Abstract
Information security incorporates information encryption, hashing, tokenization, and key administration rehearses that ensure information over all applications and stages. The purpose of this paper is to strengthen data security using multi-level cryptography algorithm. A half-breed calculation is a calculation that joins at least two different calculations that take care of a similar issue, either picking one (contingent upon the information) or exchanging between them through the span of the calculation. This is commonly done to consolidate wanted highlights of each, with the goal that the general calculation is superior to the individual parts. The average values are calculated here for time and memory parameters by combining three algorithms which are multi-prime RSA, DES, and Vernam Cipher. RSA calculation is a well-known exponentiation in a limited field over whole numbers including prime numbers. The Data Encryption Standard is a symmetric-key calculation for encryption of computerized information. Despite the fact that its short key length of 56 bits makes it excessively unreliable for applications, it has been profoundly powerful in the headway of cryptography. In present day wording, Vernam Cipher is an even stream cipher where the plaintext is joined with an arbitrary stream of information (the “keystream”) of a similar range, to create the cipher text, utilizing XOR. Subsequent to consolidating these three calculations, the framework will be somewhat rugged. The results have been represented after using a different number of primes with this hybrid algorithm. The preferences and thinking for utilizing this approach have additionally been recorded in this paper.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. In: The 6th International Forum on Strategic Technology. Heilongjiang, Harbin, pp. 1118–1121. https://doi.org/10.1109/IFOST.2011.6021216
Bahig, H.M., Bhery, A., Nassr, D.I.: Cryptanalysis of multi-prime RSA with small prime difference. In: Information and Communications Security, pp. 33–44. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34129-8_4
Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev., 243–250. https://doi.org/10.1147/rd.383.0243
Chatterjee, T., Das, T., Dey, S., Nath, A., Nath, J.: World Congress on Information and Communication Technologies, pp. 1175–1179. Mumbai, India (2011). https://doi.org/10.1109/WICT.2011.6141415
Gutub, A., Khan, F.: Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. Int. Conf. Adv. Comput. Sci. Appl. Technol. (ACSAT) (2012). https://doi.org/10.1109/ACSAT.2012.44
Pawar, B.K., Hatkar, S.S.: Symmetric key algorithm using Vernam cipher: VSA. In: International Conference on Inventive Computation Technologies (ICICT), pp. 1–6, Tamil Nadu (2016). https://doi.org/10.1109/INVENTIVE.2016.7830196
Gambhir, A., Khushboo, Arya, R.: Performance Analysis and Implementation of DES Algorithm and RSA Algorithm with Image and Audio Steganography Techniques, vol. 810, pp. 1021–1028. Springer Nature Singapore Pte Ltd. 2019, Singapore (2018). https://doi.org/10.1007/978-981-13-1513-8_103
Amalarethinam, G., Leena, H.M.: Enhanced RSA algorithm with varying key sizes for data security in cloud. In: World Congress on Computing and Communication Technologies (WCCCT), pp. 172–175, Tiruchirappalli (2017)
Amalarethinam, I.G., Leena, H.M.: Enhanced RSA algorithm with varying key sizes for data security in cloud. In: World Congress on Computing and Communication Technologies (WCCCT), pp. 172–175, Tiruchirappalli (2016). https://doi.org/10.1109/WCCCT.2016.50
Hema, V., Dr, M., Durga, G.: Data integrity inspection based on modified Vernam Cipher technique. Int. J. Eng. Res. Technol. (IJERT) 3(33), 1–4 (2015)
Brosas, D.G., Sison, A.M., Medina, R.P.: Strengthening the vernam cipher algorithm using multilevel encryption techniques. Int. J. Sci. Technol. Res. 8(10), 601–606 (2019)
Kahate, A.: Cryptography and Network Security, 2nd edn, pp. 87–2004. Tata McGraw Hill Education, India (2009)
Sani, N.A.A., Kamarulhaili, H.: RSA cryptography and multi prime RSA cryptography. In: Proceedings of the 24th National Symposium on Mathematical Sciences, pp. 1–6 (2017). https://doi.org/10.1063/1.4995903
Putera, A., Siahaan, U.: Securing short message service using Vernam Cipher in android operating system. IOSR J. Mob. Comput. Appl. (IOSR-JMCA) 3(4), 11–16 (2016). https://doi.org/10.9790/0050-03041116
Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Education; Prentice Hall (2009)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Pritilata, Mahmood, M.A. (2022). Strengthening Data Security Using Multi-level Cryptography Algorithm. In: Gandhi, T.K., Konar, D., Sen, B., Sharma, K. (eds) Advanced Computational Paradigms and Hybrid Intelligent Computing . Advances in Intelligent Systems and Computing, vol 1373. Springer, Singapore. https://doi.org/10.1007/978-981-16-4369-9_31
Download citation
DOI: https://doi.org/10.1007/978-981-16-4369-9_31
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-4368-2
Online ISBN: 978-981-16-4369-9
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)