Research Article

Article:An Approach to Security Using Rijndael Algorithm

by  Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 8 - Issue 5
Published: October 2010
Authors: Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao
10.5120/1204-1726
PDF

Srinivasan Nagaraj, Kishore Bhamidipati, G Apparao . Article:An Approach to Security Using Rijndael Algorithm. International Journal of Computer Applications. 8, 5 (October 2010), 31-35. DOI=10.5120/1204-1726

                        @article{ 10.5120/1204-1726,
                        author  = { Srinivasan Nagaraj,Kishore Bhamidipati,G Apparao },
                        title   = { Article:An Approach to Security Using Rijndael Algorithm },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 8 },
                        number  = { 5 },
                        pages   = { 31-35 },
                        doi     = { 10.5120/1204-1726 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Srinivasan Nagaraj
                        %A Kishore Bhamidipati
                        %A G Apparao
                        %T Article:An Approach to Security Using Rijndael Algorithm%T 
                        %J International Journal of Computer Applications
                        %V 8
                        %N 5
                        %P 31-35
                        %R 10.5120/1204-1726
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

The existing system consisted of files with literally no file security. The main issue of Reading or tapping data is secrecy and confidentiality. Confidentiality has always played an important role in diplomatic and military matters. Often Information must be stored or transferred from one place to another without being exposed to an opponent or enemy. The main aim of presenting this paper is to encrypt a java file using Rijndael Algorithm. The first aspect that has to be considered in our paper is file security and the need for file security. Key management is also related to Confidentiality. This deals with generating, distributing and storing keys .File security must be implemented so as to eliminate the problems like unauthorized access, execution of commands illicitly, destructive behavior and confidentiality reaches.

References
  • James, N., E. Barker, L. Bassham, W. Burr, M.Dworkin, J. Foti and E. Roback, 2000. Report on the development of the advanced encryption standard (AES). Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology, Technology Administration, U.S. Department of Commerce.
  • Srdjan, C., L. Buttyan and J.-P. Hubaux, 2003. Self-organized public-key management for mobile ad hoc Networks. IEEE Trans. Mobile Computing: pp: 52-64.
  • Philip, R., M. Bellare and J. Black OCB, 2003. A block-cipher mode of operation for efficient authenticated encryption. ACM Trans. Information System and Security, pp: 365-403.
  • Mary, R.T., A. Essiari and S. Mudumbai, 2003. Certificate-based authorization policy in a PKI environment. ACM Trans. Information System and Security, pp:566-88.
  • D. Alessandri, C. Cachin, M. Dacier, et al, “Towards a Taxonomy of Tntrusion Detection Systems and Attacks. MAFTIA deliverable D3”. 2001
  • Custom Attack Simulation Language, Secure Networks. 1998.
  • L.Me.Gassata, “A genetic algorithm as an alternative tools for security audit trails analysis”, RAID'98, 1998.
  • S.Kumar, Classification and Detection of Computer Instructions. PhD thesis, Purdue University, 1995.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Bytes Cipher state finite field Addition multiplication

Powered by PhDFocusTM