Skip to main content

Encryption and Decryption Technique Using Java

  • Conference paper
  • First Online:
Cyber Security

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 729))

  • 1535 Accesses

Abstract

In today’s communication era, sharing of data is increasing significantly. The data being transmitted is vulnerable to several approaches. Consequently, the information security is one of the most challenging facts of communication. This research will represent a view on the modern state in the field of encryption, in particular on private key block ciphers which are widely applied for bulk data and connection encryption. Encryption is the contrivance of converting plain text into the cipher text in which plain text is taken the input for the encryption process, and cipher text is considered as the output. Decryption is the mechanism of changing cipher text into the plaintext. This technique runs on any web server or application server. The core thought is to encrypt secret information before transmitting it to interested websites. A J2EE information model is employed to test the integrity of the mechanism.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Saxena A, Jakhmola R (2011) Securing confidential data using Java/J2EE. Int J Sci Technol Manag 2(3):54–59

    Google Scholar 

  2. DSarkar D, Jaiswal A, Saxena A (2015) Understanding architecture and framework of J2EE using web application. Int J Comput Sci Inf Technol 6(2):1253–1257

    Google Scholar 

  3. Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2(7):226–233

    Google Scholar 

  4. Saxena A, Chaurasia (2014) Key and value paired data using java hash table. Int J Eng Manag Res 4(1):81–89

    Google Scholar 

  5. Mahajan P Dr, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol Netw Web Secur 13(15):15–22 Version 1.0

    Google Scholar 

  6. Prashant G, Deepthi S, SandhyaRani K (2013) A novel approach for data encryption standard algorithm. Int J Eng Adv Technol (IJEAT) 2(5):264

    Google Scholar 

  7. Agarwal V, Agarwal S, Deshmukh R (2014) Analysis and review of encryption and decryption for secure communication. Int J Sci Eng Res (IJSER) 2(2):1–3

    Google Scholar 

  8. FIPS PUb 197-the official AES standard. http://www.techheap.com/cryptography/encryption/fips-197.pdf

  9. Chen† Q, Tang Z, Li Y, Niu Y, Mo J (2011) Research on encryption algorithm of data security for wireless sensor network. J Comput Inf Syst 7(2):369–376

    Google Scholar 

  10. Bhati S, Bhati A, Sharma SK (2012) A new approach towards encryption schemes: byte—rotation encryption algorithm. In: Proceedings of the world congress on engineering and computer science 2012, vol II WCECS 2012, October 24–26

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ankur Saxena .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Saxena, A., Kaushik, N., Kaushik, N. (2018). Encryption and Decryption Technique Using Java. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_40

Download citation

  • DOI: https://doi.org/10.1007/978-981-10-8536-9_40

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-10-8535-2

  • Online ISBN: 978-981-10-8536-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics