Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418536
A. Sen, Attri Ghosh, A. Nath
Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.
{"title":"Bit level symmetric key cryptography using genetic algorithm","authors":"A. Sen, Attri Ghosh, A. Nath","doi":"10.1109/CSNT.2017.8418536","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418536","url":null,"abstract":"Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126470288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2017-11-01DOI: 10.1109/CSNT.2017.8418507
G. Soni, C. Verma
A wireless local area network (WLAN) is a digital transmission system designed to provide location independent network access between computing devices by using radio waves in a limited area. Mainly IEEE 802.11 standards are used to provide wireless connectivity at higher speeds. To analyze and check the continuous feasibility of WLAN signal, Vector Signal Transceiver-VST 5644R can be the efficient approach. In this paper the experimental investigation and analysis of WLAN 802.11 standard has been carried out based on vector signal transceiver VST 5644R using different modulation schemes. It was analyzed that QPSK gives best link performance for the WLAN link. The results are being analyzed in terms of EVM (Error vector magnitude). The link has been evaluated at 2.4GHz using QPSK and QAM modulation schemes. This work is based on experimental and real time implementation of WLAN Link based on PXIe 1062Q VST 5644 platform.
{"title":"Performance investigation of the WLAN link using QAM and QPSK based on vector signal transceiver 5644R","authors":"G. Soni, C. Verma","doi":"10.1109/CSNT.2017.8418507","DOIUrl":"https://doi.org/10.1109/CSNT.2017.8418507","url":null,"abstract":"A wireless local area network (WLAN) is a digital transmission system designed to provide location independent network access between computing devices by using radio waves in a limited area. Mainly IEEE 802.11 standards are used to provide wireless connectivity at higher speeds. To analyze and check the continuous feasibility of WLAN signal, Vector Signal Transceiver-VST 5644R can be the efficient approach. In this paper the experimental investigation and analysis of WLAN 802.11 standard has been carried out based on vector signal transceiver VST 5644R using different modulation schemes. It was analyzed that QPSK gives best link performance for the WLAN link. The results are being analyzed in terms of EVM (Error vector magnitude). The link has been evaluated at 2.4GHz using QPSK and QAM modulation schemes. This work is based on experimental and real time implementation of WLAN Link based on PXIe 1062Q VST 5644 platform.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122280560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.1109/csnt.2017.8418566
Komal Verma, R. Pandey, Nidhi Srivastava
Experts from different specialized fields trust that another era of Computer Science is emerging. Sometime ago, applications use to run on the individual PC framework's hard drive. With taking a break, the application started to be put away on a nearby server of an organization and from that point the applications were keep running on the individual framework. The following stage to this advancement of software engineering time is moving both the applications and information to the ‘Cloud’, where all information is put away at a virtual server and can be gotten to from anyplace through Internet. Microsoft Azure is a Microsoft's open Cloud Computing Platform. It gives an extensive variety of cloud administrations from Data Storage, Analysis to Computing and Networking of Data. Analysis through Machine learning is one of the administrations that Azure Offers. For dissecting one can use programming languages like R, Python and Visual Studio. R gives a Programming domain broadly utilized for graphically analysis and measurable computing.
{"title":"Inventory supply & shelfing through data analytics","authors":"Komal Verma, R. Pandey, Nidhi Srivastava","doi":"10.1109/csnt.2017.8418566","DOIUrl":"https://doi.org/10.1109/csnt.2017.8418566","url":null,"abstract":"Experts from different specialized fields trust that another era of Computer Science is emerging. Sometime ago, applications use to run on the individual PC framework's hard drive. With taking a break, the application started to be put away on a nearby server of an organization and from that point the applications were keep running on the individual framework. The following stage to this advancement of software engineering time is moving both the applications and information to the ‘Cloud’, where all information is put away at a virtual server and can be gotten to from anyplace through Internet. Microsoft Azure is a Microsoft's open Cloud Computing Platform. It gives an extensive variety of cloud administrations from Data Storage, Analysis to Computing and Networking of Data. Analysis through Machine learning is one of the administrations that Azure Offers. For dissecting one can use programming languages like R, Python and Visual Studio. R gives a Programming domain broadly utilized for graphically analysis and measurable computing.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134106893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}