Nur algorithm on data encryption and decryption

Security is a priority in information system, especially in the exchange of data that are important or confidential. The information to be given to the party entitled to the information must be properly safeguarded, don’t fall into the other hands who have no right to such information. One way to maintain the security of information exchanged in a system can be done using cryptographic techniques. Cryptography is the art and science to hide information from third parties. In cryptography a person who has a private key can convert plaintext data into unique and unreadable data (ciphertext) and can convert existing ciphertext into plaintext form by using its private key. System development (System Development Lifecycle) can mean to construct a new system to replace old system, combined with prototyping technique to build a cryptographic system using Nur algorithm which is implemented using programming language used is assembly (MASM32). In Nur Aminuddin's Encryptor there are two data-reading techniques namely encryption technique (the technique of converting data from the original into unreadable code) and decryption technique (the techniques of reading unreadable codes become readable) Encryption technique is built by applying technique of modern cryptography which holds secrecy on the symmetric key, so the security of encryption depends only on the key and does not depend on whether the algorithm is known to people or not.

[1]  G. Murugaboopathi,et al.  Analysis and assessment of various cryptographic techniques based on a variety of features , 2018 .

[2]  A NeebaE,et al.  Secured cryptographic data model for cloud , 2018 .

[3]  Kartik Shankar,et al.  Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm , 2018 .

[4]  K. Shankar,et al.  RGB based multiple share creation in visual cryptography with aid of elliptic curve cryptography , 2017, China Communications.

[5]  B KirubanandV.,et al.  A lightweight hybrid encryption technique to secure IoT data transmission , 2018 .

[6]  Fazal Noorbasha,et al.  FPGA implementation of RGB image encryption and decryption using DNA cryptography , 2018 .

[7]  D Manivannan,et al.  An efficient cryptographic scheme for text message protection , 2018 .

[8]  Abhishek Bhardwaj,et al.  HS1-RIV: Improved Efficiency for Authenticated Encryption , 2018 .

[9]  R H Aswathy,et al.  An investigation on cryptographic algorithms usage in IoT contexts , 2018 .

[10]  Joseph Varghese Kureethara,et al.  Anefficient 2-Step DNA symmetric cryptography algorithm based on dynamic data structures , 2018 .

[11]  Sachin Kumar,et al.  Study & analysis of cryptography algorithms : RSA, AES, DES, T-DES, blowfish , 2017 .

[12]  R. Vasantha,et al.  An identity encryption cloud scheme based on SMTP using advanced blow fish algorithm , 2017 .

[13]  N Srinivasu,et al.  Security enhanced using honey encryption for private data sharing in cloud , 2017 .

[14]  Gaurav Sharma,et al.  Enhancing security for end users in cloud computing environment using hybrid encryption technique , 2018 .

[15]  V. B. Kirubanand,et al.  Data encryption in public cloud using multi-phase encryption model , 2018 .

[16]  A. Murali,et al.  VLSI design for efficient RSD-Based ECC processor using Karatsuba algorithm , 2017 .

[17]  V Srikanth,et al.  A Study on Light Weight Cryptography Algorithms for Data Security in IOT , 2018 .

[18]  B. Murali Krishna,et al.  Reconfigurable pseudo biotic key encryption mechanism for cryptography applications , 2017 .

[19]  Mohith Lalita Kumar Parvataneni,et al.  Secure and Efficient Query Processing Using Randomized Encryption and De-duplication on the Cloud , 2018 .

[20]  B. Amutha,et al.  Encryption analysis of AES-Cipher Block Chaining performance in Crypto-Wall Ransomware and SDN based mitigation , 2018 .

[21]  P. R. Devale,et al.  A study on searchable encryption schemes , 2018 .

[22]  P Anandan,et al.  A Computational Approach of Highly Secure Hash Algorithm for Color Image Steganography Using Edge Detection and Honey Encryption Algorithm , 2018 .

[23]  R Santhosh Kumar,et al.  Neighbordiscovery-based security enhancement using threshold cryptography for IP address assigning in network , 2017 .

[24]  P. Manimegalai,et al.  Content arrangement characteristic based encryption in cloud using public auditing for data management , 2017 .

[25]  Naresh Vurukonda,et al.  A secure attribute-Based encryption scheme in cloud computing , 2018 .

[26]  Joy Paulose,et al.  Multi-key Modified Tiny Encryption Algorithm for HealthCare , 2018 .

[27]  K Latha Enforcing security in cloud environment using elliptic curve cryptography and third party auditing , 2018 .