Ankit Vishnoi, Alok Agarwal, A. Prasad, M. Prateek
{"title":"Use of Homomorphic Transform in Encryption","authors":"Ankit Vishnoi, Alok Agarwal, A. Prasad, M. Prateek","doi":"10.1109/CSITSS54238.2021.9683207","DOIUrl":null,"url":null,"abstract":"Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break.","PeriodicalId":252628,"journal":{"name":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 IEEE International Conference on Computation System and Information Technology for Sustainable Solutions (CSITSS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSITSS54238.2021.9683207","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 3
Abstract
Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break.