Open Access Journal

ISSN : 2394-2320 (Online)

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

Open Access Journal

International Journal of Engineering Research in Computer Science and Engineering (IJERCSE)

Monthly Journal for Computer Science and Engineering

ISSN : 2394-2320 (Online)

Encryption Technique To Secure File Exploitation

Author : Parul Choudhary 1 Prof Rohit Singhal 2

Date of Publication :7th January 2016

Abstract: The aim of this paper is to implement the new concept of cryptography. To protect information of files in digital form and how to get a security services by network security and cryptography. Though, a general summary of such algorithms like RSA, DES and AES of network security and cryptography is provided first. A complete review of the purposed system of network security and cryptography is then presented by using transmitter. The general attacks of security were reviewed. The purpose of this implementation is to secure a huge amount of files. So that others will unable to know the original data still they know about the procedure of encryption and decryption. This implementation has many applications to secure information including authentication. Here we create new technology by using such transmitter and receiver for decrypting data which is highly secure and accurate.

Reference :

    1. Parul Rathor, “Implementation of split based encryption technique for securing file transfer over a network”, in International Conference on Industrial Automation and computing [ICIAC-2014]
    2. Parul Rathor and Prof. Rohit Singhal, “Split Based Encryption in Secure File Transfer”. In International Journal of Innovative Research in computer and communication engineering, Volume 3, Issue 7, July 2015.
    3. Rajani Devi.T, “Importance of cryptography in network security”, in 2013 International conference on communication systems and network technologies.
    4. Atul kahate, “Cryptography and Network Security”book, tata McGraw-Hill publishing company limited, 2003.
    5. “Cryptography And Network Security” principles and practice, Fifth edition, Pearson by William Stallings Trappe, W., & Washington, L.C. (2006). Introduction to Cryptography with Codin Theory, 2nd ed. Upper Saddle River, NJ: Pearson Prentice Hall.
    6. Denning, D.E. (1982). Cryptography and Data Security. Reading, MA: Addison-Wesley.
    7. Electronic Frontier Foundation. (1998). Cracking DES: Secrets of Encryption Research, Wiretap Politics & Chip Design. Sebastopol, CA: O'Reilly & Associates.
    8. Schneier, B. (2000). Secrets & Lies: Digital Security in a Networked World. New York: John Wiley & Sons Network Security Essential, William Staling, Pearson Publications Ltd

Recent Article