Implementation of Multi-Pass Method using Advanced Number Series Cipher Techniques in a Network Channel

Implementation of Multi-Pass Method using Advanced Number Series Cipher Techniques in a Network Channel

  IJETT-book-cover           
  
© 2023 by IJETT Journal
Volume-71 Issue-8
Year of Publication : 2023
Author : V. Joseph Emmanuvel, E. J. Thomson Fredik
DOI : 10.14445/22315381/IJETT-V71I8P237

How to Cite?

V. Joseph Emmanuvel, E. J. Thomson Fredik, "Implementation of Multi-Pass Method using Advanced Number Series Cipher Techniques in a Network Channel," International Journal of Engineering Trends and Technology, vol. 71, no. 8, pp. 428-438, 2023. Crossref, https://doi.org/10.14445/22315381/IJETT-V71I8P237

Abstract
As far as the need for computers has become more for almost all communication functions, the essentiality of automated tools for safeguarding files and messages and, of course, other significant information available n the individual’s computer has to be highly secured. To get the messages transmitted to be secured, the information has to be protected or hidden or changed in a diverse design where only the two authorized communicating individuals can know what actually is happening in the communication channel. Confidentiality, integrity and availability of the message have to be perfectly authorized. Computer Security is the widespread name we use for compiling considered tools to protect data from nosy people, attackers and hackers. Nowadays, since millions and millions of people have started using computer networks for various operations like banking, income tax filing returns, buying and selling, online purchase, ordering of goods, etc., the need for security is being threatened from the perspective of a potentially immense problem. In this attachment, an innovative method should be designed to carry out, making sure the security of data transmission between two persons. That, too, this newly proposed procedure should be designed such that no challenger can prevail over its principle. The main motive of the secret message is to generate security in the algorithm. While starting to concentrate on designing the new security model, that particular model has to be created for the distribution cum allotment of covert data. In this research paper, a new method is recommended where. The implementation of the multi-pass protocol method using an advanced number series cipher technique is utilized to encrypt and decrypt a message in a network channel using Symmetric Key Encryption.

Keywords
- Mathematical series cipher, Multi pass protocol, Decryption, Cryptography, Encryption.

References
[1] William Stallings, Cryptography and Network Security – Principles and Practices, Third Edition, Pearson Education, Prantice Hall, 2007.
[2] Behrouz A Forouzan, and Debdeep Mukhopadhyay, Cryptography and Network Security, Third Edition, The McGraw Hill Companies, Inc, 2015.
[Google Scholar] [Publisher Link]
[3] V Joseph Emmanuvel, and E.J Thomson Fredrik, “Three Pass Protocol Implementation using Number Cipher Encryption in a Communication Network,” Journal of Xi'an University of Architecture & Technology, vol. 11, no. 8, pp. 1338-1341, 2020.
[Google Scholar] [Publisher Link]
[4] Fuyuki Kitagawa, Ryo Nishimaki, and Keisuke Tanaka, “Obfustopia Built on Secret – Key Functional Encryption,” Journal of Cryptology, vol. 35, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Boni Oktavianab, and Andysah Putera Utama Siahaan, “Three-Pass Protocol Implementation in Caesar Cipher Classic Cryptography,” IOSR Journal of Computer Engineering, vol. 18, no. 4, pp. 26-29, 2016.
[Google Scholar] [Publisher Link]
[6] Priya Thakur, and Anurag Rana, “A Symmetrical key Cryptography Analysis using Blowfish Algorithm,” International Journal of Engineering Research & Technology, vol. 5, no. 7, pp. 235-238, 2016.
 [Google Scholar] [Publisher Link]
[7] Ayushi, “A Symmetric Key Cryptographic Algorithm,” International Journal of Computer Applications, vol. 1, no. 15, 2010.
[Publisher Link]
[8] Andizhan Putera Utama Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and Research, vol. 5, no. 7, pp. C-31-C-35, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[9] Amin Subandi et al., “Three-Pass Protocol Implementation in Vigenere Cipher Classic Cryptography Algorithm with Keystream Generator Modification,” Advances in Science, Technology and Engineering Systems Journal, vol. 2, No. 5, pp. 1-5, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[10] Robbi Rahim, and Ali Ikhwan, “Study of Three Pass Protocol on Data Security,” International Journal of Science and Research, vol. 5, no. 11, pp. 102-104, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[11] V. Joseph Emmanuvel, and E.J. Thomson Fredrik, “Implementation of Four-Pass Protocol Scheme using Mathematical Series Cipher Encryption and Decryption in a Communication Network,” Proceedings of International Conference on Communication and Artificial Intelligence, vol. 435, pp. 85-96, 2022.
[CrossRef] [Google Scholar] [Publisher Link]
[12] AditiSoral, "Achieving Fully Homomorphic Encryption in Security - A Survey," SSRG International Journal of Computer Science and Engineering, vol. 3, no. 2, pp. 22-27, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Duc Manh Nguyen, and Sunghwan Kim, “A Quantum Three Pass Protocol with Phase Estimation for Many Bits Transfer,” International Conference on Advanced Technologies for Communications, IEEE, pp. 129-132, 2019.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Dian Rachmawati, and Mohammad Andri Budiman, “An Implementation of H–rabin Algorithm in the Shamir Three Pass Protocol,” International Conference on Automation, Cognitive Science, Optics, Micro – Electro Mechanical System and Information Technology (ICACOMIT), IEEE, pp. 28-33, 2017.
[CrossRef] [Google Scholar] [Publisher Link]
[15] C. Okah, D. Matthias, and N. Nwiabu, "A Real-Time Encryption Algorithm for User Data Preservation in Mobile Computing," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 3, pp. 1-11, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[16] Jonathan Katz, and Yehude Lindell, Introduction to Modern Cryptography, 2007.
[CrossRef] [Google Scholar] [Publisher Link]
[17] Jagpreet Kaur, Shweta Lamba, and Preeti Saini, “Advanced Encryption Standards: Attacks and Current Research Trends,” International Conference on Advance Computing and Innovative Technologies in Engineering, pp. 112-116, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[18] B. Akhil et al., "Light Weight Security Coding using PRESENT Algorithm for Cryptography Application," SSRG International Journal of VLSI & Signal Processing, vol. 7, no. 2, pp. 1-5, 2020.
[CrossRef] [Publisher Link]
[19] Walid Bagga, and Refik Molva, “Policy Based Cryptography and Applications,” Proceedings of Financial Cryptography and Data Security, vol. 3570, pp. 72–87, 2005.
[CrossRef] [Google Scholar] [Publisher Link]
[20] Arun Pratap Singh, and Himanshu Pundir, "Secure File Storage on Cloud using Cryptography," SSRG International Journal of Computer Science and Engineering, vol. 7, no. 5, pp. 12-15, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[21] Fred Piper, “Recent Trends in Research in Cryptography and Security Mechanism in Cryptography,” Elsevier Science Ltd, pp. 23–26, 2003.
[22] Ekta Agrawal, and Parashu Ram Pal, “A Secure and Fast Approach for Encryption and Decryption of Message Communication,” International Journal of Engineering Science and Computing, vol. 7, no. 5, pp. 11481-11485, 2017.
[Google Scholar] [Publisher Link]