IRJET- Framework on Secure File Repository in Cloud using Hybrid Cryptography Techniques

Page 1

International Research Journal of Engineering and Technology (IRJET)

e-ISSN: 2395-0056

Volume: 08 Issue: 07 | July 2021

p-ISSN: 2395-0072

www.irjet.net

Framework on Secure File Repository in Cloud using Hybrid Cryptography Techniques Akash Phad1, Abhijit Shinde2, Akshay Lukaday3, Suraj Chandugade4, Nikhilkumar Shardoor5 1,2,3,4,5Department

of Computer Science Engineering, MIT School of Engineering, MIT-ADT University, Pune, Maharashtra, INDIA ----------------------------------------------------------------------------------***-----------------------------------------------------------------------------Abstract - In recent years network security has become 2. LITERATURE SURVEY an important issue. Encryption has come up as a solution and plays an important role in the information security AES and RSA were used to create hybrid cryptography in system. Many techniques are needed to protect the shared [1]. The symmetric key used for message encryption is also data. The present work focuses on cryptography to secure encrypted in this hybrid cryptography, which improves the data while transmitting in the network. Firstly the data security. This document also includes the ability to which is to be transmitted from sender to receiver in the construct a digital signature by encrypting the message's network must be encrypted using the encryption algorithm hash value. This digital signature is used to confirm the in cryptography, user selects via which technique he wants integrity of the message at the other end. The encrypted to encrypt/decrypt data. Secondly, by using the decryption message, encrypted symmetric key, and encrypted digest technique (as per the user’s choice), the receiver can view are then concatenated to generate the final message. The the original data. Key is sent via Email using LSB steganography method was used to encrypt this entire steganography. message once more. In this case, hybrid cryptography and steganography improves and strengthens security. This Key words - AES, cryptography, steganography, RSA, DES, algorithm has a unique feature called message integrity checking. The practicality of this approach has been decryption demonstrated by successful simulations. Shows [2] implemented a new hybrid cryptosystem. The 1. INTRODUCTION primary goals of this study are to stress improved performance, maximum speed of an algorithm, The data encryption is the process by which a plaintext effectiveness testing, and comparisons with other is converted into an encrypted form (unreadable) and it algorithms. Two new hybrid algorithms are proposed in can only be accessed by authorized person/parties. Data the paper, which combine symmetric and asymmetric security is a key component of an individual/organisation; cryptographic methods like Twofish, AES, RSA, and it can be done using several techniques. The encrypted ElGamal. JAVA programme implementation was utilised to data will be protected for a while but will never be safe. examine results. The results demonstrate that the After the time has elapsed, the hacker will hack the data. suggested hybrid algorithm AES+RSA is extremely secure. Fake files are sent in the same way that the encrypted data Other advantages of the Twofish + RSA hybrid include may be sent. Security of the network prohibits unwanted improved computation speed, cypher text size, and access to data within a network. It involves the memory usage. authorisation of access to information across a network. It [3] suggested a fledgling picture mapping approach and it is measured by network administrators. The for encoding the message into relative concentration by requirement for security is to safeguard information, to scrambling plain content information into HEXADECIMAL. ensure that resources are accessed and authenticated and The different Hex properties are put together to make a that resources are available. framework. PRNG (Pseudo Random Number Generator) In recent years, network security has become a major circuits are the foundation of cryptographic structures.This concern. Encryption has been developed as a solution and [4] compares the security and PSNR (peak signal-to-noise is an essential part of the security system of information. ratio) of conventional RDH (Reversible Data Hiding) and To safeguard the shared data many strategies are required. LSB (with encryption) algorithms with enhanced RDH This paper concentrates on cryptography to safeguard the algorithm. data during network transmission. First, data that are to be It [5] presented a three-layered architecture for transferred from a sender to a recipient on the network protecting message sharing mechanisms, with the QR code has to be encrypted by means of cryptographic encryption picture as one of the layers. This design makes use of algorithms, whereby user picks the method of encrypting / cryptography and steganography techniques in a decrypting data. Second, the receiver can access the purposeful and empirical way. On the basis of quantitative original data with the decryption method (as selected by and qualitative data, the suggested system provides a the user). Key is sent via Email using steganography. higher level of security.Furthermore, the system was

© 2021, IRJET

|

Impact Factor value: 7.529

|

ISO 9001:2008 Certified Journal

|

Page 593


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.