DocumentCode :
230893
Title :
Comparative analysis of NPN algorithm & DES Algorithm
Author :
Sharma, Mukesh ; Garg, R.B. ; Dwivedi, Shipra
Author_Institution :
TMU, Moradabad, India
fYear :
2014
fDate :
8-10 Oct. 2014
Firstpage :
1
Lastpage :
6
Abstract :
Various sectors such as such as the retail, hospitality, banking and financial introduced information technology years back. Ongoing enhancements have always offered a wider scope of growth to these sectors. Zooming in the Banking & Financial sector most banks are now offering the Online banking services. The objectives of introducing the e-banking services were profits, fast service, improved productivity, customer satisfaction, 24×7 operations & cost savings. As much the growth of internet probes the customers to use the new online services & banks to offer the same; equally it makes the customers & business skeptical about the security being implemented. The business needs to ensure the security of each electronic transaction over the internet. Critical areas to focus for this are secure communication channel, third party for database maintenance & a robust non-breachable data encryption technique. Any online transaction constitutes of confidential data. Any damage to that data or hacking of that data may bring significant amount of loss to both the parties involved. Cryptography is a widely used science for secret writing. Encryption is one process of secret writing. The process involves a key and an algorithm to generate a Cipher text (secret code) from a plain text. On the other hand, decryption helps to retrieve the original text using the same key. Now what is the key here? The Key is the core string (word) being used in the algorithm. It is kept private. Cryptography has classified the keys being used in the process as Symmetric & Asymmetric. Symmetric key algorithms are most commonly used type where a single key is used for both encryption and decryption [4]. In asymmetric key algorithms different keys are used both for encryption and decryption. This paper highlights on designing & implementing a symmetric key encryption algorithm for securing the online transactions using the concept of Multithreading to optimi- e the time. The work has been implemented using JDK 1.6 as the programming environment. A comparative analysis of DES and the proposed algorithm has been depicted with the help of table and various graphs.
Keywords :
bank data processing; computer crime; cryptography; customer satisfaction; data privacy; multi-threading; DES algorithm; JDK 1.6; NPN algorithm; banking sector; cipher text; comparative analysis; confidential data; cost savings; cryptography; customer satisfaction; database maintenance; e-banking services; electronic transaction; encryption; financial sector; hacking; information technology; multithreading; online banking services; online transaction; plain text; productivity; programming environment; robust nonbreachable data encryption technique; secret writing; secure communication channel; symmetric key encryption algorithm; Algorithm design and analysis; Ciphers; Encryption; Java; Multithreading; Cipher Text; Cryptography; DES; Decryption; Encryption; Multithreading; NPN; Plain Text; Symmetric & Asymmetric Cryptography;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on
Conference_Location :
Noida
Print_ISBN :
978-1-4799-6895-4
Type :
conf
DOI :
10.1109/ICRITO.2014.7014688
Filename :
7014688
Link To Document :
بازگشت