Encryption & Decryption Using Deffie Hellman Algorithm
|Technology||MsSql, Dot NET|
The spectacular growth of the Internet has spawned an increased awareness of and interest in security issues. Although security has been considered in the design of the basic Internet protocols, many applications have been and are being designed with minimal attention paid to issues of confidentiality, authentication, and privacy. As our daily activities become more and more reliant upon data networks, the importance of an understanding of such security issues will only increase. Many cryptographic algorithms (e.g., DES, AES) require the establishment of shared keying material in advance. Manual distribution of keying material is inefficient and complex. This is where the Diffie-Hellman Key Agreement algorithm is useful. The project is developed using Visual Studio with C# .Net as programming language. There is only one entity who will have the access to the system which is user. User first need to login using its login credentials and then only he/she can access the system. Encryption is the technique of hiding private or sensitive information within something that appears to be nothing be a usual. If a person views that cipher text, he or she will have no idea that there is any secret information. What encryption essentially does is exploit human perception, human senses are not trained to look for files that have information inside of them. What this system does is, it lets user to send text as secrete message and gives a key or a password to lock the text, what this key does is, it encrypts the text, so that even if it is hacked by hacker it will not be able to read the text. Receiver will need the key to decrypt the hidden text. User then sends the key to the receiver and then he enters the key or password for decryption of text, he then presses decrypt key to get secret text from the sender. By using this method, you can double ensure that your secret message is sent secretly without outside interference of hackers or crackers. If sender sends this cipher text in public others will not know what is it, and it will be received by receiver. The system uses online database to store all related information.
|IEEE Paper Year||2015|