4.6 Article

Two-Layer Security Algorithms to Prevent Attacks on Data in Cyberspace

Journal

APPLIED SCIENCES-BASEL
Volume 12, Issue 19, Pages -

Publisher

MDPI
DOI: 10.3390/app12199736

Keywords

cryptography; Vigenere cipher; security; prevention; two-layer; cipher; attacks; data leakage

Funding

  1. Majmaah University [R-2022-288]
  2. Almaarefa University, Riyadh, Saudi Arabia [2021-27]

Ask authors/readers for more resources

This paper investigates the issue of data protection in cloud computing, proposing an efficient encryption algorithm to enhance data security and address the challenge of attackers decrypting encrypted data. The research utilizes a two-layer encryption approach to improve data security. A comparison of different studies and technologies is conducted, leading to conclusions based on the results.
The ratio at which the number of users is increasing in cloud computing, the same as the number of data destruction, has doubled. Various algorithms have been designed to secure cloud servers to prevent an attacker from attacking, but they cannot protect the data. With the help of cryptography, data are converted into a format that is difficult for an attacker to understand, and these data can be broadcasted in a reliable format. If the attacker obtains access to the cryptographic algorithm, then the attacker can easily decrypt the data, but if the data are encrypted with the help of the key, it is difficult for the attacker to decrypt the data without the key. When the data are encrypted with the same key at different times, there is a possibility to obtain the actual key with the help of the Kasiski test. Different researchers have encrypted the data with the help of the same key or have developed an algorithm by combining different algorithms, which is a problem. This paper developed an efficient algorithm that cannot be broken easily. Even if an attacker obtains access to the algorithm, the attacker cannot identify the keys derived from that text, and the key only works in the text from which it is generated, which is the novelty of this paper. Data are secured in two different layers. In Layer-1, the proposed algorithm implements plaintext and a static key to obtain the encrypted text and a Vigenere key. In Layer-2, the encrypted text and the Vigenere key are implemented on the Vigenere cipher algorithm to obtain the ciphertext. At the end of the paper, a comparison of different papers is made with the proposed paper, and a conclusion is made based on different techniques and results.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available