N-tier Encryption/Decryption for Data Security

Authors

  • Prity Kumari Computer Engineering, Siddhant College of Engineering, Pune
  • Upendra Kumar Birla Institute of Technology, Patna Campus, Patna, India
  • Shyam Krishna Singh A. N. College, Patna, India

Keywords:

Enhanced AES ; N th prime RSA-CRT; LSB Stegnography; ECC ; SHA-1; ECDSA; ECMQV

Abstract

Today data and information security is most challenging work in computer network system. In this paper we
integrate two asymmetric algorithm such as N
th prime RSA-CRT with LSB Stegnography and ECC ,one symmetric
algorithm AES, SHA-1 message digest function, and ECMQV for encrypt/decrypt data to extend the level of security. We
uses Elliptic Curve Cryptography (ECC) for key generation, AES and Nth prime RSA-CRT with LSB Stegnography
algorithm for encryption, ECDSA for authentication, SHA-1 for integrity, and ECMQV for key exchange. It provide high
amount of confidentiality, data integrity and privacy. RSA algorithm is enhanced by combination of CRT with LSB
Stegnography algorithm. Stegnography is the science that hiding the information in images involves communicating
secret data in an appropriate multimedia carrier, e.g., image, audio, and video files. Due to this proposed system is much
more efficient than existing system. This new security protocol has been designed for better security with integrity using
a combination of both symmetric and asymmetric cryptographic techniques.

Published

2017-10-25

How to Cite

Prity Kumari, Upendra Kumar, & Shyam Krishna Singh. (2017). N-tier Encryption/Decryption for Data Security. International Journal of Advance Engineering and Research Development (IJAERD), 4(10), 427–439. Retrieved from https://ijaerd.org/index.php/IJAERD/article/view/3864