Open Access   Article Go Back

Improving Source Code Encryption using Proposed Cipher Logic

SU. Rasal1 , R. Redhu2 , VS. Rasal3 , ST. Shelar4

Section:Research Paper, Product Type: Journal Paper
Volume-5 , Issue-4 , Page no. 93-96, Apr-2017

Online published on Apr 30, 2017

Copyright © SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar, “Improving Source Code Encryption using Proposed Cipher Logic,” International Journal of Computer Sciences and Engineering, Vol.5, Issue.4, pp.93-96, 2017.

MLA Style Citation: SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar "Improving Source Code Encryption using Proposed Cipher Logic." International Journal of Computer Sciences and Engineering 5.4 (2017): 93-96.

APA Style Citation: SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar, (2017). Improving Source Code Encryption using Proposed Cipher Logic. International Journal of Computer Sciences and Engineering, 5(4), 93-96.

BibTex Style Citation:
@article{Rasal_2017,
author = {SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar},
title = {Improving Source Code Encryption using Proposed Cipher Logic},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2017},
volume = {5},
Issue = {4},
month = {4},
year = {2017},
issn = {2347-2693},
pages = {93-96},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=1248},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=1248
TI - Improving Source Code Encryption using Proposed Cipher Logic
T2 - International Journal of Computer Sciences and Engineering
AU - SU. Rasal, R. Redhu, VS. Rasal, ST. Shelar
PY - 2017
DA - 2017/04/30
PB - IJCSE, Indore, INDIA
SP - 93-96
IS - 4
VL - 5
SN - 2347-2693
ER -

VIEWS PDF XML
985 472 downloads 503 downloads
  
  
           

Abstract

Web page is loaded into web browser to run the required output according to Document Object Model. Web page contents source based on applied technology like language support, platform required and versions used. Indirectly, data can be anything but it is always in the form of 0 and 1. In this paper, proposed cipher logic is applied to the bits data directly due to which it become universal supportive. Five levels proposed cipher logic has been added to the encryption process. Same logic is required to decrypt the encrypted data without which original data cannot be retrieved.

Key-Words / Index Term

Cipher policy, Document Object Model (DOM), source code, internet languages, web browser

References

[1] J. Bethencourt, A. Sahai, B. Waters, "Ciphertext-Policy Attribute-Based Encryption", 2007 IEEE Symposium on Security and Privacy (SP `07), Berkeley, pp. 321-334, 2007.
[2] SU. Rasal, ST. Shelar, VS. Rasal, “Securing Internet Banking Using Multiple Attributes Scheme And OTP”, The IIOAB Journal, Vol.7, Issue.10, pp.26-30, 2016.
[3] VS Rasal, SU Rasal, ST Shelar, “Enhancing Privacy And Security Through Mediator Using DCP-ABE With OTP”, The IIOAB Journal, Vol.7, Issue.1, pp.277-283, 2016.
[4] S. Rasal, S. Relan, K. Saxena, “OTP Processing using UABE & DABE with Session management”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol.6, Issue.5, pp.57-59, 2016.
[5] VT. Mulik, K. Saritha, SU. Rasal, “Privacy Preserving Through Mediator in Decentralized Ciphertext policy Attribute Based Encryption”, IJRET: International Journal of Research in Engineering and Technology, Vol.5, Issue.6, pp. 535-540, 2016.
[6] PJ. Lynch, S. Horton, “Web style guide”, New Haven: Yale University Press, US, pp.79-177, 2016.
[7] Matthias Hertel, Yehuda Katz, Jon Gunderson, Lori Hylan-Cho, Prasanna Bale, MN. Hoyt, “Successful Deployment of Ajax and OpenAjax”, Open AJax alliance, Vol.1, Issue.1, pp.1-6, 2015.
[8] S. Rasal, M. Matta, K. Saxena, “OTP system with third party trusted authority as a mediator”, International Journal Of Engineering And Computer Science, Vol.5, Issue.5, pp.16566-16568, 2016.
[9] R. Sanders, “The Pareto principle: its use and abuse”, Journal of Services Marketing, Vol.1, Issue.2, pp.37-40, 1987.
[10] I. Manotas, L. Pollock, J. Clause, “SEEDS: a software engineer`s energy-optimization decision support framework”, In Proceedings of the 36th International Conference on Software Engineering, New York, pp.503-514, 2014.