Abstract
In present scenario, cybercrimes are increasing in every area of technology. Especially, in text transfer, there is a high chance of a third party breach. Everyone needs to share information with each other through various platforms which is a daily part of life. These days it is a big concern that data might leak and can be misused by someone. To overcome these issues, a model has been created as an encryption and decryption platform to increase privacy in text transfer which leads to making the communication secure. A user-friendly, highly secure, and fast algorithm used in the platform.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Lakhtaria K (2001) Protecting computer network with encryption technique: a study. Int J u- and e-service, Sci Technol 4:43–52. https://springerlink.bibliotecabuap.elogim.com/chapter/https://doi.org/10.1007/978-3-642-20998-7_47
Chan AA (2011) Security framework for privacy-preserving data aggregation in wireless sensor networks. ACM Trans on Sensor Netw 7. http://dl.acm.org/citation.cfm?id=1921623
Zaidan B, Zaidan A, Al-Frajat A, Jalab H (2010) On the differences between hiding information and cryptography techniques: an overview. J Appl Sci 10:1650–1655. http://www.oalib.com/paper/2734429
Singh A, Gilhorta R (2011) Data security using private key encryption system based on arithmetic coding. Int J Netw Secur and its Appl (IJNSA) 3:58–67. https://pdfs.semanticscholar.org/96c0/be3d7374c426723cc62d-43b63ac6624db413.pdf
Goldwasser S, Micali S, Rivest RL (1998) A digital signature scheme secure against adaptive chosen-message attacks. SIAM J Comput 17:281–308. http://epubs.siam.org/doi/abs/https://doi.org/10.1137/0217017?journalCode=smjcat
Younes B, Ali M, Jantan A (2008) Image encryption using blockbased transformation algorithm. Int J Comput Sci (IJCS) 35:407–415. http://www.iaeng.org/IJCS/issues_v35/issue_1/IJCS_35_1_03.pdf
Nithin N, Anupkumar MB, Hegde GP (2013) Image encryption based on FEAL algorithm. Int J Adv Comput Sci Technol 2:14–20. http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.302.8504
Mishra M, Mishra P, Adhikary MC, Kumar S (2012) Image encryption using Fibonacci-Lucas transformation. Int J Cryptography Inform Secur (IJCIS) 2:131–141. https://arxiv.org/abs/1210.5912
Divya VV, Sudha SK, Resmy VR (2012) Simple and secure image encryption. Int J Comput Sci ssues (IJCSI) 9:286–289. https://www.academia.edu/7885840/Simple_and_Secure_Image_Encryption
Huang L, Chi Lee C, Hwang M (2013) An2+n MQV key agreement protocol. Int Arab J Inform Technol 10:137–142. http://ccis2k.org/iajit/PDF/vol.10,no.2/2-3015.pdf
Singh A, Gilhotra R (2011) Data security using private key encryption system based on arithmetic coding. Int J Netw Secur its Appl (IJNSA) 3:58–67. https://pdfs.semanticscholar.org/96c0/be3d7374c426723cc62d-43b63ac6624db413.pdf
Torkaman MRN, Kazazi NS, Rouddini A (2012) Innovative approach to improve hybrid cryptography by using DNA steganography. Int J New Comput Architect Their Appl (IJNCAA) 2:224–235. https://pdfs.semanticscholar.org/d738/2a91716926cd978f2ca341cbad7964504177.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Gupta, S., Jain, S., Singh, S., Ikram, T. (2023). Encrypto–Decrypto. In: Tuba, M., Akashe, S., Joshi, A. (eds) ICT Infrastructure and Computing. Lecture Notes in Networks and Systems, vol 520. Springer, Singapore. https://doi.org/10.1007/978-981-19-5331-6_17
Download citation
DOI: https://doi.org/10.1007/978-981-19-5331-6_17
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-5330-9
Online ISBN: 978-981-19-5331-6
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)