{"title":"多层数据加密算法","authors":"M. Abid, S. Revathy","doi":"10.1109/ICOEI48184.2020.9142890","DOIUrl":null,"url":null,"abstract":"Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.","PeriodicalId":267795,"journal":{"name":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","volume":"281 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Multi-Tier Data Encryption Algorithm\",\"authors\":\"M. Abid, S. Revathy\",\"doi\":\"10.1109/ICOEI48184.2020.9142890\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.\",\"PeriodicalId\":267795,\"journal\":{\"name\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"volume\":\"281 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-06-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICOEI48184.2020.9142890\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 4th International Conference on Trends in Electronics and Informatics (ICOEI)(48184)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICOEI48184.2020.9142890","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Gentry, Sahai, and Waters created the first identity-based encryption (IBE) and lattice-based cryptography in CRYPTO 2013. This scheme is improved in this paper by exploiting the US National Security Agency's (NSA) hashing function. POSIX is used to create a small and portable algorithm to assimilate multiple keys under a single identity-key that enables protection under different identities to be evaluated as one. The encryption renders the original file transformed by splitting it and encrypting the resulting files before encrypting the combination as a whole. Focus has been converged on modulating and modifying available encryption techniques to be processed as multiple segments of a single algorithm for more robust and powerful application. Both, the passkey as well as the data is encrypted using sets of pre-defined encryption techniques and the algorithm is processed via legacy libraries to be more versatile and provide an easy to implement scheme. The algorithm is developed to be applied in the instances of standalone dataset or in cases of virtualization where the algorithm can be inherited by the subsystems as modules to be used for security purposes.