Acta Scientific Computer Sciences

Research Article Volume 5 Issue 3

Encryption: A Threat to Cyber Attack

Anushka Sharma*

School of Electrical and Electronics Engineering, Vellore Institute of Technology Chennai, Tamilnadu, India

*Corresponding Author: Anushka Sharma, School of Electrical and Electronics Engineering, Vellore Institute of Technology Chennai, Tamilnadu, India.

Received: January 11, 2023; Published: February 02, 2023

Abstract

Data security and privacy are the most critical parts of any organization. In this digitalization era, we live in a world where data is maintained through various software without human intervention. Social networking sites are a fundamental part of our day-to-day life, where people can not only have conversations. Still, they can share their data without hesitation, but they are unaware that cyber-criminals can continue to focus on these social platforms to steal all sorts of personal data. Not only in social media but bank transactions too, which are taking place online nowadays, an individual must ensure all kinds of security measures to keep hackers away from crucial data. Encryption is a method of transforming all sorts of data into secret code which no one, including eavesdroppers or hackers, can easily scan. In this method, all kinds of messages, data, and information can be turned into cipher text which, with the help of a shared key, is scanned or specified; however, the message has to be encoded for this method to get implemented. With the help of the encryption method, we can use specific hidden secret codes that can only be accessed by the authorized user and will remain out of reach for the hackers. Even if the hacker succeeds in cracking the password still, accessing the target data will be much more difficult as he will be required to crack several codes necessary for accessing different folders before reaching the target folder (misleading the hacker from the target file) and to make the things worse for the hacker/attacker, a time limit is applied on the target folder after which the attacker can be thrown out of the system. The system itself can identify the attacker from the authorized user.
Once the attacker is thrown out of the system, the password gets changed automatically so the hacker can no longer enter the system using the hacked password.

