An Approach To Revamp The Data Security Using Cryptographic Techniques
An Approach To Revamp The Data Security Using Cryptographic Techniques
4284
ISSN No. 0976-5697
Volume 8, No. 7, July – August 2017
International Journal of Advanced Research in Computer Science
REVIEW ARTICLE
Available Online at www.ijarcs.info
AN APPROACH TO REVAMP THE DATA SECURITY USING CRYPTOGRAPHIC
TECHNIQUES
Chakshu Diwan, Dr. Sunil K Singh
Chandigarh College of Engineering and Technology,
Degree Wing, Chandigarh, India
Abstract— In this rapidly changing world where the need of digital storage is multiplying, where advance requirement is securing the data, so
that the data should reach to the designated user. Cryptography plays the crucial role on ensuring the information security and authenticity of
modernized computer systems. Information Security is a challenging issue of data communication today that is handling different areas
including secure communication channel, robust data encryption technique to maintain the database. The confidential data could be accessed by
the unauthorized user for ill-natured objective. So, it is mandatory to apply effective encryption and decryption methods to reinforce data
security. In this review paper, various cryptographic techniques, like Rivest-Shamir-Adleman (RSA), Diffie-Hellman Key Exchange, Elliptic
curve cryptography (ECC), Quantum Key Distribution (QKD) and Hybrid Cryptography are observed. By enhancing abstract, we address the
problem of determining and concluding security and also the future of encryption in a context where the database of the user must be protected.
I. INTRODUCTION A. CONFIDENTIALITY
Cryptography facilitates the user to transmit the secure The basic security service which is catered by
information across any troubled network so that it cannot be cryptography is confidentiality. This assistance helps in
used by an unauthorized party. Cryptography is the keeping the information secured from an unauthorized
mechanism that involves encryption and decryption of text party. Secrecy is the other name for confidentiality. It can
using numerous breakthroughs. Encryption means the be accomplished through many ways starting from
technique of converting the plain text into an securing the information through physical means to come
incomprehensible form called a cipher text [1]. This cryptic up with the usage of mathematical mechanisms for
form cannot be easily understood by an unauthorized party encoding.
and sent across the insecure media. Decryption means the
B. DATA INTEGRITY
technique of converting this incomprehensible form back
into its authentic form, so that it can be easily understood by Data Integrity is the security service which is concerned
the designated recipient. Database protection relies on with identifying any variation to the information. The
various approach and techniques, which includes access information might get modified by an unauthorized party.
control, network security, authentication of user and data, It cannot help in preventing the alteration of information,
encryption, digital signatures, and some other cryptographic but can provide with a way for detecting whether
methods [2]. It sounds great to develop a logical information has been modified in an illegitimate manner.
understanding of database security problems and their Manipulating the transmitted information is only allowed
explanations and to turn up with a skeleton structure. to the authorized user.
Cryptography classified as Symmetric cryptography and
C. AUTHENTICATION
Asymmetric cryptography techniques. Authorizing the two
persons, to convey the information in a way that an intruder Authentication provides the identification of the prime. The
cannot understand the shared info of what is being data acquired by the system checks the authenticity of the
transferred is the fundamental aim of cryptography. This is sender that whether the data turned up from an authorized
usually done for secrecy, and typically for private person or an illegitimate entity.
communications. D. NON-REPUDIATION
Non-repudiation is a security service, type of an assurance
II. SECURITY SERVICES OF CRYPTOGRAPHY
where the sender of the information is not in a situation to
There is an urge of providing security to ensure that data decline at a later stage his or her intentions in the
remains private and only accessible to authorized party and transporting of the information. For example, if non-
insure that no violator is able to switch the information, so it repudiation service is enabled in the transaction and an
provide full precision. The essential part of cryptography is order is once placed electronically, a user cannot decline
to provide the four rudimentary data security services. the purchased order.
III. CRYPTOGRAPHY
The skill of secret writing is termed as cryptography. A
secret approach of writing is cipher code; where by clear
text gets converted into the ciphertext. This process of decrypting the ciphertext. This kind of encryption uses
conversion where the plaintext gets converted into dissimilar keys namely, private and public key to encrypt
ciphertext is called encryption. The technique of converting and decrypt the information. Asymmetric-key encryption is
ciphertext back to the plaintext is called decryption. These also known as public key encryption.
two techniques namely, encryption and decryption are
regulated by cryptographic keys.
A. CRYPTOSYSTEMS
IV. CRYPTOGRAPHIC TECHNIQUES
Cryptosystem is comprised of cryptographic algorithms,
plaintext, ciphertext, and keys. It performs with the combo of
A. DATA ENCRYPTION STANDARD (DES)
keys and algorithm to encipher the plaintext and to decipher
the ciphertext. A cryptosystem is one of the application of
The Data Encryption Standard is a block cipher. It helps in
cryptographic techniques and their lead support to cater
encrypting the data in a block which is of 64 bits and thus it
information security services [3]. Cipher system is the other
produces the 64-bit. The key length available is 56 bits. At
name of cryptosystem. The primary objective of
initial level, the key consists of 64 bits. DES is widely used
cryptosystem is that eventually at the end of the mechanism,
by the financial services and the other industries worldwide
the plaintext will only be understood by the sender and
to protect sensitive online applications [4].
receiver. Essentially, there are two categories of
cryptosystems which are based on the research in which
encryption-decryption is performed out in the system.
B. TRIPLE DES
memory than RSA. Elliptic curve cryptography is difficult to and motivation. I sincerely thank to all my teachers who
understand by the attacker and therefore not easy to break. have guided and provided expertise in this paper. I also wish
to express my gratitude to all people who rendered their help
B. Quantum Key Distribution (QKD) to fulfill my task.