{"title":"Design and Implementation of Encryption Tool using Advanced Encryption Standard (AES)","authors":"Sanket Anil Dambhare, Rutvik Rajesh Walde, Sahil Ramrao Bhogekar, Sai Ranajit, Ritik Shriniwas Kotgiriwar, Sakshi Sudhakar Langde","doi":"10.1109/ICEARS53579.2022.9751822","DOIUrl":null,"url":null,"abstract":"The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9751822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.