C. Prashanth, M. Mohamed, K. Latha, S. Hemavathi, D. Venkatesh
{"title":"基于随机化算法的数据切片和合并增强混合加密","authors":"C. Prashanth, M. Mohamed, K. Latha, S. Hemavathi, D. Venkatesh","doi":"10.1109/ICCCT53315.2021.9711883","DOIUrl":null,"url":null,"abstract":"nowadays, data stored in mobile phones become often vulnerable that it is stolen by hackers. More than 50% of mobile users do not encrypt their mobile phones which might result in stealing data when mobile is hacked or stolen. Android encryption is used in android mobiles. The encryption algorithm used is 128 Advanced Encryption Standard (AES) with cipher-block chaining (CBC) and SHA256.In this paper, the data in mobile is encrypted using multiple algorithms(AES, Salsa20, fernet). This method is called hybrid encryption. The data is split and encrypted with multiple algorithms. The selected file to be encrypted is divided into three segments and encrypted with AES, Salsa20, and Fernet algorithms. Then the private keys are encrypted with the RSA (Rivest-Shamir-Adleman) algorithm. The RSA cipher file is stored in phone storage. For decryption, the RSA cipher file is obtained and the responding keys are obtained. With the keys, the AES, Salsa20, Fernet algorithms decrypt the responding encrypted segments. The decrypted segments are combined and the original file is obtained. Then the file is stored in the device.","PeriodicalId":162171,"journal":{"name":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"Enhanced Hybrid Encryption Through Slicing and Merging of Data With Randomization Of Algorithms\",\"authors\":\"C. Prashanth, M. Mohamed, K. Latha, S. Hemavathi, D. Venkatesh\",\"doi\":\"10.1109/ICCCT53315.2021.9711883\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"nowadays, data stored in mobile phones become often vulnerable that it is stolen by hackers. More than 50% of mobile users do not encrypt their mobile phones which might result in stealing data when mobile is hacked or stolen. Android encryption is used in android mobiles. The encryption algorithm used is 128 Advanced Encryption Standard (AES) with cipher-block chaining (CBC) and SHA256.In this paper, the data in mobile is encrypted using multiple algorithms(AES, Salsa20, fernet). This method is called hybrid encryption. The data is split and encrypted with multiple algorithms. The selected file to be encrypted is divided into three segments and encrypted with AES, Salsa20, and Fernet algorithms. Then the private keys are encrypted with the RSA (Rivest-Shamir-Adleman) algorithm. The RSA cipher file is stored in phone storage. For decryption, the RSA cipher file is obtained and the responding keys are obtained. With the keys, the AES, Salsa20, Fernet algorithms decrypt the responding encrypted segments. The decrypted segments are combined and the original file is obtained. Then the file is stored in the device.\",\"PeriodicalId\":162171,\"journal\":{\"name\":\"2021 4th International Conference on Computing and Communications Technologies (ICCCT)\",\"volume\":\"53 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-16\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 4th International Conference on Computing and Communications Technologies (ICCCT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCCT53315.2021.9711883\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 4th International Conference on Computing and Communications Technologies (ICCCT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCCT53315.2021.9711883","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Enhanced Hybrid Encryption Through Slicing and Merging of Data With Randomization Of Algorithms
nowadays, data stored in mobile phones become often vulnerable that it is stolen by hackers. More than 50% of mobile users do not encrypt their mobile phones which might result in stealing data when mobile is hacked or stolen. Android encryption is used in android mobiles. The encryption algorithm used is 128 Advanced Encryption Standard (AES) with cipher-block chaining (CBC) and SHA256.In this paper, the data in mobile is encrypted using multiple algorithms(AES, Salsa20, fernet). This method is called hybrid encryption. The data is split and encrypted with multiple algorithms. The selected file to be encrypted is divided into three segments and encrypted with AES, Salsa20, and Fernet algorithms. Then the private keys are encrypted with the RSA (Rivest-Shamir-Adleman) algorithm. The RSA cipher file is stored in phone storage. For decryption, the RSA cipher file is obtained and the responding keys are obtained. With the keys, the AES, Salsa20, Fernet algorithms decrypt the responding encrypted segments. The decrypted segments are combined and the original file is obtained. Then the file is stored in the device.