Two Layer Symmetric Cryptography Algorithm for Protecting Data from燗ttacks

نویسندگان

چکیده

Many organizations have insisted on protecting the cloud server from outside, although risks of attacking are mostly inside. There many algorithms designed to protect attacks that been able attacks. Still, attackers even better mechanisms break these security algorithms. Cloud cryptography is best data protection algorithm exchanges between authentic users. In this article, one symmetric will be secure data, used send and receive securely. A double encryption implemented in a format. First, XOR function applied plain text, then salt technique used. Finally, reversing mechanism provide more security. To decrypt cipher text reversed, removed, implemented. At end paper, proposed compared with other algorithms, it conclude how much existing than

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Enhanced Symmetric Key Cryptography Algorithm to Improve Data Security

This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for p...

متن کامل

Analysis on AES Algorithm using symmetric cryptography

In this paper we present the protection of long lived private key & public key using cryptographic schemes is one of the most important issues for information security. Any cryptographic scheme that reveals private key and public key will soon its security absolutely disintegrates. Public key are used in two different based, i.e. RSA and elliptic curve cryptography both are modular based arithm...

متن کامل

A Symmetric Key Algorithm for Cryptography using Music

Music and its attributes have been used in cryptography from early days. Today music is vastly used in information hiding with the use of Steganography techniques. This paper proposes an alternative to steganography by designing an algorithm for the encryption of text message into music and its attributes. The proposed algorithm converts the plain text message into a musical piece by replacing ...

متن کامل

An Algorithm for Protecting Knowledge Discovery Data

In the paper, we present an algorithm that can be applied to protect data before a data mining process takes place. The data mining, a part of the knowledge discovery process, is mainly about building models from data. We address the following question: can we protect the data and still allow the data modelling process to take place? We consider the case where the distributions of original data...

متن کامل

Advance cryptography algorithm for improving data security

Information security is the process of protecting information. It protects its availability, privacy and integrity. Access to stored information on computer databases has increased greatly. More companies store business and individual information on computer than ever before. Much of the information stored is highly confidential and not for public viewing. In this paper I have developed a new c...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Computers, materials & continua

سال: 2023

ISSN: ['1546-2218', '1546-2226']

DOI: https://doi.org/10.32604/cmc.2023.030899