使用河豚和Diffie-Hellman技术的图像和文本文件的混合密码系统

Tapan Kumar Hazra, Anisha Mahato, A. Mandal, A. Chakraborty
{"title":"使用河豚和Diffie-Hellman技术的图像和文本文件的混合密码系统","authors":"Tapan Kumar Hazra, Anisha Mahato, A. Mandal, A. Chakraborty","doi":"10.1109/IEMECON.2017.8079577","DOIUrl":null,"url":null,"abstract":"In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using Diffie-Hellman protocol a shared private key will be generated for two computer users who are trying to communicate over an insecure channel. Now if the second user wants to decrypt the file encrypted by the first user he/she has to use the shared key for permission. Once the permission is granted, the file can be decrypted using blowfish algorithm.","PeriodicalId":231330,"journal":{"name":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2017-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"14","resultStr":"{\"title\":\"A hybrid cryptosystem of image and text files using blowfish and Diffie-Hellman techniques\",\"authors\":\"Tapan Kumar Hazra, Anisha Mahato, A. Mandal, A. Chakraborty\",\"doi\":\"10.1109/IEMECON.2017.8079577\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using Diffie-Hellman protocol a shared private key will be generated for two computer users who are trying to communicate over an insecure channel. Now if the second user wants to decrypt the file encrypted by the first user he/she has to use the shared key for permission. Once the permission is granted, the file can be decrypted using blowfish algorithm.\",\"PeriodicalId\":231330,\"journal\":{\"name\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"volume\":\"5 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"14\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/IEMECON.2017.8079577\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 8th Annual Industrial Automation and Electromechanical Engineering Conference (IEMECON)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IEMECON.2017.8079577","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 14

摘要

本文提出了一种新的图像和文本文件的加密和解密算法。该方法结合了Diffie Hellman算法和Blowfish算法的概念来实现。在这项新技术中,首先计算机用户将使用由河豚算法生成的密钥加密文件。然后,使用Diffie-Hellman协议,将为试图通过不安全通道进行通信的两个计算机用户生成共享私钥。现在,如果第二个用户想要解密由第一个用户加密的文件,他/她必须使用共享密钥获得许可。一旦获得许可,就可以使用河豚算法对文件进行解密。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
A hybrid cryptosystem of image and text files using blowfish and Diffie-Hellman techniques
In this paper we have proposed a new algorithm of encrypting and decrypting images and text files. The proposed method is implemented by combining the concepts of Diffie Hellman algorithm and Blowfish algorithm. In this new technique at first a computer user will encrypt a file using a secret key generated by blowfish algorithm. Then using Diffie-Hellman protocol a shared private key will be generated for two computer users who are trying to communicate over an insecure channel. Now if the second user wants to decrypt the file encrypted by the first user he/she has to use the shared key for permission. Once the permission is granted, the file can be decrypted using blowfish algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信