Secure Data Using Encryption And Decryption Of Data
Paper Title: Secure Data Using Encryption And Decryption Of Data
Authors Name: Dr K Santhi , C Praveen , B Pravin , N Roshan
Download E-Certificate: Download
Author Reg. ID: TIJER_151047
Published Paper Id: TIJERB001085
Published In: Volume 11 Issue 2, February-2024
Abstract: Applying cryptography to data encoding and decoding. The use of encryption to protect private data, conversations, or digital photos has become increasingly difficult as a result of recent developments in analysis. Analysing carrier data can rapidly reveal whether there is any hidden information there.. To facilitate communication between two private parties and public parties, this project provides a revolutionary cryptography technique. Both traditional and cryptographic approaches are used in the methodology presented in this study. The XChaCha20-Poly1305 algorithm is used in cryptography. We also use the mutual authentication technique to satisfy all criteria for cryptography, such as access control, confidentiality, integrity, and authentication. We can preserve the data more securely retain the data in this manner. Since the data is secured using the XChaCha20-Poly1305 algorithm. In order to prevent access by other network users to the already-available information. Only the sender and the recipient may extract the message from the data.
Keywords: Cryptography, XChaCha20-Poly1305
Downloads: 00023
Page No: 534-537
Country: Thiruvallur, Chennai, Tamilnadu, India
Research Area: Science and Technology
Published Paper URL: https://tijer.org/TIJER/viewpaperforall?paper=TIJERB001085
Published Paper PDF: https://tijer.org/TIJER/papers/TIJERB001085
ISSN:
2349-9249 | IMPACT FACTOR: 8.57 Calculated By Google Scholar| ESTD YEAR: 2014
An International Scholarly Open Access Journal, Peer-Reviewed, Refereed Journal Impact Factor 8.57 Calculate by Google Scholar and Semantic Scholar | AI-Powered Research Tool, Multidisciplinary, Monthly, Multilanguage Journal Indexing in All Major Database & Metadata, Citation Generator
Publisher: TIJER(IJPublication)
Click Here to Download This Article
Article Preview