Open Access   Article Go Back

NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security

Sourav Ghosh1 , Prithwijit Das2 , Ira Nath3 , Dharmpal Singh4 , Sudipta Sahana5

Section:Research Paper, Product Type: Journal Paper
Volume-08 , Issue-01 , Page no. 19-24, Feb-2020

Online published on Feb 28, 2020

Copyright © Sourav Ghosh, Prithwijit Das, Ira Nath, Dharmpal Singh, Sudipta Sahana . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Sourav Ghosh, Prithwijit Das, Ira Nath, Dharmpal Singh, Sudipta Sahana, “NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security,” International Journal of Computer Sciences and Engineering, Vol.08, Issue.01, pp.19-24, 2020.

MLA Style Citation: Sourav Ghosh, Prithwijit Das, Ira Nath, Dharmpal Singh, Sudipta Sahana "NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security." International Journal of Computer Sciences and Engineering 08.01 (2020): 19-24.

APA Style Citation: Sourav Ghosh, Prithwijit Das, Ira Nath, Dharmpal Singh, Sudipta Sahana, (2020). NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security. International Journal of Computer Sciences and Engineering, 08(01), 19-24.

BibTex Style Citation:
@article{Ghosh_2020,
author = {Sourav Ghosh, Prithwijit Das, Ira Nath, Dharmpal Singh, Sudipta Sahana},
title = {NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {2 2020},
volume = {08},
Issue = {01},
month = {2},
year = {2020},
issn = {2347-2693},
pages = {19-24},
url = {https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1393},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_spl_paper_view.php?paper_id=1393
TI - NTCETLS: A Novel Technique For Cryptography Ensuring Two Level Security
T2 - International Journal of Computer Sciences and Engineering
AU - Sourav Ghosh, Prithwijit Das, Ira Nath, Dharmpal Singh, Sudipta Sahana
PY - 2020
DA - 2020/02/28
PB - IJCSE, Indore, INDIA
SP - 19-24
IS - 01
VL - 08
SN - 2347-2693
ER -

           

Abstract

The method of hiding a message so that only the actual recipient receives it properly and securely is referred as encryption. Encryption can contribute a technique for hiding data from intruders. As huge amount of data is stored on computers or transmitted via computers are exposed to the attackers which is at a risk. With the quick evolution of digital information transmission in electronic way, data safety is essential in information storage and transmission. The confidentiality of data has a remarkable role in various fields like ethics, law and currently in Data Systems. With the progress of human intelligence, the art of cryptography has grown to be more complicated with the aim of make data more safe and secure. Different collections of Encryption systems are being utilized in the world of Data Systems by different institutes. A new algorithm has been proposed for the security purpose of the data to be hidden from any unauthorized access. The proposed algorithm takes a 4-digit user-defined key and also generates a key which will be used to decrypt the same. The new technique is able to handle any size data efficiently and effectively for cryptography. We have used two layers cryptography technique which is totally new as far of our knowledge. It can provide more security of data than existing works in linear time.

Key-Words / Index Term

Cryptography, Security, Multi level Security

References

[1] Diaa, S., E, Hatem M. A. K., & Mohiy M. H. (2010, May) Evaluating the Performance of Symmetric Encryption Algorithms. International Journal of Network Security, Vol.10, No.3, (pp.213-219).
[2] Sudipta Singha Roy, Kazi Md. Rokibul Alam, Md. Asaf- Uddowla, Shaikh Akib Shahriyar, and Yasuhiko Morimoto (2017). “A novel encryption model for text messages using delayed chaotic neural network and DNA cryptography”.
[3] Stallings, W. (2006). Cryptography and network security: principles and practices. Pearson Education India.
[4] Deshpande, H. S., Karande, K. J., & Mulani, A. O. (2014, April). Efficient implementation of AES algorithm on FPGA. In Communications and Signal Processing (ICCSP), 2014 IEEE International Conference on (pp. 1895-1899).
[5] Sanket A. Ubhad, Prof. Nilesh Chaubey, Prof. Shyam P. Dubey (2015). “Advanced ASCII Based Cryptography Using Matrix Operation, Palindrome Range, Unique id”.
[6] Nadeem, H (2006). “A performance comparison of data encryption algorithms”, IEEE Information and Communication Technologies, (pp. 84-89).
[7] Samir A. El-Seoud and Hosam F. El-Sofany (2017). “Studying Security of Data in Cloud Computing through
[8] Rashmi Welekar and Deepti Chaudhary (2015). “Secure Authentication Using Visual Cryptography”.
[9] Padate, R., & Patel, A. (2014). Encryption and decryption of text using AES algorithm. International Journal of Emerging Technology and Advanced Engineering, 4(5), 54-9.
[10] Kretzschmar, U. (2009). AES128–AC Implementation for Encryption and Decryption. TI-White Paper.
[11] Abhishek Pandya & Bobby Jasuja. (April 2015). Crypto-Compression System: An Integrated Approach using Stream Cipher Cryptography and Entropy Encoding