We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Let It Encrypt (LIE)

by Mukta Sharma, Surbhi Dwivedi, R.B. Garg
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 128 - Number 8
Year of Publication: 2015
Authors: Mukta Sharma, Surbhi Dwivedi, R.B. Garg
10.5120/ijca2015906617

Mukta Sharma, Surbhi Dwivedi, R.B. Garg . Let It Encrypt (LIE). International Journal of Computer Applications. 128, 8 ( October 2015), 9-15. DOI=10.5120/ijca2015906617

@article{ 10.5120/ijca2015906617,
author = { Mukta Sharma, Surbhi Dwivedi, R.B. Garg },
title = { Let It Encrypt (LIE) },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 128 },
number = { 8 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 9-15 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume128/number8/22891-2015906617/ },
doi = { 10.5120/ijca2015906617 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:20:50.815431+05:30
%A Mukta Sharma
%A Surbhi Dwivedi
%A R.B. Garg
%T Let It Encrypt (LIE)
%J International Journal of Computer Applications
%@ 0975-8887
%V 128
%N 8
%P 9-15
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Living in the era of Information technology has leveraged the mankind. The technology has made the life so easy and convenient. It has given the power to speed up the task. Starting from the very basic daily routine shopping, to paying bills, updating passbooks, reserve a table, book a movie ticket or plane ticket etc. has widened the horizon of thinking and relying so much on the technology in the form of Microwave, Washing Machines, GPRS enabled cars and many more. The society experiences the benefits from the technology; at the same time the technology has its own ill effects. Which are horrifying the customers, the customers are little more reluctant, cautious and hesitant to share their information; especially when it comes to the finances and personal demography. The technology advancement has proven as a boon until someone becomes a victim of the same. The banks have turned more vigilant and they are concerned for their customer’s privacy, confidentiality and integrity. The banks are going a step forward to help the customers feel more secure to transact online. Therefore, banks are coming up with better security measures like virtual keyboard, OTP, 3D secure pin, Grid matrix etc. Banks are simultaneously looking for a good secure algorithm so that the transactions could be more secure in case they reach wrong hands. In this paper, LIE (Let it Encrypt) as the name suggests an algorithm has been proposed with a vision to secure the online transactions. This paper focuses on Symmetric Key Cryptography algorithm. This paper proposes a new encryption algorithm – LIE and discusses and compares it with few of the symmetric key algorithms like DES, 3DES, Blowfish and AES.

References
  1. A. Kumar, S. Jakhar and S. Makkar, “Comparative Analysis between DES and RSA Algorithm’s”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 2, Issue 7, Jul 2012
  2. A. Menezes, P. van, Oorschot, and S. Vanstone, “Handbook of Applied Cryptography”, CRC Press, 1996.
  3. B.Guttman and E. Roback, “ An Introduction to Computer Security: The NIST Handbook”, Special Publication, 1995
  4. B. Schneier, “Applied Cryptography”, Second Edition,  John Wiley & Sons, Inc., 1996
  5. W. Stallings, “Network Security Essentials Applications and Standards”, 4th edition, Pearson, 2011
  6. W. Stallings, “Cryptography and Network Security: Principles and Practice”,5th edition, Pearson, 2011
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Symmetric & Asymmetric Cryptography Plain Text Cipher Text Encryption Decryption Key DES AES LIE