Implementation of Confidential Communication through Encryption Algorithms in Smart City

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-35 Number-4
Year of Publication : 2016
Authors : Preeti Agarwal

MLA

Preeti Agarwal "Implementation of Confidential Communication through Encryption Algorithms in Smart City". International Journal of Computer Trends and Technology (IJCTT) V35(4):184-188, May 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Security is the most important issue on the internet and day to day applications because they are growing fast. So the significance and the value of the exchanged information over the internet or other media types are increasing. Data Security is an important concern in smart city. When a person communicates with other person then data transfer should be secured. It can be achieved through encryption algorithms which are used to prevent unauthorized access of data. So, now we have to use some methods to ensure that information is hidden from anyone who it is not intended to see the data. The better solution to deal with this problems against the data attackers is cryptography. Cryptography is the study of hiding knowledge about thedata. Cryptography is the one of the main type of computer security that translates information from its normal form into an expressionless form by using Encryption and Decryption Techniques. It ensures that message should be sent without any modification to the receiver. So, in this paper I have implemented various algorithms of cryptography to ensure the secret communication in smart city. Thispaper deals with various parameters such as variable key length, memory utilization, execution time in order to compare various algorithms of Cryptography.

References
[1].Vishwa Gupta, Gajendra Singh, Ravindra Gupta “Advance cryptography algorithm for improving data security” published in 2012 International Journal of Advanced Research in Computer Science and Software Engineering Volume 2 Issue 1
[2].Rejan.R, Deepu.V.Krishnan “Study of Symmetric Key Cryptography Algorithms” published in 2015 International Journal of Computer TechniquesVolume 2 Issue 2
[3]. PraveenShende “Symmetric Key Cryptography Current Trends” published in 2014 International Journal of Computer Science and Mobile Computing Volume 3 Issue 12
[4].Stalling Williams “Cryptography and Network Security: Principles and Practices” 4th Edition, Pearson Education 2006.
[5]. Ankit Gambhir “DES Algorithm” published in 2014 Journal of Engineering Computers & Applied Sciences Volume 3 Issue 4
[6].“DES”, https://en.wikipedia.org/wiki/Data_Encryption Standard
[7].“Blowfish”,https://en.wikipedia.org/wiki/ Blowfish (cipher)
[8]. www.google.com
[9]. www.yahoo.com
[10].Ayushi “A Symmetric key cryptographic algorithm” published in 2015 International Journal of Computer Applications Volume 1
[11].“TDES”,https://en.wikipedia.org/wiki/Triple_DES.

Keywords
Encryption, Cryptography, Symmetric key, Asymmetric key, DES algorithm, TDES algorithm, AES algorithm, Blowfish algorithm.