Abstract
Data in the network is not secure and can be accessed by unauthenticated and unauthorized users. So to make data secure in the network, various encryption algorithms are used. Security along with confidentiality of the data is to be maintained in the network. Encryption is the technique by which data is encoded and sent to the receiver, where it gets decoded back to the plaintext. Encryption algorithm or technique should take minimum time and space for the execution. There are various encryption algorithms which are frequently used and some of them are high in measure of time and space complexity. This paper presents a more Secure and Time Efficient Encryption Method (STEEM) which is concentrating on high security of the encrypted text along with the time efficiency. This paper shows the working flows of the proposed work which would be solely responsible for achieving more efficiency on prime parameters.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
A. Odeh, R.S. Masadeh, A. Azzazi, A performance evaluation of common encryption techniques with secure watermark system (Sws). Int. J. Netw. Secur. Appl. (IJNSA) 7(3), 31–38 (2015)
C. Li, Importance of digital encryption technology in internet security. Guide Bus. 296 (2011)
R. Dubey, A. Saxena, S. Gond, An innovative data security techniques using cryptography and steganographic techniques. Int. J. Comput. Sci. Inf. Technol. 6(3), 2175–2182 (2015)
O.M.A. Al-Hazaimeh, A new approach for complex encrypting and decrypting data. Int. J. Comput. Netw. Commun. (IJCNC) 5(2), 95−103 (2013)
Y.N. Goshwe, Data encryption and decryption using RSA algorithm in a network environment. IJCSNS Int. J. Comput. Sci. Netw. Secur. 13(7), 9–13 (2013)
W. Mao, Modern Cyptography Theory Practice (Prentice Hall PTR, New Jersey, 2003)
S. William, Cryptography and Network Security: Principles and Practice, Pearson Education, Inc., 5th edn (Publishing as Prentice Hall, New Jersey, 2003)
G.L. Prakash, M. Prateek, I. Singh, Data encryption and decryption algorithms using key rotations for data security in cloud system. Int. J. Eng. Comput. Sci. 3(4), 5215–5223 (2014), ISSN 2319-7242
J. Das, A study on modern cryptography and their security issues. Int. J. Emerg. Technol. Adv. Eng. 4(10), 320–324 (2014) (ISSN 2250-2459, ISO 9001:2008 Certified Journal)
M. Koul, Authentication against man-in-the middle attack and honey encryption. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(8), 388–390 (2016)
M. Lin, An overview of session hijacking at the network and application levels, SANS Institute InfoSec Reading Room (2005)
H.C. Chou, H.C. Lee, C.W. Hsueh, F.P. Lai, Password cracking based on special keyboard patterns. Int. J. Innov. Comput. Inf. Control 8(1(A)), 387–402 (2012)
M.A. Mobarhan, M.A. Mobarhan, A. Shahbahrami, Evaluation of security attacks on Umts authentication mechanism. Int. J. Netw. Secur. Appl. (IJNSA) 4, 37–42 (2012)
J.S. Vitter, Arithmetic coding for data compression, researchgate.net (1994)
P. Saurabh, B. Verma, An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016)
P. Saurabh, B. Verma, Cooperative negative selection algorithm. Int. J. Comput. Appl. 95(17), 27–32 (2014) (0975–8887)
P. Saurabh, B. Verma, S. Sharma, An immunity inspired anomaly detection system: a general framewor, in 7th BioInspired Computing: Theories & Applications, Springer (2012), pp. 417–428
P. Saurabh, B. Verma, S. Sharma, Biologically Inspired Computer Security System: The Way Ahead, vol. 335 (CICS Springer, 2011), pp. 474–484
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Raghuvanshi, V., Mewada, P., Saurabh, P. (2019). Development of More Secure and Time Efficient Encryption Method. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_32
Download citation
DOI: https://doi.org/10.1007/978-981-13-2673-8_32
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2672-1
Online ISBN: 978-981-13-2673-8
eBook Packages: EngineeringEngineering (R0)