Enhancing File Security by Rijndael Algorithm Using Combination of Other New Generation Security Algorithms
| ||International Journal of Computer Trends and Technology (IJCTT)|| |
|© - November Issue 2013 by IJCTT Journal|
|Volume-5 Issue-3 |
|Year of Publication : 2013|
|Authors :Anshu Dixit , Ashish Kumar Jain|
Anshu Dixit , Ashish Kumar Jain"Enhancing File Security by Rijndael Algorithm Using Combination of Other New Generation Security Algorithms"International Journal of Computer Trends and Technology (IJCTT),V5(3):149-153 November Issue 2013 .ISSN 2231-2803.www.ijcttjournal.org. Published by Seventh Sense Research Group.
Abstract:- The one of the famous algorithm is Advanced Encryption Standard (AES) that is used Rijndael Algorithm. The cipher standard algorithms selected, by a Rijndael algorithm because of its high performance of security. In this paper used for file security three different kinds of algorithms i.e. RIJNDAEL, Initialization vector (IV), SHA512 Hashing algorithm these three popular algorithms are used for file encryption and decryption approach. The first is the Rijndael algorithm used for file encryption/decryption it is using a key and Initialization vector (IV), the second Initialization vector algorithm is for encrypting the first portion of data to be encrypted and the third one is SHA512 Hashing algorithm takes a string and transforms it into a fixed size the same or 512 bits of data string. The encryption and decryption operation used to increase the strength of security and high performance provides for file security
 Zhiqiang Xie1,2, Pengfei Gao1, Yujing He1, and Jing Yang2, “Study on Improved Rijndael Encryption Algorithm Based on Prefix Code,” Journal of Springer, Springer-Verlag Berlin Heidelberg 2012.
 Ibtihal Mohamed Abdullateef Fadul1 and Tariq Mohamed Hassan Ahmed2, “Enhanced Security of Rijndael Algorithm using Two Secret Keys” International Journal of Security and Its Applications, Vol. 7, No. 4, July, 2013.
 Erfaneh Noroozi, Salwani Mohd Daud, Ali Sabouhi,”Secure Digital Signature Schemes Based on Hash Functions,” International Journal of Innovative Technology and Exploring Engineering, 2(4). Pp 321-325 ISSN 2278-3075, 2013.
 Srinivisan Nagaraj, Kishore Bhamidipati, G Apparao, “An Approach to Security Using Rijndael Algorithm”, International Journal of Computer Applications, Volume 8– No.5, pp: 365-403, 2010.
 Andre Postma, Willem de Boer, Arne Helme, Gerard Smit,“Distributed Encryption and Decryption Algorithms”, University of Twente, Department of Computer Science - Netherland, pp : 417- 423 2000.
 Ozlem Sonmez, “Symmetric Key Management, Key Derivation and Key Wrap”, Bochum, Germany, in Ruhr-University at Bochum 2009.
 Jaspreet kaur, Er. Kanwal preet Singh,”Comparative Study of Speech Encryption Algorithms Using Mobile Applications”, International Journal of Computer Trenda and Technology ,pp:2346-2350 2013
 G. Sivagama Sundari , C. Srimathi, P.Sakthivel,”A New Approach towards identification of spam, spoofing using Domain Keys” , The Journal of Engineering, Science and Technology Management, pp:61- 64 (JEST-M, ISSN 2277-5161 Vol. 2, Issue 1, 2013
Keywords :— RIJNDAEL, Initialization vector (IV), SHA512 Hashing Algorithm, Enhance, Encryption, Decryption, Security.