Keywords: Digitalization; Cipher; Cyber-criminals; Encryption; Secret Code

References

  1. S Zhang., et al. “A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity”. in IEEE Access 8 (2020): 128250-128263.
  2. N Floissac and Y L'Hyver. "From AES-128 to AES-192 and AES-256, How to Adapt Differential Fault Analysis Attacks on Key Expansion”. 2011 Workshop on Fault Diagnosis and Tolerance in Cryptography (2011): 43-53.
  3. Ritambhara A Gupta and M Jaiswal. "An enhanced AES algorithm using cascading method on 400 bits key size used in enhancing the safety of next generation internet of things (IOT)”. 2017 International Conference on Computing, Communication and Automation (ICCCA) (2017): 422-427.
  4. L Yu., et al. “AES Design Improvements Towards Information Security Considering Scan Attack”. 2018 17th IEEE International Conference on Trust, Security And Privacy In Computing And Communications/12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) (2018): 322-326.
  5. H Sun., et al. “oPass: A User Authentication Protocol Resistant to Password Stealing and Password Reuse Attacks”. in IEEE Transactions on Information Forensics and Security 7.2 (2012): 651-663.
  6. H R G Cacacho., et al. “Breaking the Password Security Standards Using Offline Attacks and Public User Attributes”. 2019 IEEE 11th International Conference on Humanoid, Nanotechnology, Information Technology, Communication and Control, Environment, and Management (HNICEM) (2019): 1-5.
  7. C Routh., et al. “Attacks and vulnerability analysis of e-mail as a password reset point”. 2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) (2018): 1-5.
  8. E Sachdeva and S P Mishra. "Improving method of correcting AES Keys obtained from coldboot attack”. 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT) (2015): 1-8.
  9. G Yendamury and N Mohankumar. "Defense in Depth approach on AES Cryptographic Decryption core to Enhance Reliability”. 2021 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS) (2021): 1-7.
  10. jigsaw academy (n.d.).
  11. enzoic (n.d.)
  12. (n.d.).
  13. (n.d.).
  14. (n.d.). edureka.
  15. cobb, m. (n.d.). TechTarget.
  16. F Skopik and S Filip. "Design principles for national cyber security sensor networks: Lessons learned from small-scale demonstrators”. 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) (2019): 1-8.
  17. Meghna Manoj Nair., et al. “Medical Cyber Physical Systems and Its Issues”. Procedia Computer Science 165 (2019): 647-655.
  18. Amit Kumar Tyagi and G Aghila. "A Wide Scale Survey on Botnet". International Journal of Computer Applications9 (2011): 9-22.
  19. Amit Kumar Tyagi. Article: Cyber Physical Systems (CPSs) – Opportunities and Challenges for Improving Cyber Security. International Journal of Computer Applications 137.14 (2016): 19-27, March 2016. Published by Foundation of Computer Science (FCS), NY, USA.
  20. G Rekha., et al. “Intrusion Detection in Cyber Security: Role of Machine Learning and Data Mining in Cyber Security". Advances in Science, Technology and Engineering Systems Journal3 (2020): 72-81.
  21. S Mishra and A K Tyagi. "Intrusion Detection in Internet of Things (IoTs) Based Applications using Blockchain Technolgy”. 2019 Third International conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC) (2019): 123-128.
  22. Amit Kumar Tyagi., et al. “AARIN: Affordable, Accurate, Reliable and Innovative Mechanism to Protect a Medical Cyber-Physical System using Blockchain Technology". IJIN 2 (2021): 175-183.
  23. Amit Kumar Tyagi. Handbook of Research on Technical, Privacy, and Security Challenges in a Modern World”. IGI Global (2022).
  24. Khushboo Tripathi., et al. “Comparison of reactive and proactive routing protocols for different mobility conditions in WSN”. In Proceedings of the 2011 International Conference on Communication, Computing and Security (ICCCS '11). Association for Computing Machinery, New York, NY, USA (2011): 156-161.
  25. Jajula SK., et al. “Review of Detection of Packets Inspection and Attacks in Network Security”. In: Dutta, P., Chakrabarti, S., Bhattacharya, A., Dutta, S., Piuri, V. (eds) Emerging Technologies in Data Mining and Information Security. Lecture Notes in Networks and Systems, vol 491. Springer, Singapore (2023).
  26. Ranchhodbhai PN and Tripathi K. “Identifying and Improving the Malicious Behavior of Rushing and Blackhole Attacks using Proposed IDSAODV Protocol”. International Journal of Recent Technology and Engineering 3 (2019): 6554-6562.
  27. Midha S, Tripathi K, Sharma MK. Practical Implications of Using Dockers on Virtualized SDN”. Webology (2020): 312-330.
  28. D Agarwal and K. Tripathi. "A Framework for Structural Damage detection system in automobiles for flexible Insurance claim using IOT and Machine Learning”. 2022 International Mobile and Embedded Technology Conference (MECON) (2022): 5-8.
  29. S Midha., et al. “Cloud deep down — SWOT analysis”. 2017 2nd International Conference on Telecommunication and Networks (TEL-NET) (2017): 1-5.
  30. K Somisetti., et al. “Design, Implementation, and Controlling of a Humanoid Robot”. 2020 International Conference on Computational Performance Evaluation (ComPE) (2020): 831-836.
  31. Sai GH., et al. “Internet of Things-Based e-Health Care: Key Challenges and Recommended Solutions for Future”. In: Singh, P.K., Wierzchoń, S.T., Tanwar, S., Rodrigues, J.J.P.C., Ganzha, M. (eds) Proceedings of Third International Conference on Computing, Communications, and Cyber-Security. Lecture Notes in Networks and Systems (2023): 421. Springer, Singapore.
  32. S Subasree., et al. “Combining the advantages of radiomic features based feature extraction and hyper parameters tuned RERNN using LOA for breast cancer classification”. Biomedical Signal Processing and Control 72 (2022): 103354.
  33. Kumari S and Muthulakshmi P. “Transformative Effects of Big Data on Advanced Data Analytics: Open Issues and Critical Challenges”. Journal of Computer Science6 (2022): 463-479.
  34. Somisetti K., et al. “Design, Implementation, and Controlling of a Humanoid Robot”. 2020 International Conference on Computational Performance Evaluation (ComPE) (2022): 831-836.
  35. S Midha and K Triptahi. "Extended TLS security and Defensive Algorithm in OpenFlow SDN”. 2019 9th International Conference on Cloud Computing, Data Science and Engineering (Confluence) (2019): 141-146.
  36. Midha S and Tripathi K. “Extended Security in Heterogeneous Distributed SDN Architecture”. In: Hura, G., Singh, A., Siong Hoe, L. (eds) Advances in Communication and Computational Technology. Lecture Notes in Electrical Engineering 668 (2021).
  37. Midha S and Tripathi K. “Remotely Triggered Blackhole Routing in SDN for Handling DoS”. In: Dutta, M., Krishna, C., Kumar, R., Kalra, M. (eds) Proceedings of International Conference on IoT Inclusive Life (ICIIL 2019), NITTTR Chandigarh, India. Lecture Notes in Networks and Systems 116 (2019). Springer, Singapore.
  38. Mapanga V., et al. “Design and implementation of an intrusion detection system using MLP-NN for MANET”. 2017 IST-Africa Week Conference (IST-Africa) (2017): 1-12.
  39. Tyagi AK. “Data Science and Data Analytics: Opportunities and Challenges (1st)”. Chapman and Hall/CRC (2021).
  40. Tyagi AK and Abraham A. “Recurrent Neural Networks (1st)”. CRC Press (2022).
  41. Tyagi AK and Abraham A. “Recent Trends in Blockchain for Information Systems Security and Privacy (1st)”. CRC Press (2021).
  42. Kumar Tyagi A., et al. “Security and Privacy-Preserving Techniques in Wireless Robotics (1st)”. CRC Press (2021).
  43. Tyagi A K., et al. “Opportunities and Challenges for Blockchain Technology in Autonomous Vehicles”. IGI Global (2021).
  44. Tyagi A K. “Multimedia and Sensory Input for Augmented, Mixed, and Virtual Reality”. IGI Global (2021).
  45. Malik S., et al. “Impact and Role of Digital Technologies in Adolescent Lives”. IGI Global (2022).

Citation

Citation: Anushka Sharma. “Encryption: A Threat to Cyber Attack". Acta Scientific Computer Sciences 5.3 (2023): 03-11.

Copyright

Copyright: © 2023 Anushka Sharma. This is an open-access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.




Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is November 25, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US








Metrics

Acceptance rate35%
Acceptance to publication20-30 days

Indexed In




Subscribe to our newsletter



News and Events


  • Certification for Review
    Acta Scientific certifies the Editors/reviewers for their review done towards the assigned articles of the respective journals.
  • Submission Timeline for Upcoming Issue
    The last date for submission of articles for regular Issues is November 25, 2024.
  • Publication Certificate
    Authors will be issued a "Publication Certificate" as a mark of appreciation for publishing their work.
  • Best Article of the Issue
    The Editors will elect one Best Article after each issue release. The authors of this article will be provided with a certificate of "Best Article of the Issue"
  • Welcoming Article Submission
    Acta Scientific delightfully welcomes active researchers for submission of articles towards the upcoming issue of respective journals.

Contact US