Low latency for file encryption and decryption using BRA algorithm in network security

Information security is major obstacle in different areas like military, network application, bank application. File is forward from one location to another location in the network. Many hackers are illegally access the information. To provide solution to this problem many authors has introduced different algorithms and techniques. The different algorithms like AES, DES and triple DES achieve more security but it takes more time for encryption and decryption files. These algorithm increases the complexity of the algorithm. In our algorithm we have investigate parameters of network security. This algorithm provides more security and takes smallest amount of time for file encryption and decryption. This algorithm can apply on different types of files like text, image, audio, video files. In the Byte Rotation Algorithm involve two techniques. One is random key generation technique is used. And second is parallel encryption and decryption is process using multithreading technique. Key size of random key generation technique is 128 bit.128 bit random key generation is difficult for crack to attacker.

[1]  Praveen Sen,et al.  Use of Improved Rabin Algorithm for Designing Public Key Cryptosystem for Wireless Sensor Networks , 2014 .

[2]  Vivek S. Deshpande,et al.  Performance analysis of FMAC in wireless sensor networks , 2014, 2014 Eleventh International Conference on Wireless and Optical Communications Networks (WOCN).

[3]  Manjiri Pathak,et al.  Message Security Using Armstrong Numbers And Authentication Using Colors , 2015 .

[4]  Nicholas Omoregbe,et al.  Improving Security Using Refined 16 X 16 Playfair Cipher for Enhanced Advanced Encryption Standard (AES) , 2013 .

[5]  Vivek S. Deshpande,et al.  Analyzing the QoS using CSMA and TDMA protocols for wireless sensor networks , 2014, International Conference for Convergence for Technology-2014.

[6]  T. Subhashini,et al.  Implementation of Enhanced Security AlgorithmsinMobile Ad hoc Networks , 2014 .

[7]  Md. Ashraful Islam,et al.  Secure Wireless Text Message Transmission with the Implementation of RSA Cryptographic Algorithm , 2014 .

[8]  Ankita S. Nampalliwar Implementation of AES Algorithm , 2014 .

[9]  nbspGaurav R. Patel,et al.  Hybrid Encryption Algorithm , 2014 .

[10]  Rishabh Jain,et al.  AES Algorithm Using 512 Bit Key Implementationfor Secure Communication , 2014 .

[11]  Mohamed Amin,et al.  A steganographic method based on DCT and new quantization technique , 2012, 2012 22nd International Conference on Computer Theory and Applications (ICCTA).

[12]  Vivek S. Deshpande,et al.  Characterization of Wireless Sensor Networks for Traffic & Delay , 2013, 2013 International Conference on Cloud & Ubiquitous Computing & Emerging Technologies.

[13]  Prakash Kuppuswamy,et al.  Improving Security Authentication of IEEE 802.16 WiMax with New Public key algorithm , 2014 .