一个创新的原理图设计,以定制河豚更好的安全性

Shally Nagpal, Suneet Kumar
{"title":"一个创新的原理图设计,以定制河豚更好的安全性","authors":"Shally Nagpal, Suneet Kumar","doi":"10.1109/ISPCC53510.2021.9609357","DOIUrl":null,"url":null,"abstract":"with the advent of the internet, protection has become a chief worry. And the past of safety permits a superior expertise of the development of safety tools. The net arrangement itself permitted for plenty of safekeeping fears to arise. Many corporations secure themselves from the net with the help of firewalls and encryption mechanisms. The corporations can create an “intranet” remains connected to the internet and secured it from possible threats. To maintain integrity of data healthier encryption techniques are required for improved safety. It is required to consider various issues such as key size, block size and encryption ratio for better encryption. Encryption is required to provide security of documents that are exported to secondary storage devices (such as pen drive, SD card) so that unauthorized access is not possible. It is very easy to decrypt the document if a key is stored along with the document on secondary storage. Instead of storing the key along with document it is better to generate cryptographic keys from user password while encrypting or decrypting the file. A new scheme to customize blowfish variable parameters (Key generation from user defined password) is proposed and evaluated on the hardness of keys for various encryption standards with proposed algorithm.","PeriodicalId":113266,"journal":{"name":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An innovative Schematic design to Customize Blowfish for Better Security\",\"authors\":\"Shally Nagpal, Suneet Kumar\",\"doi\":\"10.1109/ISPCC53510.2021.9609357\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"with the advent of the internet, protection has become a chief worry. And the past of safety permits a superior expertise of the development of safety tools. The net arrangement itself permitted for plenty of safekeeping fears to arise. Many corporations secure themselves from the net with the help of firewalls and encryption mechanisms. The corporations can create an “intranet” remains connected to the internet and secured it from possible threats. To maintain integrity of data healthier encryption techniques are required for improved safety. It is required to consider various issues such as key size, block size and encryption ratio for better encryption. Encryption is required to provide security of documents that are exported to secondary storage devices (such as pen drive, SD card) so that unauthorized access is not possible. It is very easy to decrypt the document if a key is stored along with the document on secondary storage. Instead of storing the key along with document it is better to generate cryptographic keys from user password while encrypting or decrypting the file. A new scheme to customize blowfish variable parameters (Key generation from user defined password) is proposed and evaluated on the hardness of keys for various encryption standards with proposed algorithm.\",\"PeriodicalId\":113266,\"journal\":{\"name\":\"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-10-07\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISPCC53510.2021.9609357\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 6th International Conference on Signal Processing, Computing and Control (ISPCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISPCC53510.2021.9609357","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

随着互联网的出现,保护已成为主要的担忧。过去的安全经验允许我们在安全工具的开发方面拥有卓越的专业知识。这种网络安排本身就导致了很多安全方面的担忧。许多公司在防火墙和加密机制的帮助下保护自己不受网络的侵害。企业可以创建一个与互联网相连的“内部网”,并保护它免受可能的威胁。为了保持数据的完整性,需要更健康的加密技术来提高安全性。为了更好地加密,需要考虑密钥大小、块大小和加密比率等各种问题。为了保证导出到二级存储设备(如笔式驱动器、SD卡)的文件的安全性,需要加密,以防止未经授权的访问。如果密钥与文档一起存储在二级存储中,则解密文档非常容易。与其将密钥与文档一起存储,不如在加密或解密文件时从用户密码生成加密密钥。提出了一种自定义河豚可变参数(用户自定义密码生成密钥)的新方案,并利用该算法对各种加密标准的密钥硬度进行了评估。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
An innovative Schematic design to Customize Blowfish for Better Security
with the advent of the internet, protection has become a chief worry. And the past of safety permits a superior expertise of the development of safety tools. The net arrangement itself permitted for plenty of safekeeping fears to arise. Many corporations secure themselves from the net with the help of firewalls and encryption mechanisms. The corporations can create an “intranet” remains connected to the internet and secured it from possible threats. To maintain integrity of data healthier encryption techniques are required for improved safety. It is required to consider various issues such as key size, block size and encryption ratio for better encryption. Encryption is required to provide security of documents that are exported to secondary storage devices (such as pen drive, SD card) so that unauthorized access is not possible. It is very easy to decrypt the document if a key is stored along with the document on secondary storage. Instead of storing the key along with document it is better to generate cryptographic keys from user password while encrypting or decrypting the file. A new scheme to customize blowfish variable parameters (Key generation from user defined password) is proposed and evaluated on the hardness of keys for various encryption standards with proposed algorithm.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信