Skip to main content

Development of More Secure and Time Efficient Encryption Method

  • Conference paper
  • First Online:
  • 624 Accesses

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 870))

Abstract

Data in the network is not secure and can be accessed by unauthenticated and unauthorized users. So to make data secure in the network, various encryption algorithms are used. Security along with confidentiality of the data is to be maintained in the network. Encryption is the technique by which data is encoded and sent to the receiver, where it gets decoded back to the plaintext. Encryption algorithm or technique should take minimum time and space for the execution. There are various encryption algorithms which are frequently used and some of them are high in measure of time and space complexity. This paper presents a more Secure and Time Efficient Encryption Method (STEEM) which is concentrating on high security of the encrypted text along with the time efficiency. This paper shows the working flows of the proposed work which would be solely responsible for achieving more efficiency on prime parameters.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. A. Odeh, R.S. Masadeh, A. Azzazi, A performance evaluation of common encryption techniques with secure watermark system (Sws). Int. J. Netw. Secur. Appl. (IJNSA) 7(3), 31–38 (2015)

    Google Scholar 

  2. C. Li, Importance of digital encryption technology in internet security. Guide Bus. 296 (2011)

    Google Scholar 

  3. R. Dubey, A. Saxena, S. Gond, An innovative data security techniques using cryptography and steganographic techniques. Int. J. Comput. Sci. Inf. Technol. 6(3), 2175–2182 (2015)

    Google Scholar 

  4. O.M.A. Al-Hazaimeh, A new approach for complex encrypting and decrypting data. Int. J. Comput. Netw. Commun. (IJCNC) 5(2), 95−103 (2013)

    Google Scholar 

  5. Y.N. Goshwe, Data encryption and decryption using RSA algorithm in a network environment. IJCSNS Int. J. Comput. Sci. Netw. Secur. 13(7), 9–13 (2013)

    Google Scholar 

  6. W. Mao, Modern Cyptography Theory Practice (Prentice Hall PTR, New Jersey, 2003)

    Google Scholar 

  7. S. William, Cryptography and Network Security: Principles and Practice, Pearson Education, Inc., 5th edn (Publishing as Prentice Hall, New Jersey, 2003)

    Google Scholar 

  8. G.L. Prakash, M. Prateek, I. Singh, Data encryption and decryption algorithms using key rotations for data security in cloud system. Int. J. Eng. Comput. Sci. 3(4), 5215–5223 (2014), ISSN 2319-7242

    Google Scholar 

  9. J. Das, A study on modern cryptography and their security issues. Int. J. Emerg. Technol. Adv. Eng. 4(10), 320–324 (2014) (ISSN 2250-2459, ISO 9001:2008 Certified Journal)

    Google Scholar 

  10. M. Koul, Authentication against man-in-the middle attack and honey encryption. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 6(8), 388–390 (2016)

    Google Scholar 

  11. M. Lin, An overview of session hijacking at the network and application levels, SANS Institute InfoSec Reading Room (2005)

    Google Scholar 

  12. H.C. Chou, H.C. Lee, C.W. Hsueh, F.P. Lai, Password cracking based on special keyboard patterns. Int. J. Innov. Comput. Inf. Control 8(1(A)), 387–402 (2012)

    Google Scholar 

  13. M.A. Mobarhan, M.A. Mobarhan, A. Shahbahrami, Evaluation of security attacks on Umts authentication mechanism. Int. J. Netw. Secur. Appl. (IJNSA) 4, 37–42 (2012)

    Google Scholar 

  14. J.S. Vitter, Arithmetic coding for data compression, researchgate.net (1994)

    Google Scholar 

  15. P. Saurabh, B. Verma, An efficient proactive artificial immune system based anomaly detection and prevention system. Expert Syst. Appl. 60, 311–320 (2016)

    Article  Google Scholar 

  16. P. Saurabh, B. Verma, Cooperative negative selection algorithm. Int. J. Comput. Appl. 95(17), 27–32 (2014) (0975–8887)

    Google Scholar 

  17. P. Saurabh, B. Verma, S. Sharma, An immunity inspired anomaly detection system: a general framewor, in 7th BioInspired Computing: Theories & Applications, Springer (2012), pp. 417–428

    Google Scholar 

  18. P. Saurabh, B. Verma, S. Sharma, Biologically Inspired Computer Security System: The Way Ahead, vol. 335 (CICS Springer, 2011), pp. 474–484

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Vinod Raghuvanshi or Pradeep Mewada .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Raghuvanshi, V., Mewada, P., Saurabh, P. (2019). Development of More Secure and Time Efficient Encryption Method. In: Kamal, R., Henshaw, M., Nair, P. (eds) International Conference on Advanced Computing Networking and Informatics. Advances in Intelligent Systems and Computing, vol 870. Springer, Singapore. https://doi.org/10.1007/978-981-13-2673-8_32

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-2673-8_32

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-2672-1

  • Online ISBN: 978-981-13-2673-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics