Security Enhanced Communication Scheme with Compression on Encrypted Cipher Block

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

"The process of exchanging ideas or information between two persons or stations or devices is termed as communication. The information security has become one of the most significant problem in data communication. The intruder is an unwanted person who reads and changes the information while transmission occurs. So it becomes an inseparable problem in data communication. In order to address this problem, cryptography is used. Cryptography is the science of keeping message secret. It deals with transformations of a message into coded form by encryption at the sender (transmitting) side and recovery of original message by decryption at the receiver side. The classical way of transmitting data over an insecure channel is to first compress it and then encrypt. At the receiver, the received bit stream is first decrypted and then decompressed. But when the data is first compressed, there may be a problem of data loss and also if the sender is not able to perform the compression operation first then it will affect the smooth communication between the sender and the receiver. Inorder to overcome this problem, the existing technique is reversing such that the data will be first encrypted and then compressed without compromising the information secrecy. When the data is first encrypted with a secret key, then the data become secure and the sender can use the help of a third person to compress the data if the sender is not able to perform the compression operation first. The data security can be achieved using encryption and decryption algorithms. Here the encryption and decryption is performed using the Triple DES algorithm. The Triple DES algorithm is same as that of DES algorithm, in which the DES algorithm is applied three times to each block. The Run length encoding (RLE) method is used for data compression and decompression. The VHDL language is used for coding, synthesis can be done by means of Xilinx ISE and Model Sim can be used for simulation. "

Authors and Affiliations

Keywords

Related Articles

The NC Machining Post-Processing Technology Based on UG

Post-processing technology is the key to CNC automatic programming technology and an important module of the CAD / CAM system. Post-processing technology converts the NC program that is produced by the CNC automatic prog...

A Study on Academic Anxiety among Adolescents of Minicoy Island

Academic anxiety is a common issue that students cannot ignore if they want to succeed in school. A study on academic anxiety among regular residential adolescent students of the age between (14 to 16 years) of Minicoy G...

Mitigating Denial-of-Service and Distributed Denial-of-Service Attacks Using Server Hopping Model Using Distributed Firewall

"Amongst various online attacks hampering IT security, Denial of Service (DoS) Distributed Denial-of-Service (DDoS) has the most devastating effects. It has also put tremendous pressure over the security experts lately,...

Carrying Capacity of Mantang Sub District Waters Bintan District, Riau Islands Province for Aquaculture Activities in Floating Net Cages

"ABSTRACT Observations were conducted during four months from November 2013 to February 2014 to determine the carrying capacity of Mantang Sub district waters for aquaculture activities based on the parameters of physic...

Nonsense Mediated mRNA Decay (NMD) Mechanism in Drosophila: A Short Review

Nonsense-mediated mRNA decay (NMD) is a mechanism that prevents the accumulation of malfunctioning protein and also regulates the clinical manifestation of many genetic disorders. This pathway not only degrade mRNA conta...

Download PDF file
  • EP ID EP356632
  • DOI -
  • Views 58
  • Downloads 0

How To Cite

(2015). Security Enhanced Communication Scheme with Compression on Encrypted Cipher Block. UNKNOWN, 4(2), -. https://europub.co.uk./articles/-A-356632