CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

by Krishna Kumar Pandey, Vikas Rangari, Sitesh Kumar Sinha
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 74 - Number 20
Year of Publication: 2013
Authors: Krishna Kumar Pandey, Vikas Rangari, Sitesh Kumar Sinha
10.5120/13028-0215

Krishna Kumar Pandey, Vikas Rangari, Sitesh Kumar Sinha . An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security. International Journal of Computer Applications. 74, 20 ( July 2013), 29-33. DOI=10.5120/13028-0215

@article{ 10.5120/13028-0215,
author = { Krishna Kumar Pandey, Vikas Rangari, Sitesh Kumar Sinha },
title = { An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security },
journal = { International Journal of Computer Applications },
issue_date = { July 2013 },
volume = { 74 },
number = { 20 },
month = { July },
year = { 2013 },
issn = { 0975-8887 },
pages = { 29-33 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume74/number20/13028-0215/ },
doi = { 10.5120/13028-0215 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:42:51.152504+05:30
%A Krishna Kumar Pandey
%A Vikas Rangari
%A Sitesh Kumar Sinha
%T An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security
%J International Journal of Computer Applications
%@ 0975-8887
%V 74
%N 20
%P 29-33
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for providing better security and it also provide the concept of internal key generation at receiver end on the basis of 512 bits key which will entered by the sender. This internal key will store in the sender end database and send to the receiver end by other path for preventing brute force attack and other harmful attacks on security. This algorithm is more efficient for large data where existing algorithms provides efficient encryption and decryption only for 2MB data. This work provides better speed in comparison to existing algorithms for large size of files with less overhead.

References
  1. Dripto Chatterjee, Joyshree Nath, Suvadeep Dasgupta, Asoke Nath "A new Symmetric key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm" published in 2011 International Conference on Communication Systems and Network Technologies, 978-0-7695-4437-3/11 $26. 00 © 2011 IEEE.
  2. Yan Wang and Ming Hu "Timing evaluation of the known cryptographic algorithms "2009 International Conference on Computational Intelligence and Security 978-0-7695-3931-7/09 $26. 00 © 2009 IEEE DOI 10. 1109/CIS. 2009. 81.
  3. Symmetric key cryptography using random key generator, A. Nath, S. Ghosh, M. A. Mallik, Proceedings of International conference on SAM-2010 held at Las Vegas (USA) 12-15 July, 2010, Vol-2, and P-239-244.
  4. Data Hiding and Retrieval, A. Nath, S. Das, A. Chakrabarti, Proceedings of IEEE International conference on Computer Intelligence and Computer Network held at Bhopal from 26-28 Nov, 2010.
  5. Neal Koblitz "A Course in Number Theory and Cryptography" Second Edition Published by Springer-Verlag.
  6. By Klaus Felten "An Algorithm for Symmetric Cryptography with a wide range of scalability" published by 2nd International Workshop on Embedded Systems, Internet Programming and Industial IT.
  7. Majdi Al-qdah & Lin Yi Hui "Simple Encryption/Decryption Application" published in International Journal of Computer Science and Security, Volume (1): Issue (1).
  8. T Morkel, JHP Eloff "ENCRYPTION TECHNIQUES: A TIMELINE APPROACH" published in Information and Computer Security Architecture (ICSA) Research Group proceeding.
  9. Text book William Stallings, Data and Computer Communications, 6eWilliam 6e 2005.
  10. Md. Nazrul Islam, Md. Monir Hossain Mia, Muhammad F. I. Chowdhury, M. A. Matin "Effect of Security Increment to Symmetric Data Encryption through AES Methodology" Ninth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing 978-0-7695-3263-9/08 DOI 10. 1109/SNPD. 2008. 101 IEEE 2008.
  11. [Rijn99] Joan Daemen and Vincent Rijmen, AES submission document on Rijndael, Version 2, September 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Information security Encryption Decryption Cryptography Brute force attack