Design and Implementation of Encryption Tool using Advanced Encryption Standard (AES)

Sanket Anil Dambhare, Rutvik Rajesh Walde, Sahil Ramrao Bhogekar, Sai Ranajit, Ritik Shriniwas Kotgiriwar, Sakshi Sudhakar Langde
{"title":"Design and Implementation of Encryption Tool using Advanced Encryption Standard (AES)","authors":"Sanket Anil Dambhare, Rutvik Rajesh Walde, Sahil Ramrao Bhogekar, Sai Ranajit, Ritik Shriniwas Kotgiriwar, Sakshi Sudhakar Langde","doi":"10.1109/ICEARS53579.2022.9751822","DOIUrl":null,"url":null,"abstract":"The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.","PeriodicalId":252961,"journal":{"name":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-03-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Electronics and Renewable Systems (ICEARS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICEARS53579.2022.9751822","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1

Abstract

The growth of the internet has led to the development of today’s data-centric world where information can be exchanged from one part of the world to another with the click of a button. The most commonly used communication device is the mobile phone, with the ability of a portable computer. A large number of chatting applications have been developed that help people to communicate. The information typed inside these chatting applications must pass through the public infrastructure to reach the destination which is its most vulnerable phase of data transfer. A malicious hacker can gain access to messages or alter the messages thus compromising the data security. To maintain data integrity and confidentiality data encryption is used. Data encryption is used which convert our messages into encrypted form so that only people with the secret key can read them. Many systems now claim to guarantee safe and secret messages, bolstered by recent allegations of pervasive state surveillance of personal conversations. This covers a huge number of new projects as well as numerous well-known security-enhancing tools.We investigate and arrange current secure message solutions, as well as present a test framework for their security, usability, and ease of use. We sketch out each design area for three important challenges: trust establishment, conversation security, and transit privacy. Trusted methods of providing secure security and privacy features do not work well in use and detection, while other mixed methods that have not been properly processed in academic textbooks may provide better trade performance.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
基于高级加密标准(AES)的加密工具的设计与实现
互联网的发展导致了当今以数据为中心的世界的发展,信息可以通过点击一个按钮从世界的一个地方交换到另一个地方。最常用的通讯设备是手机,具有便携式电脑的功能。大量的聊天应用程序已经被开发出来,帮助人们交流。在这些聊天应用程序中输入的信息必须经过公共基础设施才能到达目的地,这是数据传输中最脆弱的阶段。恶意黑客可以访问消息或更改消息,从而危及数据安全性。为了保持数据的完整性和机密性,使用数据加密。使用数据加密将我们的消息转换为加密形式,以便只有拥有密钥的人才能读取它们。如今,许多系统都声称能保证信息的安全和秘密,最近有关政府对个人谈话进行普遍监控的指控也支持了这一点。这涵盖了大量的新项目以及许多知名的安全性增强工具。我们调查和整理了当前的安全消息解决方案,并为其安全性、可用性和易用性提供了一个测试框架。我们概述了每个设计领域的三个重要挑战:信任建立、对话安全性和传输隐私。提供安全保护和隐私功能的可信方法在使用和检测方面效果不佳,而在学术教科书中没有得到适当处理的其他混合方法可能会提供更好的交易性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
The Solar Tracker Using Micro-controller "Core Strength" of Dance Lala Training Considering the Body Motion Tracking Video and Predictive Model Textile Antenna –Structure, Material and Applications Automated Classification of Atherosclerosis in Coronary Computed Tomography Angiography Images Based on Radiomics Study Using Automatic Machine Learning Cryptocurrency Exchange Rate Prediction using ARIMA Model on Real Time Data
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1