Design and Implementation of Encryption Tool using Advanced Encryption Standard (AES)

Sanket Anil Dambhare, Rutvik Rajesh Walde, Sahil Ramrao Bhogekar, Sai Ranajit, Ritik Shriniwas Kotgiriwar, Sakshi Sudhakar Langde
{"title":"Design and Implementation of Encryption Tool using Advanced Encryption Standard (AES)","authors":"Sanket Anil Dambhare, Rutvik Rajesh Walde, Sahil Ramrao Bhogekar, Sai Ranajit, Ritik Shriniwas Kotgiriwar, Sakshi Sudhakar Langde","doi":"10.1109/ICEARS53579.2022.9751822","DOIUrl":null,"url":null,"abstract":"The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9751822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.
基于高级加密标准(AES)的加密工具的设计与实现
互联网的发展导致了当今以数据为中心的世界的发展,信息可以通过点击一个按钮从世界的一个地方交换到另一个地方。最常用的通讯设备是手机,具有便携式电脑的功能。大量的聊天应用程序已经被开发出来,帮助人们交流。在这些聊天应用程序中输入的信息必须经过公共基础设施才能到达目的地,这是数据传输中最脆弱的阶段。恶意黑客可以访问消息或更改消息,从而危及数据安全性。为了保持数据的完整性和机密性,使用数据加密。使用数据加密将我们的消息转换为加密形式,以便只有拥有密钥的人才能读取它们。如今,许多系统都声称能保证信息的安全和秘密,最近有关政府对个人谈话进行普遍监控的指控也支持了这一点。这涵盖了大量的新项目以及许多知名的安全性增强工具。我们调查和整理了当前的安全消息解决方案,并为其安全性、可用性和易用性提供了一个测试框架。我们概述了每个设计领域的三个重要挑战:信任建立、对话安全性和传输隐私。提供安全保护和隐私功能的可信方法在使用和检测方面效果不佳,而在学术教科书中没有得到适当处理的其他混合方法可能会提供更好的交易性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信