Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

被引:1
|
作者
Nadeem, Muhammad [1 ]
Arshad, Ali [2 ]
Riaz, Saman [2 ]
Zahra, Syeda Wajiha [1 ]
Dutta, Ashit Kumar [3 ]
Alruban, Abdulrahman [4 ]
Almutairi, Badr [5 ]
Almotairi, Sultan [6 ,7 ]
机构
[1] Abasyn Univ, Dept Comp, Islamabad 44000, Pakistan
[2] Natl Univ Technol, Dept Comp Sci, Islamabad 44000, Pakistan
[3] Al Maarefa Univ, Coll Appl Sci, Dept Comp Sci & Informat Syst, Riyadh 13713, Saudi Arabia
[4] Majmaah Univ, Coll Comp & Informat Sci, Dept Informat Technol, Al Majmaah 11952, Saudi Arabia
[5] Majmaah Univ, Coll Comp Sci & Informat Technol, Dept Informat Technol, Al Majmaah 11952, Saudi Arabia
[6] Majmaah Univ, Fac Community, Dept Nat & Appl Sci, Majmaah 11952, Saudi Arabia
[7] Islamic Univ Madinah, Fac Comp & Informat Sci, Dept Informat Syst, Madinah 42351, Saudi Arabia
来源
APPLIED SCIENCES-BASEL | 2022年 / 12卷 / 19期
关键词
cryptography; Vigenere cipher; security; prevention; two-layer; cipher; attacks; data leakage;
D O I
10.3390/app12199736
中图分类号
O6 [化学];
学科分类号
0703 ;
摘要
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect the data. With the help of cryptography, data are converted into a format that is difficult for an attacker to understand, and these data can be broadcasted in a reliable format. If the attacker obtains access to the cryptographic algorithm, then the attacker can easily decrypt the data, but if the data are encrypted with the help of the key, it is difficult for the attacker to decrypt the data without the key. When the data are encrypted with the same key at different times, there is a possibility to obtain the actual key with the help of the Kasiski test. Different researchers have encrypted the data with the help of the same key or have developed an algorithm by combining different algorithms, which is a problem. This paper developed an efficient algorithm that cannot be broken easily. Even if an attacker obtains access to the algorithm, the attacker cannot identify the keys derived from that text, and the key only works in the text from which it is generated, which is the novelty of this paper. Data are secured in two different layers. In Layer-1, the proposed algorithm implements plaintext and a static key to obtain the encrypted text and a Vigenere key. In Layer-2, the encrypted text and the Vigenere key are implemented on the Vigenere cipher algorithm to obtain the ciphertext. At the end of the paper, a comparison of different papers is made with the proposed paper, and a conclusion is made based on different techniques and results.
引用
收藏
页数:21
相关论文
共 50 条
  • [31] Efficient algorithms for single- and two-layer linear placement of parallel graphs
    Nandy, SC
    Nandakumar, GN
    Bhattacharya, BB
    COMPUTERS & MATHEMATICS WITH APPLICATIONS, 1997, 34 (12) : 121 - 135
  • [32] Performance and statistical analysis of two-layer MPEG coding algorithms for ATM networks
    Khademi, M
    Paoloni, FJ
    IEE PROCEEDINGS-COMMUNICATIONS, 1996, 143 (03): : 155 - 161
  • [33] Cumulant-based training algorithms of two-layer feedforward neural networks
    Dai, XH
    SIGNAL PROCESSING, 2000, 80 (08) : 1597 - 1606
  • [34] Experimental evaluation of two-layer air bubble curtains to prevent seawater intrusion into rivers
    Kahrizi, Ehsan
    Neyshabouri, Seyed Ali Akbar Salehi
    Zeynolabedin, Amin
    Souri, Javad
    Akbari, Hassan
    JOURNAL OF WATER AND CLIMATE CHANGE, 2023, 14 (02) : 543 - 558
  • [35] Complexity in a two-layer CNN
    Arena, P
    Baglio, S
    Fortuna, L
    Manganaro, G
    1996 FOURTH IEEE INTERNATIONAL WORKSHOP ON CELLULAR NEURAL NETWORKS AND THEIR APPLICATIONS, PROCEEDINGS (CNNA-96), 1996, : 127 - 132
  • [36] The Two-Layer Geodynamo Model
    M. Yu. Reshetnyak
    Doklady Earth Sciences, 2018, 478 : 224 - 227
  • [37] Permeability of two-layer soils
    Sridharan, A
    Prakash, K
    GEOTECHNICAL TESTING JOURNAL, 2002, 25 (04): : 443 - 448
  • [38] The two-layer skirted island
    Pedlosky, Joseph
    Iacono, Roberto
    Napolitano, Ernesto
    Spall, Michael A.
    JOURNAL OF MARINE RESEARCH, 2011, 69 (2-3) : 347 - 382
  • [39] A Two-Layer Transmitarray Antenna
    An, Wenxing
    Xu, Shenheng
    Yang, Fan
    2014 IEEE ANTENNAS AND PROPAGATION SOCIETY INTERNATIONAL SYMPOSIUM (APSURSI), 2014, : 864 - 865
  • [40] Impulsive bounded consensus of two-layer multi-agent networks under deception attacks
    Gao, Anan
    Hu, Aihua
    Jin, Yinghua
    Jiang, Zhengxian
    TRANSACTIONS OF THE INSTITUTE OF MEASUREMENT AND CONTROL, 2024, 46 (10) : 1979 - 1990