Please use this identifier to cite or link to this item:
Title: Development of Randomized Hybrid Cryptosystem
Researcher: A. C. Nuthan
Guide(s): Gornale S. Shivanand
Keywords: Engineering and Technology,Computer Science,Computer Science Software Engineering
University: Jain University
Completed Date: 09/11/2018
Abstract: newlineCryptography is the art and science of protecting information from undesirable newlineindividuals by converting it into a form non-recognizable by its attackers while stored and newlinetransmitted. Data cryptography mainly is the scrambling of the content of data, such as newlinetext, image, audio, video and so forth to make the data unreadable, invisible or newlineunintelligible during transmission or storage called Encryption. The main goal of newlinecryptography is keeping data secure from unauthorized attackers. The reverse of data newlineencryption is data Decryption. Before the modern era, cryptography was concerned solely newlinewith message confidentiality (i.e., encryption) conversion of messages from a newlinecomprehensible form into an incomprehensible one and back again at the other end, newlinerendering it unreadable by interceptors without secret knowledge (namely the key needed newlinefor decryption of that message). In recent decades, the field has expanded beyond newlineconfidentiality concerns to include techniques for message integrity checking, sender or newlinereceiver identity authentication, digital signatures, interactive proofs and secure newlinecomputation, among others. newlineThe modern study of symmetric-key ciphers relates mainly to the study of block newlineciphers and stream ciphers and to their applications. A block ciphers take as input a block newlineof plaintext and a key, and output a block of cipher text of the same size. The crypto newlinesystems which are in use are static i.e. only one of the standard algorithms is used at a newlinetime. If same encryption methods are used throughout the day and for days together newlinecontinuously, the crypto analyzers may crack the code or find out the encryption method newlineand may intrude or spy or hack the confidential data. This necessitates a robust encryption newlinetechnique. This work highlights one of the novel approaches of an implementation of a newlinehighly secured cryptic algorithm which makes impossible for data theft. Many researchers newlinehave been made with the multiple algorithms. This work presents a highly secured newlinerandomized encryption/decryption technique. Implementation presented in this work newlinechooses a randomly switching model which combines the two or more crypto algorithms newlineto work together as a single unit and there is switching among the algorithms at random newlinetimes. This model being implemented on FPGA provides excellent area results and a newlinehigher level of security is achieved. In the later stage, this prototype can also be imported newlineto ASIC.
Pagination: 150 p.
Appears in Departments:Dept. of Electronics Engineering

Files in This Item:
File Description SizeFormat 
certificate.pdfAttached File140.34 kBAdobe PDFView/Open
chapter 10.pdf1.1 MBAdobe PDFView/Open
chapter 11.pdf811.99 kBAdobe PDFView/Open
chapter 12.pdf2.42 MBAdobe PDFView/Open
chapter 1.pdf693.61 kBAdobe PDFView/Open
chapter 2.pdf370.53 kBAdobe PDFView/Open
chapter 3.pdf687.96 kBAdobe PDFView/Open
chapter 4.pdf1.1 MBAdobe PDFView/Open
chapter 5.pdf927.61 kBAdobe PDFView/Open
chapter 6.pdf662.94 kBAdobe PDFView/Open
chapter 7.pdf724.61 kBAdobe PDFView/Open
chapter 8.pdf1.17 MBAdobe PDFView/Open
chapter 9.pdf728.97 kBAdobe PDFView/Open
cover.pdf25.19 kBAdobe PDFView/Open
table.pdf296.96 kBAdobe PDFView/Open

Items in Shodhganga are protected by copyright, with all rights reserved, unless otherwise indicated.