International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 110 | Views: 249

Case Studies | Electronics & Communication Engineering | India | Volume 4 Issue 2, February 2015 | Popularity: 6.7 / 10


     

Security Enhanced Communication Scheme with Compression on Encrypted Cipher Block

Asha R Pillai, Chithra M


Abstract: The process of exchanging ideas or information between two persons or stations or devices is termed as communication. The information security has become one of the most significant problem in data communication. The intruder is an unwanted person who reads and changes the information while transmission occurs. So it becomes an inseparable problem in data communication. In order to address this problem, cryptography is used. Cryptography is the science of keeping message secret. It deals with transformations of a message into coded form by encryption at the sender (transmitting) side and recovery of original message by decryption at the receiver side. The classical way of transmitting data over an insecure channel is to first compress it and then encrypt. At the receiver, the received bit stream is first decrypted and then decompressed. But when the data is first compressed, there may be a problem of data loss and also if the sender is not able to perform the compression operation first then it will affect the smooth communication between the sender and the receiver. Inorder to overcome this problem, the existing technique is reversing such that the data will be first encrypted and then compressed without compromising the information secrecy. When the data is first encrypted with a secret key, then the data become secure and the sender can use the help of a third person to compress the data if the sender is not able to perform the compression operation first. The data security can be achieved using encryption and decryption algorithms. Here the encryption and decryption is performed using the Triple DES algorithm. The Triple DES algorithm is same as that of DES algorithm, in which the DES algorithm is applied three times to each block. The Run length encoding (RLE) method is used for data compression and decompression. The VHDL language is used for coding, synthesis can be done by means of Xilinx ISE and Model Sim can be used for simulation.


Keywords: Data communication, Intruder, Cryptography, DES algorithm, TDES algorithm, RLE


Edition: Volume 4 Issue 2, February 2015


Pages: 1926 - 1932



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Asha R Pillai, Chithra M, "Security Enhanced Communication Scheme with Compression on Encrypted Cipher Block", International Journal of Science and Research (IJSR), Volume 4 Issue 2, February 2015, pp. 1926-1932, https://www.ijsr.net/getabstract.php?paperid=SUB151600, DOI: https://www.doi.org/10.21275/SUB151600



Similar Articles

Downloads: 77

Research Paper, Electronics & Communication Engineering, India, Volume 9 Issue 10, October 2020

Pages: 1156 - 1161

Eye Controlled Wheelchair Using Image Processing Techniques

Prateek Bansal, Ritvik Singhal, Vijay Khare

Share this Article

Downloads: 108

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1848 - 1851

Cryptography Algorithm based on DES and RSA in Bluetooth Communication

Veeresh K., Arunkumar Madupu

Share this Article

Downloads: 108

Review Papers, Electronics & Communication Engineering, India, Volume 4 Issue 8, August 2015

Pages: 907 - 909

Review of PAPR Reduction in Wireless System with PTS Method

Saurabh Gaur, Punit Upmanyu

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 11, November 2014

Pages: 1718 - 1722

Optimizing the Redundancy in Wireless Networks Using Chorus

K. Aparna, P. Umapathi

Share this Article

Downloads: 109

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 4 Issue 6, June 2015

Pages: 2184 - 2187

BER Analysis of Turbo Coded Channel

Dinesh Verma, Manish Kumar

Share this Article



Top