{"title":"An Encryption Method Involving Homomorphic Transform","authors":"Ankit Vishnoi, A. Aggarwal, A. Prasad, M. Prateek","doi":"10.1109/CENTCON52345.2021.9688040","DOIUrl":null,"url":null,"abstract":"Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break","PeriodicalId":103865,"journal":{"name":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Disruptive Technologies for Multi-Disciplinary Research and Applications (CENTCON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CENTCON52345.2021.9688040","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
Data security is an important aspect for datasets of every size and type. Data security refers to provide a secure environment to datasets, web-based datasets, and preventing unauthorized access to the data. The key data security technique is encryption, where the digital data is encrypted. As result, the unauthorized person or hacker gets unreadable data. The computing process generates data that is encrypted by the key and can be decrypted with the correct key only. In this research, an approach is proposed of using transforms to provide a better cryptography process to secure data even during communication. The result of the proposed method indicates that in any condition, the ciphertext will always be the same for each input, but the encryption key will change each time, which makes this encryption complex to break