IRJET- Cryptography Encryption and Decryption File Protection based on Mobile Bluetooth Proximit

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 06 Issue: 04 | Apr 2019

p-ISSN: 2395-0072

www.irjet.net

Cryptography Encryption and Decryption File Protection Based On Mobile Bluetooth Proximity Muthuramalingam B1, N.S. Akshay Bharadwaj2 1Assistant

Professor, Department of Computer Application, Sir MVIT, Karnataka, Bangalore Department of Computer Application, Sir MVIT, Karnataka, Bangalore -----------------------------------------------------------------------***-------------------------------------------------------------------2Student,

Abstract - In recent times, high growth in the field of

networking technology leads to a practice of interchanging digital data frequently. The idea is to build a system, which uses an encryption algorithm to convert a file, which has meaningful information into data that cannot be read without decrypting. Therefore, if anyone tries to access a file present in the system, which is encrypted, the person gets junk data. The only way to access such file is by using a security key. The key which is used in our system is the bluetooth MAC address of a device that is registered with the system. The security key used for the system will be the file owner’s smartphone or any other device which has bluetooth in it .

2.2 Types of Cryptography 2.2.1 Secret Key Cryptography: In this, same key is used for both encryption and decryption, Example of such algorithms are DES, Triple DES, AES, RC5 etc.

Key Words: AES, Bluetooth MAC, Cryptography, Decryption, Encryption.

2.2.2

Cryptography provides various number of security goals to ensure data privacy. The idea of encryption and AES encryption algorithm by which one can encode the data in secret code and it is not readable by hackers or unauthorized person. The idea is to build a system, which uses an encryption algorithm to convert a file, which has meaningful information into data that cannot be read without decrypting it. The only way to access such file is by using a security key. The key that is used in the system is Bluetooth MAC address of a device that is registered with the system. Encryption Data security in wireless communication plays an important role because wireless communication is always used in online transmission. There are many cryptographic techniques available and among all AES is one of the most powerful technique.

2.3 Cryptography 2.3.1 Plain Text: Any communication that is used in the human language, takes the form of plain text. It is understood by the sender and the recipient and also by anyone who gets an access to that message.

2.3.2

Cipher Text:

Cipher means a code or a secret message. When a plain text is encoded using any suitable scheme, then the resulting message is called a cipher text.

2.3.3

Key:

An important aspect of performing encryption and decryption is the key. It is the key used for encryption and decryption that makes the process of cryptography secured.

2. LITERATURE REVIEW

2.1 Purpose of Cryptography

Public Key Cryptography:

In this two different keys are used, one key for encryption and another key for decryption, Example of such algorithms are RSA, Elliptic Curve and etc.

1. INTRODUCTION

Availability: The principle of availability states that resources should be available only to authorized users. Access Control: Access Control specifies who can access the information.

Authentication: Authentication mechanism helps to establish proof of identities. This process ensures that the login credentials are correctly identified. Confidentiality: The principle of confidentiality specifies that only the sender and the respective recipient should be able to process the contents of a message.

© 2019, IRJET

|

Impact Factor value: 7.211

|

ISO 9001:2008 Certified Journal

|

Page 4234


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.