Protect your data in today’s world through cryptography
Journal: International Journal of Scientific Engineering and Technology (IJSET) (Vol.3, No. 10)Publication Date: 2014-10-01
Authors : Kaustubh verma; Shilpi Sharma;
Page : 1255-1258
Keywords : Cryptography; Encryption; Decryption; MD5;
Abstract
Cryptography is one of the principal means for protecting information security. Not only it has the ability to make information confidential, but has also provided digital signature, secret sub storage system security and other functions. Therefore encryption and decryption can ensure the confidentiality of the information as well as the integrity of the information. Hence, what kind of data we choose to be a key, how to distribute the private key and how to save both data transmission keys are very important issues in encryption and decryption algorithm. This paper proposes the guidelines for implementation of password based encryption cryptography. The system outlined in this paper includes an implementation of Data Encryption Standard (DES) and MD5 message digest algorithm by password based encryption (PBE) scheme for data encryption and decryption of a particular file of the existing source. In order to make the task of getting from password to key very time consuming for an attacker, the PBE implementation used in this paper is mixed in a random number known as salt and iterations in order to create a key. Besides all this, this report also discusses the use of the database connectivity which is used for storing the records of all the users who have used this application in the database and retrieving other information already stored in database for encryption and decryption. Along with these techniques discussed till now, java GUI has also been used to make the application more presentable.
Other Latest Articles
- Stability enhancement of wind power integrated system using PID controlled SVC and Power System Stabilizer
- Characterization of Power Quality Assets through Wavelets
- Teaching Electronic Circuits Using Altium Designer
- Heat Transfer Augmentation - A Review for Helical Tape Insert
- Identifying Mobile Devices Requirements for User Interface in Social Networking
Last modified: 2014-10-01 14:03:40