scispace - formally typeset
Search or ask a question
Author

Sitesh Kumar Sinha

Bio: Sitesh Kumar Sinha is an academic researcher. The author has contributed to research in topics: Encryption & Cryptography. The author has an hindex of 6, co-authored 15 publications receiving 74 citations.

Papers
More filters
Proceedings ArticleDOI
05 May 2017
TL;DR: A review of the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network.
Abstract: In today's world one of the most severe threat to computer security is the illegal intrusion into a computer system. As the network applications are growing rapidly, new sort of network attacks are rising continuously. The intrusion detection system IDS is used for the detection of the intrusion activity extends over the public network. IDS may need to deal with different audit record format. IDS have turn out to be essential security tool for detecting the attacks on computer network and resources. Due to this, we presented a review (general study) on IDS. First, we will discuss about intrusion detection later will discuss the type of IDS. We have emphasize on the range of type of IDS like anomaly, misuse, host based, network based and hybrid IDS, specifically IDS based on the anomaly or behavior based IDS along with Agent based technology in real network. At last, the contribution of every single type of IDS is described.

27 citations

Journal ArticleDOI
TL;DR: This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used, which provides better speed in comparison to existing algorithms for large size of files with less overhead.
Abstract: This work uses enhanced symmetric key encryption algorithm, in which same structure of encryption and decryption procedure algorithm is used. In conventional encryption methods the key for encryption and decryption is same and remain secret. The algorithm uses key generation method by random number in algorithm for increasing efficiency of algorithm. The algorithm use key size of 512 bits for providing better security and it also provide the concept of internal key generation at receiver end on the basis of 512 bits key which will entered by the sender. This internal key will store in the sender end database and send to the receiver end by other path for preventing brute force attack and other harmful attacks on security. This algorithm is more efficient for large data where existing algorithms provides efficient encryption and decryption only for 2MB data. This work provides better speed in comparison to existing algorithms for large size of files with less overhead.

22 citations

Journal ArticleDOI
TL;DR: The purpose of the proposed security technique for the confidential data is the high security and quality of the reconstructed cover image.
Abstract: This paper proposes security technique for the confidential data which is the combination of three techniques, first is image compression that is based on wavelet transformation which will compress confidential image and reduce the size of the image, second is cryptography that is based on symmetric key which will encrypt the confidential image, and third is steganography that is based on least significant bit (LSB) which will embedded encrypted information inside a cover image. Therefore the purpose of the proposed technique is the high security and quality of the reconstructed cover image.

20 citations

Journal ArticleDOI
TL;DR: The results indicate that heavy application of nitrogen, and to a lesser extent phosphorus, enhanced the formation of flower buds but curtailed the development of flowers and fruits.
Abstract: The influence of varying levels of nitrogen, phosphorus, and pH on the reproductive characters of flax (Linum usitatissimum) grown m sand cultures was investigated. The fertility of the plants was calculated by taking total ovule number and seeds produced into consideration. The results indicate that heavy application of nitrogen, and to a lesser extent phosphorus, enhanced the formation of flower buds but curtailed the development of flowers and fruits. Fertility level was reduced accordingly.Optimum hydrogen ion concentration for bud, flower, and fruit formation occurred at pH 6. Fertility level was not significantly affected by the pH range. The influence of pH seems to be related to the uptake of nitrogen.

