Research Article

Performance Analysis of Multiple Keys used for Data Security

by  Hitesh Mittal, Ajay Kakkar
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 95 - Issue 14
Published: June 2014
Authors: Hitesh Mittal, Ajay Kakkar
10.5120/16664-6654
PDF

Hitesh Mittal, Ajay Kakkar . Performance Analysis of Multiple Keys used for Data Security. International Journal of Computer Applications. 95, 14 (June 2014), 29-32. DOI=10.5120/16664-6654

                        @article{ 10.5120/16664-6654,
                        author  = { Hitesh Mittal,Ajay Kakkar },
                        title   = { Performance Analysis of Multiple Keys used for Data Security },
                        journal = { International Journal of Computer Applications },
                        year    = { 2014 },
                        volume  = { 95 },
                        number  = { 14 },
                        pages   = { 29-32 },
                        doi     = { 10.5120/16664-6654 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2014
                        %A Hitesh Mittal
                        %A Ajay Kakkar
                        %T Performance Analysis of Multiple Keys used for Data Security%T 
                        %J International Journal of Computer Applications
                        %V 95
                        %N 14
                        %P 29-32
                        %R 10.5120/16664-6654
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Data security is an essential component of an organization in order to keep the information safe from various competitors. It helps to ensure the privacy of a user from others. Secured and timely transmission of data is always an important aspect for an organization. The use of strong encryption algorithms almost make it impossible for a hacker to get access of node which is being protected by multiple keys. Keeping in view the importance of dynamic keys for secure data transmission this work focused on the use of dynamic keys for data security.

References
  • A. J. Elbirt, W. Yip, B. Chetwynd and C. Paar, "An FPGA Based Performance Evaluation of the AES Block Cipher Candidate Algorithm Finalists", IEEE Transactions on Very Large Scale Integration (VLSI) Systems, Vol. 9, No. 4, pp. 545-557, 2001.
  • Hua Li and J. Li, "A New Compact Dual-Core Architecture for AES Encryption and Decryption", IEEE Canadian Journal of Electrical and Computer Engineering, Vol. 33, No. 3, pp. 209-213, 2008.
  • Jason H. Li, B. Bhattacharjee, M. Yu and Levy, "A Scalable Key Management and Clustering Scheme for Wireless Adhoc and Sensor Networks", Journal of Future Generation Computer Systems, Elsevier Science Publishers, Vol. 24, pp. 860-869, 2008.
  • E. Bertino, N. Shang and S. S. Wagstaff, "An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting", IEEE Transactions on Dependable and Secure Computing, Vol. 5, No. 2, pp. 65-70, 2008.
  • H. Chien, "Efficient Time-Bound Hierarchical Key Assignment Scheme", IEEE Transactions on Knowledge and Data Engineering, Vol. 16, No. 10, pp. 1301-1304, 2004.
  • H. C. Williams, "A Modification of the RSA Public-Key Encryption Procedure", IEEE Transactions on Information Theory, Vol. 26, No. 6, pp. 726-729, 1980.
  • M. E. Hellman, "An Extension of the Shannon Theory Approach to Cryptography", IEEE Transactions on Information Theory, Vol. 23, No. 3, pp. 289-294, 1977.
  • T. Elgamal, "A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
  • M. Y. Wang, C. P. Su, C. L. Horng, C. W. Wu and C. T. Huang, "Single and Multi-core Configurable AES Architectures for Flexible Security", IEEE Transactions on Very Large Scale Integration Systems, Vol. 18, No. 4, pp. 541-552, 2010.
  • K. Bhatele, A. Sinhal and M. Pathak, "A Novel Approach to the Design of a New Hybrid Security Protocol Architecture", IEEE International Conference on Advanced Communication Control and Computing Technologies, pp. 429-433, 2012.
  • R. L. Rivest, A. Shamir and L. Adleman, "A Method for Obtaining Digital Signatures and Public-Key Cryptosystems", Communications of the ACM Magazine, Vol. 21, No. 2, pp. 120-126, 1978.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Encryption Plain Text Cipher Text Key Decryption Security

Powered by PhDFocusTM