Abstract
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect the data. With the help of cryptography, data are converted into a format that is difficult for an attacker to understand, and these data can be broadcasted in a reliable format. If the attacker obtains access to the cryptographic algorithm, then the attacker can easily decrypt the data, but if the data are encrypted with the help of the key, it is difficult for the attacker to decrypt the data without the key. When the data are encrypted with the same key at different times, there is a possibility to obtain the actual key with the help of the Kasiski test. Different researchers have encrypted the data with the help of the same key or have developed an algorithm by combining different algorithms, which is a problem. This paper developed an efficient algorithm that cannot be broken easily. Even if an attacker obtains access to the algorithm, the attacker cannot identify the keys derived from that text, and the key only works in the text from which it is generated, which is the novelty of this paper. Data are secured in two different layers. In Layer-1, the proposed algorithm implements plaintext and a static key to obtain the encrypted text and a Vigenère key. In Layer-2, the encrypted text and the Vigenère key are implemented on the Vigenère cipher algorithm to obtain the ciphertext. At the end of the paper, a comparison of different papers is made with the proposed paper, and a conclusion is made based on different techniques and results.
Subject
Fluid Flow and Transfer Processes,Computer Science Applications,Process Chemistry and Technology,General Engineering,Instrumentation,General Materials Science
Reference27 articles.
1. A hybrid cryptosystem based on modified vigenere cipher and polybius cipher;Akanksha;EPRA Int. J. Res. Dev.,2022
2. Improved Impossible Differential Cryptanalysis of Rijndael and Crypton;Cheon;Proceedings of the Information Security and Cryptology—ICISC 2001: 4th International Conference,2001
3. An Overview of Cryptanalysis on AES;Amrita;Int. J. Adv. Res. Sci. Eng.,2018
4. Intercept the Cloud Network From Brute Force and DDoS Attacks via Intrusion Detection and Prevention System
5. AES: The Advanced Encryption Standard;Kak,2021
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Double Layer Encryption for Communication using Cryptographic Algorithms;2024 Second International Conference on Emerging Trends in Information Technology and Engineering (ICETITE);2024-02-22
2. Development of Security Rules and Mechanisms to Protect Data from Assaults;Applied Sciences;2022-12-08