7 citations

Journal ArticleDOI
TL;DR: A new hybrid crypto concept is proposed which is the combination of new symmetric and message digesting function (MD-5) and the performance and strength of proposed algorithm is expected to be better than conventional cryptographic algorithm and highly effective against brute force attack.
Abstract: Because of the defect of only the single data encryption and the use of famous encryption algorithm, which was not improved in traditional methods of the registration process, a combined encryption algorithm is proposed in this paper. That is, the algorithm security is greatly improved, through researching several famous data encryption algorithms, and improving some data encryption algorithms. In this paper, a new hybrid crypto [1, 2, 3] concept is proposed which is the combination of new symmetric and message digesting function (MD-5). Moreover, the security and performance of the proposed technique is calculated and the presented results showing the performance of the proposed technique. Keyword Encryption, Decryption, Security, Image, Cryptography, Pixel. 1. PROPOSED WORK The objective of the proposed work is to design and develop a technique that mediates the user and the operations to achieve security. As known that encryption provides strong security for information at rest. Initially that proposed technique is suitable for small amount of information. The performance and security issues have considered in the proposed work because it all ready known that in real-world scenarios, these are complex issues and experts should be used who understand all available options and the impact for each particular customer environment. This work will prove less query execution times from proposed technique. The objective of proposed work is  Encrypted information should be in unreadable  Proposed concept is extending user authentication  Proposed concept providing security whenever transmitting information from one node to another node because it's important to protect the information whiles it's in transit.  Proposed concept is the design of a new cryptography algorithm for encryption and decryption at user end on user data.  The proposed algorithm is based on a symmetric block cipher.  The performance and strength of proposed algorithm is expected to be better than conventional cryptographic algorithm and highly effective against brute force attack. From the study of previous researches it is observed several limitations despite the promise it holds. Most of the techniques use one operation which is floating point operation. Due to this operation execution time of the process increased. It has been observed in previous techniques that they are not reliable. Implementation of previous techniques is easy in terms of software but hardware implementation is very complicated due to complex architecture [16]. Due to lots of mathematical operations efficiency of existing algorithms has decreased [1, 2, 3, 4 and 5]. Proposed research is the designing and implementation of a new hybrid crypto system. Proposed technique is a method of encryption that combines two or more encryption technique and usually includes a combination of symmetric and message digesting technique [17] to take benefit of the strengths of each type of encryption. Basically there are four security principles “Confidentiality”, “Integrity”, “Authentication”, and “Non-Repudiation” [18, 19 and 20]. In which Symmetric Technique fulfill the concept of Confidentiality, it also provide the performance advantage and therefore is the common solution for encrypting and decrypting performancesensitive data. On the other hand, message digests technique fulfilling the authentication as well as integrity security principle concept to provide better security for cryptographic key [21, 22 and 23]. International Journal of Computer Applications (0975 – 8887) Volume 80 – No3, October 2013 49 Fig. 1:Block diagram of Proposed Hybrid crypto system In the block diagram of proposed hybrid crypto system as show in Fig. 1, plain text encrypted by proposed symmetric encryption algorithm to produced cipher text, then message digesting function is also apply on plain text by using MD-5 [25, 26] to produce message digest of plain text. Now again apply proposed encryption technique on produced message digest text so it will also convert in cipher text. Now combine both Cipher Values (C1 and C2) into one and send to the receiver. At receiver end, separate both cipher (C1 and C2) values and apply proposed decryption algorithm one by one on each cipher value. From first cipher value plain text will get and from second cipher value C2 message digest will get. Then apply message digesting function MD-5[25, 26] on plain text which is produced during decryption to produced message digest. Now finally compare both messages digesting value with each other for changes in message digest. If both message digest are same then plain text securely received otherwise original plain text is tempered by the hacker so drop the whole information. In proposed system including two existing encryption technique and third one is newly design symmetric encryption which is based on block cipher concept and it uses series of logical operation like XOR, Circular Shift (Right, Left) [13, 14, and 15]. It already known that all the selected operation are very simple and very effectively. Due to this reason proposed system is efficient then existing system [6, 7]. Block Diagram of Proposed Encryption/Decryption: To perform encryption approach displace plain text data one by one with its coordinate limits and start performing the encryption process by using logical shift and XOR operation on binary value with key value. Fig. 2 is showing the block diagram of proposed encryption and Fig. 3 is showing the block diagram of proposed decryption. Decryption is just reverse process of encryption. Receiver Side

7 citations


Cited by
More filters
01 Apr 1997
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Abstract: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind. The emphasis is on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity. Topics covered includes an introduction to the concepts in cryptography, attacks against cryptographic systems, key use and handling, random bit generation, encryption modes, and message authentication codes. Recommendations on algorithms and further reading is given in the end of the paper. This paper should make the reader able to build, understand and evaluate system descriptions and designs based on the cryptographic components described in the paper.

2,188 citations

Journal ArticleDOI
TL;DR: This is Applied Cryptography Protocols Algorithms And Source Code In C Applied Cryptographic Protocols algorithms and Source Code in C By Schneier Bruce Author Nov 01 1995 the best ebook that you can get right now online.

207 citations

Journal ArticleDOI
TL;DR: It is determined that the best performance scores for each study were unexpectedly high overall, which may be due to overfitting, and that information on the data cleaning of CSE-CIC-IDS2018 was inadequate across the board, a finding that may indicate problems with reproducibility of experiments.
Abstract: The exponential growth in computer networks and network applications worldwide has been matched by a surge in cyberattacks. For this reason, datasets such as CSE-CIC-IDS2018 were created to train predictive models on network-based intrusion detection. These datasets are not meant to serve as repositories for signature-based detection systems, but rather to promote research on anomaly-based detection through various machine learning approaches. CSE-CIC-IDS2018 contains about 16,000,000 instances collected over the course of ten days. It is the most recent intrusion detection dataset that is big data, publicly available, and covers a wide range of attack types. This multi-class dataset has a class imbalance, with roughly 17% of the instances comprising attack (anomalous) traffic. Our survey work contributes several key findings. We determined that the best performance scores for each study, where available, were unexpectedly high overall, which may be due to overfitting. We also found that most of the works did not address class imbalance, the effects of which can bias results in a big data study. Lastly, we discovered that information on the data cleaning of CSE-CIC-IDS2018 was inadequate across the board, a finding that may indicate problems with reproducibility of experiments. In our survey, major research gaps have also been identified.

94 citations

Journal ArticleDOI
TL;DR: The metabolomics and pathway analysis support the view that OAT1 plays a greater role in kidney proximal tubule metabolism and OAT3 appears relatively more important in systemic metabolism, modulating levels of metabolites flowing through intestine, liver, and kidney.

73 citations