Study of Effectiveness and Analysis of Mathematical Equation used in Cryptographic Technique for Data Security

Main Article Content

Bhojrao Bankar

Abstract

Abstract

A cryptographic system can be defined as an implementation of cryptographic techniques and their associated infrastructure to provide information security services. A cryptosystem is also known as a cipher system. The classical ciphers work by changing or shifting the plaintext as substitution (replacing each character with another), or by transposition (shuffling the characters from its place). In this paper, the cipher techniques like Substitution, Transposition has been discussed with its functioning and effectiveness on the data security.

Downloads

Download data is not yet available.

Article Details

How to Cite
Bankar, B. (2017). Study of Effectiveness and Analysis of Mathematical Equation used in Cryptographic Technique for Data Security. Journal of Global Research in Mathematical Archives(JGRMA), 4(8), 22–33. Retrieved from https://jgrma.com/index.php/jgrma/article/view/311
Section
Research Paper

References

Chia Long Wu, Chen Hao Hu, “Computational Complexity Theoretical Analyses on Cryptographic Algorithms for Computer Security Applicationâ€, Innovations in Bio-Inspired computing and Applications (IBICA), 2012, pp. 307 – 311.

Qing Liu, Yunfei Li, Lin Hao, “On the Design and Implementation of an Efficient RSA Variantâ€, Advanced Computer Theory and Engineering (ICACTE), 2010, pp. 533-536.

Mandal, B.K., Bhattacharyya, Bandyopadhyay S.K., “Designing and Performance Analysis of a Proposed Symmetric Cryptography Algorithmâ€, Communication Systems and Network Technologies (CSNT), 2013, pp. 453 – 461.

Wang, Suli, Liu, Ganlai, “File encryption and decryption system based on RSA algorithmâ€, Computational and Information Sciences (ICCIS), 2011, pp. 797 – 800.

Da Silva, J.C.L, "Factoring Semi primes and Possible Implications for RSAâ€, Electrical and Electronics Engineers in Israel (IEEEI), 2010, pp.182–183.

Geethavani, B., Prasad, E.V. Roopa, R. “A new approach for secure data transfer in audio signals using DWTâ€, Sept 2013, pp. 1-6.

Nagar, S.A., Alshamma, S., “High speed implementation of RSA algorithm with modified keys exchange", Sciences of Electronics, Technologies of Information and Telecommunications (SETIT), pp. 639 – 642, 2010.

Chong Fu, Zhi-liang Zhu, “An Efficient Implementation of RSA Digital Signature", Wireless Communications, Networking and Mobile Computing, Oct. 2008, pp.1-4.

Li Dongjiang, Wang Yandan, Chen Hong, “The research on key generation in RSA public- key cryptosystemâ€, 2012, pp. 578–580.

Turki Al-Somani, Khalid Al-Zamil, “Performance Evaluation of Three Encryption/Decryption Algorithms on the SunOS and Linux Operating Systemsâ€.

Hongwei Si, Youlin Cai, Zhimei Cheng, “An Improved RSA Signature Algorithm Based on Complex Numeric Operation Function", Challenges in Environmental Science and Computer Engineering (CESCE), 2010, pp. 397–400.

Wenxue Tan, Wang Xiping, Jinju Xi, Meisen Pan, “A mechanism of quantitating the security strength of RSA keyâ€, Electronic Commerce and Security (ISECS), 2010, pp. 357 – 361.

Dhakar, R.S. Gupta, A.K. Sharma, P., “Modified RSA Encryption Algorithm (MREA)â€, Advanced Computing & Communication Technologies (ACCT), 2012, pp. 426–429.

Abdel-Karim Al Tamimi, "Performance Analysis of Data Encryption Algorithms", International Conference on Information and Communication Technologies, 2005

Challa Narasimham, Jayaram Pradhan,†Evaluation Of Performance Characteristics Of Cryptosystem Using Text Files†, Journal of Theoretical and Applied Information Technology, pp. 55-59, 2008.

Abdel-Karim Al Tamimi, Swati., "Performance Analysis of Data Encryption Algorithms" , International Journal of Advanced Research in Computer Science and Software Engineering 3(2), pp. 147-149 , February – 2013.

Nidhi Singhal, J.P.S.Raina "Comparative Analysis of AES and RC4 Algorithms for Better Utilization", International Journal of Computer Trends and Technology pp.177-181, August 2011

Pratap Chandra Mandal, “Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish", Journal of Global Research in Computer Science Department of Computer Application, Vol 3, pp 67-70, August 2012.