A Real-Time Encryption Algorithm For User Data Preservation In Mobile Computing
|International Journal of Computer Science and Engineering|
|© 2020 by SSRG - IJCSE Journal|
|Volume 7 Issue 3|
|Year of Publication : 2020|
|Authors : Okah C., Matthias D., Nwiabu N.|
Okah C., Matthias D., Nwiabu N., "A Real-Time Encryption Algorithm For User Data Preservation In Mobile Computing" SSRG International Journal of Computer Science and Engineering 7.3 (2020): 1-11.
Okah C., Matthias D., Nwiabu N.,(2020). A Real-Time Encryption Algorithm For User Data Preservation In Mobile Computing. SSRG International Journal of Computer Science and Engineering 7(3), 1-11.
More recently, many businesses are sending real-time Application (RTA) on the Internet and are frequently social networking applications. Therefore, the need to protect data and user restrictions is greater vital than ever. The encryption key is used to shield the security required for the application. But on account that the RTA has high-level data, the historical encryption approach is unsuccessful, considering most RTAs serve online, the encryption and violation protocols will take a little greater time to obtain end-to-end encryption. Generally. This research work developed a new algorithm to enhance encryption time and keep endpoint data to delay time and furnish a excessive level of security in the RTA. The outcomes received from the implementation of the algorithm exhibit that our algorithms are faster and less intrusive and less touchy to contemporary information in contrast to existing algorithms.
 Atul, M. et al (2011). “FPGA Implementation of AES Algorithm”, International Conference on Electronics Computer Technology (ICECT), pp. 401-405.
 Bassil, C. et al (2005). “Critical voice network security analysis and new approach for securing Voice over IP Communications”, SETIT 2005, 3rd International Conference: Sciences of Electronic, Technologies of information and Telecommunications, Tunisia.
 Chalermwat, T. et al (2011). "FPGA Implementation of FOE-Portable hard disk System”, "The Int. Conf on Information and Communication Technology for Embedded Systems, Pattaya, Thailand.
 Cole, E. et al (2005).Network Security Bible, Wiley Publishing Inc, 2005.
 Computer Security Objects Register (CSOR): http://csrc.nist.gov/csor/.
 Daemen, J. and Rijmen, V. (2009).AES Proposal: Rijndael, AES Algorithm Submission, available at http://www.nist.gov/CryptoToolkit
 Daemen, J. and Rijmen, V. (2010).The block cipher Rijndael, Smart Card research and Applications, LNCS 1820, Springer-Verlag, pp. 288-296.
 Gladman’s, B. (2012) AES related home page http://fp.gladman.plus.com/cryptography_technology/.
 Hoang, T. and Nguyen, V. (2012). An efficient FPGA implementation of the Advanced Encryption Standard Algorithm IEEE 978-1-4673-0309-5/12.
 Lee, A. (2009). NIST Special Publication 800-21, Guideline for Implementing Cryptography in the Federal Government, National Institute of Standards and Technology.
 Manvi goyal, Jatin Sharma, “Performance Analysis of mRSA for Varying Key Sizes and Data Modulus”, SSRG International Journal of Mobile Computing & Application, Volume 2 Issue 2 May to Aug 2015
 Menezes, A. et al (2014). Handbook of Applied Cryptography, CRC Press, New York, Pp. 81-83.
 Nakahara, J. et al (2012).Square Attack on Extended Rijndael Block Copher, COSIC Technology Report.
 Nechvatal, J. et. al. (2013), Report on the Development of the Advanced Encryption Standard (AES).
 Kirti Sapra, Swati Kapoor “Modified Image Encryption Technique”, SSRG International Journal of Electronics and Communication Engineering volume1 issue6 August 2014
 Omari, A.H. et al (2008). A New Cryptographic Algorithm for the Real-Time Applications, in Proceedings of the 7th International Conference on Information Security and Privacy - (ISP’08), Cairo, Egypt.
 Wang W., Chen J. and XU F. (2012). An Implementation of AES Algorithm Based on FPGA, IEEE 978-1-4673-0024-7/10.
 Yang, J. et al (2010). FPGA based design and implementation of reduced AES algorithm, IEEE 978-0-7695-3972-0/10.
Mobile, confidentiality, cloud, privacy