Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

被引:1
|
作者
Nadeem, Muhammad [1 ]
Arshad, Ali [2 ]
Riaz, Saman [2 ]
Zahra, Syeda Wajiha [1 ]
Dutta, Ashit Kumar [3 ]
Alruban, Abdulrahman [4 ]
Almutairi, Badr [5 ]
Almotairi, Sultan [6 ,7 ]
机构
[1] Abasyn Univ, Dept Comp, Islamabad 44000, Pakistan
[2] Natl Univ Technol, Dept Comp Sci, Islamabad 44000, Pakistan
[3] Al Maarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, Riyadh 13713, Saudi Arabia
[4] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Al Majmaah 11952, Saudi Arabia
[5] Majmaah Univ, Coll Comp Sci & Informat Technol, Dept Informat Technol, Al Majmaah 11952, Saudi Arabia
[6] Majmaah Univ, Fac Community, Dept Nat & Appl Sci, Majmaah 11952, Saudi Arabia
[7] Islamic Univ Madinah, Fac Comp & Informat Sci, Dept Informat Syst, Madinah 42351, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 19期
关键词
cryptography; Vigenere cipher; security; prevention; two-layer; cipher; attacks; data leakage;
D O I
10.3390/app12199736
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect the data. With the help of cryptography, data are converted into a format that is difficult for an attacker to understand, and these data can be broadcasted in a reliable format. If the attacker obtains access to the cryptographic algorithm, then the attacker can easily decrypt the data, but if the data are encrypted with the help of the key, it is difficult for the attacker to decrypt the data without the key. When the data are encrypted with the same key at different times, there is a possibility to obtain the actual key with the help of the Kasiski test. Different researchers have encrypted the data with the help of the same key or have developed an algorithm by combining different algorithms, which is a problem. This paper developed an efficient algorithm that cannot be broken easily. Even if an attacker obtains access to the algorithm, the attacker cannot identify the keys derived from that text, and the key only works in the text from which it is generated, which is the novelty of this paper. Data are secured in two different layers. In Layer-1, the proposed algorithm implements plaintext and a static key to obtain the encrypted text and a Vigenere key. In Layer-2, the encrypted text and the Vigenere key are implemented on the Vigenere cipher algorithm to obtain the ciphertext. At the end of the paper, a comparison of different papers is made with the proposed paper, and a conclusion is made based on different techniques and results.
引用
收藏
页数:21
相关论文
共 50 条
  • [1] Templates and algorithms for two-layer cellular neural Networks
    Yang, ZH
    Nishio, Y
    Ushida, A
    PROCEEDING OF THE 2002 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS, VOLS 1-3, 2002, : 1946 - 1951
  • [2] Evaluating Network Security With Two-layer Attack Graphs
    Xie, Anming
    Cai, Zhuhua
    Tang, Cong
    Hu, Jianbin
    Chen, Zhong
    25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 127 - +
  • [3] Research on the Security of Microsoft's Two-Layer Captcha
    Gao, Haichang
    Tang, Mengyun
    Liu, Yi
    Zhang, Ping
    Liu, Xiyang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (07) : 1671 - 1685
  • [4] Approximate inference algorithms for two-layer Bayesian networks
    Ng, AY
    Jordan, MI
    ADVANCES IN NEURAL INFORMATION PROCESSING SYSTEMS 12, 2000, 12 : 533 - 539
  • [5] Two-Layer Security Scheme for AMI System in Taiwan
    Hsu, Ping-Hai
    Tang, Wenshiang
    Tsai, Chiakai
    Cheng, Bo-Chao
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 105 - 110
  • [6] New flocking algorithms based on a two-layer structure
    Liu, Deming
    Fang, Hao
    Shang, Chengsi
    Dou, Lihua
    2019 IEEE 15TH INTERNATIONAL CONFERENCE ON CONTROL AND AUTOMATION (ICCA), 2019, : 1120 - 1125
  • [7] Algorithms for high performance two-layer channel routing
    Pal, Achira
    Kundu, Debojit
    Datta, Alak K.
    Mandal, Tarak N.
    Pal, Rajat K.
    TENCON 2007 - 2007 IEEE REGION 10 CONFERENCE, VOLS 1-3, 2007, : 1532 - +
  • [8] A two-layer robot controller design using evolutionary algorithms
    Abdessemed, F
    Benmahammed, K
    JOURNAL OF INTELLIGENT & ROBOTIC SYSTEMS, 2001, 30 (01) : 73 - 94
  • [9] A two-layer security scheme for a distributed mobile agent system
    Lee, MC
    Wang, TI
    6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL IV, PROCEEDINGS: MOBILE/WIRELESS COMPUTING AND COMMUNICATION SYSTEMS I, 2002, : 36 - 41
  • [10] Multimodal Biometric Authentication with Two-layer Hybrid Template Security
    Swati K. Choudhary
    Ameya K. Naik
    SN Computer Science, 5 (6)