scispace - formally typeset
Search or ask a question
Author

H. Santhi

Bio: H. Santhi is an academic researcher from VIT University. The author has contributed to research in topics: Cryptography & Key size. The author has an hindex of 1, co-authored 1 publications receiving 3 citations.

Papers
More filters
Book ChapterDOI
H. Santhi1, P. Gayathri1, Sanskar Katiyar1, G. Gopichand1, Sagarika Shreevastava1 
01 Jan 2019
TL;DR: A modified implementation of DES is proposed to enhance its security with a minimum computational trade-off to ensure maximum security over the channel of communication.
Abstract: The advancements in communication networks and computation over the years have led to a massive volume of data flowing from one place to another. A lot of cryptosystems have been proposed and implemented to keep the channel of communication secure. But with increasingly powerful computers rolling out every day, more and more complicated systems are being built with moderate data overheads to ensure maximum security over the channel. So, in this paper, we briefly discuss the strengths and weaknesses of the three most popular symmetric-key cryptosystems: AES, DES, and 3DES. It has been supported by the various organizations that it with the computers of today, DES can be broken using brute-force attacks in a reasonable amount of time. Given its simple nature of implementation and small key size, we propose a modified implementation of DES to enhance its security with a minimum computational trade-off.

3 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: This paper aims to prove that RC5 algorithm can guarantee a much better level of security and randomness while behaving chaotically, namely when embedded with CBC mode of encryption.
Abstract: In some previous research works, it has been theoretically proven that RC5-CBC encryption algorithm behaves as a Devaney topological chaos dynamical system. This unpre-dictable behavior has been experimentally illustrated through such sensitivity tests analyses encompassing the avalanche effect phenomenon evaluation. In this paper, which is an extension of our previous work, we aim to prove that RC5 algorithm can guarantee a much better level of security and randomness while behaving chaotically, namely when embedded with CBC mode of encryption. To do this, we have began by evaluating the quality of such images encrypted under chaotic RC5-CBC symmetric key encryption algorithm. Then, we have presented the synthesis results of an hardware architecture that implements this chaotic algorithm in FPGA circuits.

5 citations

Book ChapterDOI
01 Jan 2020
TL;DR: In this paper, a secure health center management application where the authenticated user will only have access to the information and communication between the entities will be secured by AES and DES algorithm is proposed, the proposed system shows that it protects the privacy of individual and for encryption and decryption of medical reports AES shows better performance over DES.
Abstract: Faster developments in handheld devices, internet connectivity and easy and fast access to information has always been helpful to human being all over globe. These developments in technology had opened gates for everyone to enter this information superhighway, however this information superhighway must not have a data which is private to someone, especially the data in hospitals run by government where thousands of patients visit every day. Hospitals have information such as medical prescription and reports such as pathology, x-ray, electrocardiogram, blood sugar, blood pressure, vision correction to name the few. This information needs to be secured and only the intended recipient should get the report, To solve this issue this paper proposes a secure health center management application where the authenticated user will only have access to the information and communication between the entities will be secured by AES and DES algorithm. In this paper an attempt is made to secure communication between entities along with encrypting medical information. Implementation of the proposed system shows that it protects the privacy of individual and for encryption and decryption of medical reports AES shows better performance over DES.

4 citations