/ijca2015905620,
author = { Neha, Paramjeet Singh, Shaveta Rani },
title = { Optimal Keyless Algorithm for Security },
journal = { International Journal of Computer Applications },
issue_date = { August 2015 },
volume = { 124 },
number = { 10 },
month = { August },
year = { 2015 },
issn = { 0975-8887 },
pages = { 28-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume124/number10/22141-2015905620/ },
doi = { 10.5120/ijca2015905620 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:14:04.499905+05:30
%A Neha
%A Paramjeet Singh
%A Shaveta Rani
%T Optimal Keyless Algorithm for Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 124
%N 10
%P 28-32
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In Modern era, every business is dependent on the Internet. The Network is growing so quickly that now at this stage no one can ever imagine anything without use of internet. But at the same time security over network is very important because of the vulnerability of data to eavesdropping. To protect the data from eavesdropping, it must be appropriately encrypted before sending over the network. There are two types of algorithms, keyed and keyless, exist to protect data. The keyed algorithms are efficient but to avoid the overhead of key generation and key management, keyless algorithms are getting popularity now days. The proposed algorithm “Optimal Keyless Algorithm for Security” represents a new way of using data itself to create a protective shield. The algorithm provides security at both character level as well as bit level. The number of rounds and the number of shifts applied at bit level are made data dependent to increase the security level, is a major advantage of the algorithm. The system is proposed with the motive to provide highest security level with minimum execution time in terms of encryption and decryption. This paper presents simulation results of proposed algorithm and its comparison with the commonly used JS keyless algorithm.

References
  1. Nishika, Rahul Kumar Yadav, “Cryptography on Android Message Applications – A Review”, IJCSE, Volume 5, May 2013.
  2. J.Pokharel, N.Saisumanth, C.T.Rupa, V.Saradhi, “A KEYLESS JS ALGORITHM”, International Journal of Engineering Science & Advanced Technology, Volume 2 No.05, Sep-Oct 2012, ISSN: 2250-3667, pp. 1397 – 1401.
  3. M.Lakshmi,S.Kavitha, ”Keyless User Defined Optimal Security Encryption”, International Journal Of Engineering And Computer Science, Volume 2 , June 2013, ISSN: 1788-1793.
  4. E. Thambiraja, G. Ramesh, Dr. R. Umarani, “A survey on various most common encryption techniques”, International Journal of advanced Research in Computer Science and Software Engineering, Volume 2, Issue 7, July 2012, ISSN: 2277
  5. A.Kumar, S.Jakhar, S.Makkar, “Comparative Analysis between RSA and DES,” International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2 No.07, 2012, ISSN: 2277 128X, pp. 386-391
  6. Md. Mizanur Rahman,”Any file encryption by translating ASCII value of characters”, International Journal of advanced Research in Computer Sciences(IJARCS), Volume 2, Issue 3, May- June 2012, ISSN: 0976-5697.
  7. Jiwan Pokharel, “Analysis of Keyless JS Algorithm”, ResearchGate Publications, Dec 2013
  8. 128XUdepal Singh, Upasna Garg, “An ASCII value based text data encryption system”, International Journal of Scientific and research Publications (IJSRP), Volume 3, Issue 11, November 2013, ISSN 2250-3153.
  9. Chandra Prakash Dewangan,Shashikant Agrawal, “A Novel Approach to Improve Avalanche Effect of AES Algorithm” , International Journal of Advanced Research in Computer Engineering & Technology, Volume 1, Issue 8, Oct 2012.
  10. T.Nie, L.Zhou, Z.MingLu, “Power evaluation methods for data encryption algorithms,” IET Software IEEE, Volume 8 No.01, 2014, pp. 12–18.
  11. S.Karmakar, S.Chandra, “An Approach for Ensuring Security and its Verification,” International Journal of Computer Science Engineering, Volume 2 No.03, 2013, ISSN: 2319-7323, pp.42-49.
  12. V. Gupta, G. Singh, R. Gupta, “ Advanced cryptography Algorithm for improving data security”, International Journal of Advanced Research in Computer Science and software Engineering, Volume 2, Issue 1, January 2012, ISSN: 2277 128X.
  13. Malik S., “A novel key based transposition scheme for text encryption”, 2011 IEEE Frontiers of Information Technology (FIT), DOI: 10.1109/FIT.2011.44,pp. 201-205.
Index Terms

Computer Science
Information Sciences

Keywords

Network Security Algorithm Block Cipher Stream Cipher Optimal Data