Skip to main content

Encrypto–Decrypto

  • Conference paper
  • First Online:
ICT Infrastructure and Computing

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 520))

  • 482 Accesses

Abstract

In present scenario, cybercrimes are increasing in every area of technology. Especially, in text transfer, there is a high chance of a third party breach. Everyone needs to share information with each other through various platforms which is a daily part of life. These days it is a big concern that data might leak and can be misused by someone. To overcome these issues, a model has been created as an encryption and decryption platform to increase privacy in text transfer which leads to making the communication secure. A user-friendly, highly secure, and fast algorithm used in the platform.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Lakhtaria K (2001) Protecting computer network with encryption technique: a study. Int J u- and e-service, Sci Technol 4:43–52. https://springerlink.bibliotecabuap.elogim.com/chapter/https://doi.org/10.1007/978-3-642-20998-7_47

  2. Chan AA (2011) Security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans on Sensor Netw 7. http://dl.acm.org/citation.cfm?id=1921623

  3. Zaidan B, Zaidan A, Al-Frajat A, Jalab H (2010) On the differences between hiding information and cryptography techniques: an overview. J Appl Sci 10:1650–1655. http://www.oalib.com/paper/2734429

  4. Singh A, Gilhorta R (2011) Data security using private key encryption system based on arithmetic coding. Int J Netw Secur and its Appl (IJNSA) 3:58–67. https://pdfs.semanticscholar.org/96c0/be3d7374c426723cc62d-43b63ac6624db413.pdf

  5. Goldwasser S, Micali S, Rivest RL (1998) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17:281–308. http://epubs.siam.org/doi/abs/https://doi.org/10.1137/0217017?journalCode=smjcat

  6. Younes B, Ali M, Jantan A (2008) Image encryption using blockbased transformation algorithm. Int J Comput Sci (IJCS) 35:407–415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf

  7. Nithin N, Anupkumar MB, Hegde GP (2013) Image encryption based on FEAL algorithm. Int J Adv Comput Sci Technol 2:14–20. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.8504

  8. Mishra M, Mishra P, Adhikary MC, Kumar S (2012) Image encryption using Fibonacci-Lucas transformation. Int J Cryptography Inform Secur (IJCIS) 2:131–141. https://arxiv.org/abs/1210.5912

  9. Divya VV, Sudha SK, Resmy VR (2012) Simple and secure image encryption. Int J Comput Sci ssues (IJCSI) 9:286–289. https://www.academia.edu/7885840/Simple_and_Secure_Image_Encryption

  10. Huang L, Chi Lee C, Hwang M (2013) An2+n MQV key agreement protocol. Int Arab J Inform Technol 10:137–142. http://ccis2k.org/iajit/PDF/vol.10,no.2/2-3015.pdf

  11. Singh A, Gilhotra R (2011) Data security using private key encryption system based on arithmetic coding. Int J Netw Secur its Appl (IJNSA) 3:58–67. https://pdfs.semanticscholar.org/96c0/be3d7374c426723cc62d-43b63ac6624db413.pdf

  12. Torkaman MRN, Kazazi NS, Rouddini A (2012) Innovative approach to improve hybrid cryptography by using DNA steganography. Int J New Comput Architect Their Appl (IJNCAA) 2:224–235. https://pdfs.semanticscholar.org/d738/2a91716926cd978f2ca341cbad7964504177.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sajal Gupta .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Gupta, S., Jain, S., Singh, S., Ikram, T. (2023). Encrypto–Decrypto. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Infrastructure and Computing. Lecture Notes in Networks and Systems, vol 520. Springer, Singapore. https://doi.org/10.1007/978-981-19-5331-6_17

Download citation

Publish with us

Policies and ethics