Tapan Kumar Hazra, Anisha Mahato, A. Mandal, A. Chakraborty
{"title":"使用河豚和Diffie-Hellman技术的图像和文本文件的混合密码系统","authors":"Tapan Kumar Hazra, Anisha Mahato, A. Mandal, A. Chakraborty","doi":"10.1109/IEMECON.2017.8079577","DOIUrl":null,"url":null,"abstract":"In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using Diffie-Hellman protocol a shared private key will be generated for two computer users who are trying to communicate over an insecure channel. Now if the second user wants to decrypt the file encrypted by the first user he/she has to use the shared key for permission. Once the permission is granted, the file can be decrypted using blowfish algorithm.","PeriodicalId":231330,"journal":{"name":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"A hybrid cryptosystem of image and text files using blowfish and Diffie-Hellman techniques\",\"authors\":\"Tapan Kumar Hazra, Anisha Mahato, A. Mandal, A. Chakraborty\",\"doi\":\"10.1109/IEMECON.2017.8079577\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using Diffie-Hellman protocol a shared private key will be generated for two computer users who are trying to communicate over an insecure channel. Now if the second user wants to decrypt the file encrypted by the first user he/she has to use the shared key for permission. Once the permission is granted, the file can be decrypted using blowfish algorithm.\",\"PeriodicalId\":231330,\"journal\":{\"name\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMECON.2017.8079577\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMECON.2017.8079577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A hybrid cryptosystem of image and text files using blowfish and Diffie-Hellman techniques
In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using Diffie-Hellman protocol a shared private key will be generated for two computer users who are trying to communicate over an insecure channel. Now if the second user wants to decrypt the file encrypted by the first user he/she has to use the shared key for permission. Once the permission is granted, the file can be decrypted using blowfish algorithm.