Skip to main content

Strengthening Data Security Using Multi-level Cryptography Algorithm

  • Conference paper
  • First Online:
Advanced Computational Paradigms and Hybrid Intelligent Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1373))

  • 727 Accesses

Abstract

Information security incorporates information encryption, hashing, tokenization, and key administration rehearses that ensure information over all applications and stages. The purpose of this paper is to strengthen data security using multi-level cryptography algorithm. A half-breed calculation is a calculation that joins at least two different calculations that take care of a similar issue, either picking one (contingent upon the information) or exchanging between them through the span of the calculation. This is commonly done to consolidate wanted highlights of each, with the goal that the general calculation is superior to the individual parts. The average values are calculated here for time and memory parameters by combining three algorithms which are multi-prime RSA, DES, and Vernam Cipher. RSA calculation is a well-known exponentiation in a limited field over whole numbers including prime numbers. The Data Encryption Standard is a symmetric-key calculation for encryption of computerized information. Despite the fact that its short key length of 56 bits makes it excessively unreliable for applications, it has been profoundly powerful in the headway of cryptography. In present day wording, Vernam Cipher is an even stream cipher where the plaintext is joined with an arbitrary stream of information (the “keystream”) of a similar range, to create the cipher text, utilizing XOR. Subsequent to consolidating these three calculations, the framework will be somewhat rugged. The results have been represented after using a different number of primes with this hybrid algorithm. The preferences and thinking for utilizing this approach have additionally been recorded in this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 189.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 249.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Zhou, X., Tang, X.: Research and implementation of RSA algorithm for encryption and decryption. In: The 6th International Forum on Strategic Technology. Heilongjiang, Harbin, pp. 1118–1121. https://doi.org/10.1109/IFOST.2011.6021216

  2. Bahig, H.M., Bhery, A., Nassr, D.I.: Cryptanalysis of multi-prime RSA with small prime difference. In: Information and Communications Security, pp. 33–44. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-34129-8_4

  3. Coppersmith, D.: The data encryption standard (DES) and its strength against attacks. IBM J. Res. Dev., 243–250. https://doi.org/10.1147/rd.383.0243

  4. Chatterjee, T., Das, T., Dey, S., Nath, A., Nath, J.: World Congress on Information and Communication Technologies, pp. 1175–1179. Mumbai, India (2011). https://doi.org/10.1109/WICT.2011.6141415

  5. Gutub, A., Khan, F.: Hybrid crypto hardware utilizing symmetric-key and public-key cryptosystems. Int. Conf. Adv. Comput. Sci. Appl. Technol. (ACSAT) (2012). https://doi.org/10.1109/ACSAT.2012.44

    Article  Google Scholar 

  6. Pawar, B.K., Hatkar, S.S.: Symmetric key algorithm using Vernam cipher: VSA. In: International Conference on Inventive Computation Technologies (ICICT), pp. 1–6, Tamil Nadu (2016). https://doi.org/10.1109/INVENTIVE.2016.7830196

  7. Gambhir, A., Khushboo, Arya, R.: Performance Analysis and Implementation of DES Algorithm and RSA Algorithm with Image and Audio Steganography Techniques, vol. 810, pp. 1021–1028. Springer Nature Singapore Pte Ltd. 2019, Singapore (2018). https://doi.org/10.1007/978-981-13-1513-8_103

  8. Amalarethinam, G., Leena, H.M.: Enhanced RSA algorithm with varying key sizes for data security in cloud. In: World Congress on Computing and Communication Technologies (WCCCT), pp. 172–175, Tiruchirappalli (2017)

    Google Scholar 

  9. Amalarethinam, I.G., Leena, H.M.: Enhanced RSA algorithm with varying key sizes for data security in cloud. In: World Congress on Computing and Communication Technologies (WCCCT), pp. 172–175, Tiruchirappalli (2016). https://doi.org/10.1109/WCCCT.2016.50

  10. Hema, V., Dr, M., Durga, G.: Data integrity inspection based on modified Vernam Cipher technique. Int. J. Eng. Res. Technol. (IJERT) 3(33), 1–4 (2015)

    Google Scholar 

  11. Brosas, D.G., Sison, A.M., Medina, R.P.: Strengthening the vernam cipher algorithm using multilevel encryption techniques. Int. J. Sci. Technol. Res. 8(10), 601–606 (2019)

    Google Scholar 

  12. Kahate, A.: Cryptography and Network Security, 2nd edn, pp. 87–2004. Tata McGraw Hill Education, India (2009)

    Google Scholar 

  13. Sani, N.A.A., Kamarulhaili, H.: RSA cryptography and multi prime RSA cryptography. In: Proceedings of the 24th National Symposium on Mathematical Sciences, pp. 1–6 (2017). https://doi.org/10.1063/1.4995903

  14. Putera, A., Siahaan, U.: Securing short message service using Vernam Cipher in android operating system. IOSR J. Mob. Comput. Appl. (IOSR-JMCA) 3(4), 11–16 (2016). https://doi.org/10.9790/0050-03041116

  15. Stallings, W.: Cryptography and Network Security Principles and Practices, 4th edn. Pearson Education; Prentice Hall (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Pritilata, Mahmood, M.A. (2022). Strengthening Data Security Using Multi-level Cryptography Algorithm. In: Gandhi, T.K., Konar, D., Sen, B., Sharma, K. (eds) Advanced Computational Paradigms and Hybrid Intelligent Computing . Advances in Intelligent Systems and Computing, vol 1373. Springer, Singapore. https://doi.org/10.1007/978-981-16-4369-9_31

Download citation

Publish with us

Policies and ethics