Abstract
As there is enormous increase or rise in the data exchange by the electronic system, the requirements of information security have become a compulsion. The most important concern in the communication system which is between sender and receiver is the security of the information which is to be transmitted. To get rid of the intruders, various cryptographic algorithms are used for example, AES, DES, Triple DES, Blowfish, etc. In this paper, authors have attempted to transfer file securely using randomly generated keys with Blowfish symmetric algorithm for encryption process. A unique transaction id is also generated which is used to fetch the random key which will be used for decryption at the receiver end. A validation key is also proposed which is used to validate that file is decrypted by the intended user only. The combination of random key, validation key, and transaction id as proposed will provide more robustness to secure transfer of file using Blowfish symmetric key encryption.
Keywords
This is a preview of subscription content, log in via an institution.
References
Himani Agrawal and Monisha Sharma: Implementation and analysis various symmetric cryptosystems, Indian Journal of Science and Technology in Vol. 3 No. 12, ISSN:0974-6846. pp. 1173–1176, (Dec 2010).
Pratap Chandra Mandal: Evaluation of performance of the Symmetric Key Algorithms: DES, 3DES, AES and Blowfish, Journal of Global Research in Computer Science, Volume 3, No. 8, (2012).
Huy Hoang Ngo, Xianping Wu, Phu Dung Le, Campbell Wilson, and Balasubramaniam Srinivasan: Dynamic Key Cryptography and Applications, International Journal of Network Security, Vol. 10, No. 3, PP. 161–174, (May 2010).
Shantayoti Vashishtha on: Evaluating the performance of Symmetric key algorithms: AES(Advance Encryption Standard) and DES(Data Encryption Standard), IJCEM, International Journal of Computational Engineering and Management, Vol. 15 Issue 4, pp 43–49(2012).
Deepika, Manpreet: A Review on Various Key Management Techniques for Security Enhancement in WSN, International Journal of Engineering Trends and Technology (IJETT) – Volume 34 Number 4-(2016).
Zeenat Mahmood, J. L Rana, Prof. Ashish khare: Symmetric Key Cryptography using Dynamic Key and Linear Congruential Generator (LCG), International Journal of Computer Applications (0975–8887) Volume 50– No.19, (2012).
Ms NehaKhatri – Valmik and Prof. V. K Kshirsagar: Blowfish Algorithm, IOSR Journal of Computer Engineering (IOSR- JCE), e-ISSN: 2278-0661, p- ISSN: 2278-8727 Volume 16, Issue2, Ver. X, PP 80–83, (2014).
Maulik P. Chaudhari and Sanjay R. Patel: A Survey on Cryptography Algorithms, International Journal of Advance Research in Computer Science and Management Studies, Volume 2, issue 3, ISSN: 2321-7782, (March 2014).
Pratap Chand Mandal: Superiority of blowfish algorithm, International Journal of Advance Research in Computer Science and Software Engineering.
Blowfish-algorithm-history-and-background-computerscienceessay.phpSmith, T.F., Waterman, M.S.: Identification, https://www.ukessays.com/essays/computer-science.
Jayagopal Narayanaswamy, Raghav V. Sampangi and Srinivas Sampalli: HIDE: Hybrid Symmetric Key Algorithm for Integrity Check, Dynamic Key Generation and Encryption, ICISSP 2015-1st International Conference on Information System Security and Privacy (2015).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Iqbal, S., Yadav, R.L. (2018). A Secure File Transfer Using the Concept of Dynamic Random Key, Transaction Id and Validation Key with Symmetric Key Encryption Algorithm. In: Somani, A., Srivastava, S., Mundra, A., Rawat, S. (eds) Proceedings of First International Conference on Smart System, Innovations and Computing. Smart Innovation, Systems and Technologies, vol 79. Springer, Singapore. https://doi.org/10.1007/978-981-10-5828-8_26
Download citation
DOI: https://doi.org/10.1007/978-981-10-5828-8_26
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-5827-1
Online ISBN: 978-981-10-5828-8
eBook Packages: EngineeringEngineering (R0)