Hardware Implementation of Secure Message Service Using Symmetric Cryptographic Technique Using Java

  • Alka P. SawlikarEmail author
  • Z. J. Khan
  • S. G. Akojwar
Conference paper
Part of the Lecture Notes on Data Engineering and Communications Technologies book series (LNDECT, volume 26)


Today storage systems are increasingly subject to vulnerable attacks. So the security system is becoming mandatory aspect of the data storage systems. Computer networks are used for sharing the data for printers and sending emails where there is a big issue of security. But today people are using internet not only for sharing tool but for blocking the creditable products like debit cards, credit cards and are misusing the accounts by hacking the passwords. The perfect measures have to be developed using compression as well as encryption techniques and without unique crypto-compression key total security cannot be expected. Data for security purpose is increasing at a rapid rate and can be handled a little bit if we can reduce its size. So to ensure security both compression and encryption algorithm have to be combined and in this paper a new symmetric cryptographic algorithm is introduced and characterized experimentally using the performance measurement approach JAVA in which file of any data length can be practically compressed, converted to ASCII, encrypted and decrypted using new encryption technique. Java is used as it is based on the computing system concept, because of the best performance issue.


Compression Cryptography Decompression Encryption File security Information security Java 



It is a great pleasure to acknowledge my deepest thanks and gratitude to Prof. Dr. Z.J. Khan, Principal R.C.E.R.T Chandrapur and Prof. Dr. S.G. Akojwar, Senior Member IEEE, Associate Professor, Dept of Instrumentation Engineering, Govt. College of Engg Chandrapur for suggesting the topic and their kind supervision. It is a great honor to work under their supervision.


  1. 1.
    Agrawal, M.: Cryptography: a survey. IETE Tech. Rev. 16(3–4), 287–296 (2015)Google Scholar
  2. 2.
    Wherate, M., Sherekar, S., Thakre, V.M.: Two layer security using visual cryptography and steganography. In: IETE 46th Mid Term Symposium on Impact of Technology on Skill Development, pp. 92–95, April 2015Google Scholar
  3. 3.
    Zhang, H., Fan, X.-p., Liu, S.-q., Zhong, Z.: Design and realization of improved LZW algorithm for wireless sensor networks. In: International Conference on Information Science and Technology, pp. 671–675. IEEE (2011)Google Scholar
  4. 4.
    Jing, Y.: The combinational application of LZSS and LZW algorithms for compression based on Huffman. In: International Conference on Electronics and Optoelectronics, pp. 397–399. IEEE (2011)Google Scholar
  5. 5.
    Tseng, K.-K., Jiang, J., Pan, J.-S., Tang, L., Hsu, C.-Y., Chen, C.-C.: Enhanced Huffman Coding with encryption for wireless data broadcasting system. In: International Symposium on Computer, Consumer and Control, pp. 622-625. IEEE (2012)Google Scholar
  6. 6.
    Karunakaran, S., Indumathy, D., Rani Hemamalini, R.: Implementation of software compression techniques. In: International Conference on Smart Structures & Systems, pp. 193–196. IEEE (2013)Google Scholar
  7. 7.
    Harinath, D., Murthy, M.V.R., Chitra, B.: Cryptographic methods and performance analysis of data encryption algorithms in network security. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 5(7), 680–688 (2015)Google Scholar
  8. 8.
    Chandramouli, R.: Battery power-aware encryption. ACM Trans. Inf. Syst. Secur. (TISSEC) 9(2), 162–180 (2006)MathSciNetCrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Alka P. Sawlikar
    • 1
    Email author
  • Z. J. Khan
    • 2
  • S. G. Akojwar
    • 3
  1. 1.Department of Electronics EngineeringR.C.E.R.T, ChandrapurChandrapurIndia
  2. 2.R.C.E.R.T, ChandrapurChandrapurIndia
  3. 3.Department of Instrumentation EngineeringGovernment College of Engineering, ChandrapurChandrapurIndia

Personalised recommendations