Secure Text Encryption in Intranet Using Elliptic Curve Cryptography
Arpana Kumari1 , Vivek Kapoor2
Section:Research Paper, Product Type: Journal Paper
Volume-7 ,
Issue-6 , Page no. 981-984, Jun-2019
CrossRef-DOI: https://doi.org/10.26438/ijcse/v7i6.981984
Online published on Jun 30, 2019
Copyright © Arpana Kumari, Vivek Kapoor . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Arpana Kumari, Vivek Kapoor, “Secure Text Encryption in Intranet Using Elliptic Curve Cryptography,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.6, pp.981-984, 2019.
MLA Style Citation: Arpana Kumari, Vivek Kapoor "Secure Text Encryption in Intranet Using Elliptic Curve Cryptography." International Journal of Computer Sciences and Engineering 7.6 (2019): 981-984.
APA Style Citation: Arpana Kumari, Vivek Kapoor, (2019). Secure Text Encryption in Intranet Using Elliptic Curve Cryptography. International Journal of Computer Sciences and Engineering, 7(6), 981-984.
BibTex Style Citation:
@article{Kumari_2019,
author = {Arpana Kumari, Vivek Kapoor},
title = {Secure Text Encryption in Intranet Using Elliptic Curve Cryptography},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2019},
volume = {7},
Issue = {6},
month = {6},
year = {2019},
issn = {2347-2693},
pages = {981-984},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=4666},
doi = {https://doi.org/10.26438/ijcse/v7i6.981984}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i6.981984}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=4666
TI - Secure Text Encryption in Intranet Using Elliptic Curve Cryptography
T2 - International Journal of Computer Sciences and Engineering
AU - Arpana Kumari, Vivek Kapoor
PY - 2019
DA - 2019/06/30
PB - IJCSE, Indore, INDIA
SP - 981-984
IS - 6
VL - 7
SN - 2347-2693
ER -
VIEWS | XML | |
406 | 237 downloads | 113 downloads |
Abstract
The intranet-based applications are safe and in-house applications hosted inside the internal network. Internet applications need internet to process client requests from the browser to web server instead they only need internal communication with an internal dedicated server. Most companies like to deploy such applications to keep their sensitive data inside the network. Army organizations are best examples instead to store data at the remote server through the internet, they prefer to use a local server with the intranet. This work observes the need for security inside intranet-based applications. It implies designing intranet application by mitigating issues evolved in existing work. This work proposed to use of Elliptic Curve Cryptography and RC6 algorithms to keep data safe and secure inside the intranet using double layer security mechanism. The complete work will be implemented using Java technology and a small application will be created to evaluate the performance of the proposed solution.
Key-Words / Index Term
Intranet application, Elliptic curve cryptography, Cryptographic technique, Data security
References
[1] Keerthi K, Dr. B. Surendiran, “Elliptic Curve Cryptography for Secured Text Encryption”. 2017 International Conference on circuits Power and Computing Technologies [ICCPCT], 2017 IEEE.
[2] S.M. C Vigila and Munseeswaran,” Implementation of Text based cryptosystem using elliptic curve cryptography”, 2009 1st International conference on advances computing, ICAC 2009, pp.82-85,2009.
[3] L. D. Singh and K. M. Singh,” Implementation of Text Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, vol.54, no.1, pp. 73-82,2015
[4] Akshita Bhandari, Ashutosh Gupta, Debasis Das, “A framework for Data Security and Storage in Cloud Computing”. International Conference on Computational Techniques in Information and Communication Technologies (ICCTICT), 2016.
[5] Milind Mathur, Ayush Kesarwani, "Comparison between DES, 3DES, RC2, RC6, BLOWFISH, and AES”. Proceedings of National Conference on New Horizons in IT – NCNHIT 2013.
[6] A Arjuna Rao, K Sujatha, A Bhavana Deepthi, L V Rajesh, “Survey paper comparing ECC with RSA, AES and Blowfish Algorithms” International Journal on Recent and Innovation Trends in Computing and Communication Volume: 5, Issue: 1, IJRITCC, January 2017.
[7] Atul Kahate “Cryptography and Network Security”, Second Edition-2003, Tata McGraw Hill New Delhi, 10th reprint-2010.
[8] M. Wiesmann, F. Pedonet, A. Schiper, B. Kemmet, G. Alonso “Database Replication Techniques: a Three Parameter Classification” published in Reliable Distributed Systems, 2000. SRDS-2000. Proceedings. The 19th IEEE Symposium on at Lausanne PP. 206-215.
[9] DV Kapoor, R Yadav “A hybrid cryptography technique to support cyber security infrastructure” - Int. J. Adv. Res. Computer. Engg. Technology, 2015
[10] V. Kapoor, "A New Cryptography Algorithm with an Integrated Scheme to Improve Data Security", International Journal of Scientific Research in Network Security and Communication, Vol.1, Issue.2, pp.39-46, 2013
[11] G.L. Pavani, Ch.Ramesh, "Secure Data Retrieval using Cipher Text Policy-Attribute Based Encryption in Hybrid Networks", International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.4, pp.45-48, 2017
[12] A hybrid cryptography technique for improving network security
V Kapoor, R Yadav - International Journal of Computer Applications,2016
[13] A Review on Key Agreement Protocols used in Bluetooth Standard and Security Vulnerabilities in Bluetooth Transmission 1 T Panse, V Kapoor, P Panse - 2012