Abstract
In today’s communication era, sharing of data is increasing significantly. The data being transmitted is vulnerable to several approaches. Consequently, the information security is one of the most challenging facts of communication. This research will represent a view on the modern state in the field of encryption, in particular on private key block ciphers which are widely applied for bulk data and connection encryption. Encryption is the contrivance of converting plain text into the cipher text in which plain text is taken the input for the encryption process, and cipher text is considered as the output. Decryption is the mechanism of changing cipher text into the plaintext. This technique runs on any web server or application server. The core thought is to encrypt secret information before transmitting it to interested websites. A J2EE information model is employed to test the integrity of the mechanism.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Saxena A, Jakhmola R (2011) Securing confidential data using Java/J2EE. Int J Sci Technol Manag 2(3):54–59
DSarkar D, Jaiswal A, Saxena A (2015) Understanding architecture and framework of J2EE using web application. Int J Comput Sci Inf Technol 6(2):1253–1257
Thambiraja E, Ramesh G, Umarani R (2012) A survey on various most common encryption techniques. Int J Adv Res Comput Sci Softw Eng 2(7):226–233
Saxena A, Chaurasia (2014) Key and value paired data using java hash table. Int J Eng Manag Res 4(1):81–89
Mahajan P Dr, Sachdeva A (2013) A study of encryption algorithms AES, DES and RSA for security. Glob J Comput Sci Technol Netw Web Secur 13(15):15–22 Version 1.0
Prashant G, Deepthi S, SandhyaRani K (2013) A novel approach for data encryption standard algorithm. Int J Eng Adv Technol (IJEAT) 2(5):264
Agarwal V, Agarwal S, Deshmukh R (2014) Analysis and review of encryption and decryption for secure communication. Int J Sci Eng Res (IJSER) 2(2):1–3
FIPS PUb 197-the official AES standard. http://www.techheap.com/cryptography/encryption/fips-197.pdf
Chen† Q, Tang Z, Li Y, Niu Y, Mo J (2011) Research on encryption algorithm of data security for wireless sensor network. J Comput Inf Syst 7(2):369–376
Bhati S, Bhati A, Sharma SK (2012) A new approach towards encryption schemes: byte—rotation encryption algorithm. In: Proceedings of the world congress on engineering and computer science 2012, vol II WCECS 2012, October 24–26
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Saxena, A., Kaushik, N., Kaushik, N. (2018). Encryption and Decryption Technique Using Java. In: Bokhari, M., Agrawal, N., Saini, D. (eds) Cyber Security. Advances in Intelligent Systems and Computing, vol 729. Springer, Singapore. https://doi.org/10.1007/978-981-10-8536-9_40
Download citation
DOI: https://doi.org/10.1007/978-981-10-8536-9_40
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-10-8535-2
Online ISBN: 978-981-10-8536-9
eBook Packages: EngineeringEngineering (R0)