International Research Journal of Engineering and Technology (IRJET)
e-ISSN: 2395-0056
Volume: 11 Issue: 04 | Apr 2024
p-ISSN: 2395-0072
www.irjet.net
A Comprehensive Platform for Symmetric and Asymmetric Cryptographic Algorithms: Bridging Ancient and Modern Encryption Techniques Prathamesh L. Khandelwal1, Prof. Pallavi H. Dhole2, Khushi R. Kawanpure3 , Pranoti P. Pohokar4 , Puja R. Jadhav5,Tanay A. Nanglia6 1Student, Sipna College of Engineering and Technology, Maharashtra, India 2Assistant Professor, Sipna College of Engineering and Technology, Maharashtra, India 3Student, Sipna College of Engineering and Technology, Maharashtra, India 4Student, Sipna College of Engineering and Technology, Maharashtra, India 5Student, Sipna College of Engineering and Technology, Maharashtra, India 6Student, Sipna College of Engineering and Technology, Maharashtra, India
---------------------------------------------------------------------***------------------------------------------------------------------both the symmetric as well as Asymmetric key Abstract - The study presents a comprehensive exploration of cryptographic techniques, tracing their evolution from ancient historical periods to contemporary technological advancements. Motivated by the need for a versatile platform encompassing both symmetric and asymmetric encryption algorithms, our research introduces a standalone application designed to serve as a unified hub for cryptographic operations. This platform integrates major encryption modes, including Caesar Cipher, AES Algorithm, Modified Caesar Cipher, and RSA, alongside two proprietary algorithms, namely the Arithmetic No Key Algorithm and Bit Manipulation Algorithm. Leveraging modular development principles and the Java Cryptographic Extension Framework, the application exhibits enhanced flexibility and usability, catering to users ranging from cryptography enthusiasts to professionals. By using Dynamic Loading, the application seamlessly ties together diverse cryptographic tools, promoting worldwide awareness of cryptography and its applications. Through a holistic approach, our research endeavors to bridge classic and modern cryptographic methods, thereby fostering a deeper understanding and appreciation of the intricacies of encryption and decryption techniques in today's digital landscape. Key Words: [Symmetric Key Cryptography, Modified Caesar Cipher, AES, RSA, Arithmetic No Key, Bit Manipulation Fixed Key]
INTRODUCTION As Technique of Encryption and decryption is not very hard to understand because we already using different encryption methods to transfer our message since from Ancient historical Period to today’s technological era. Here we are providing platform for © 2024, IRJET
|
Impact Factor value: 8.226
|
cryptographic algorithms specifically keeping its eye on all-in-one encryption standards via incorporating major four encryption modes Caesar Cipher, AES Algorithm, Modified Caesar cipher, RSA. Six Algorithms we have inserted here out of which two are indigenously made named as Arithmetic No Key Algorithm and Bit Manipulation Algorithm. Motivation for building this project comes from software Engineering Project where we come up with lots of ideas and finally, we finalize this topic.
As there are lots of cryptographic tools and website are available in the world of Cryptography but we are trying to make one such mechanism where we can tie both the symmetric and asymmetric key algorithms with each other by using Dynamic Loading. It is a StandAlone Application which can perform multiple Encryption via using Java (JDK 21 and above). This Stand-Alone Application system that aims enhancing worldwide awareness of cryptography and its uses; JAVA Cryptographic extension Framework is the base of these proposed system mechanism. In this application we have used modular development hence flexibility of application is increased. Combined efforts have led to the development of a Stand-alone application that shows several classic and modern methods of cryptography, amongst which: Caesar ciphers and various methods of cryptanalysis.
I. Literature Review
“THE HANDBOOK ON APPLIED CRYPTOGRAPHY” has given a brief account on cryptographic tool working and uses [1].
ISO 9001:2008 Certified Journal
|
Page 2120