• DocumentCode
    230893
  • Title

    Comparative analysis of NPN algorithm & DES Algorithm

  • Author

    Sharma, Mukesh ; Garg, R.B. ; Dwivedi, Shipra

  • Author_Institution
    TMU, Moradabad, India
  • fYear
    2014
  • fDate
    8-10 Oct. 2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Various sectors such as such as the retail, hospitality, banking and financial introduced information technology years back. Ongoing enhancements have always offered a wider scope of growth to these sectors. Zooming in the Banking & Financial sector most banks are now offering the Online banking services. The objectives of introducing the e-banking services were profits, fast service, improved productivity, customer satisfaction, 24×7 operations & cost savings. As much the growth of internet probes the customers to use the new online services & banks to offer the same; equally it makes the customers & business skeptical about the security being implemented. The business needs to ensure the security of each electronic transaction over the internet. Critical areas to focus for this are secure communication channel, third party for database maintenance & a robust non-breachable data encryption technique. Any online transaction constitutes of confidential data. Any damage to that data or hacking of that data may bring significant amount of loss to both the parties involved. Cryptography is a widely used science for secret writing. Encryption is one process of secret writing. The process involves a key and an algorithm to generate a Cipher text (secret code) from a plain text. On the other hand, decryption helps to retrieve the original text using the same key. Now what is the key here? The Key is the core string (word) being used in the algorithm. It is kept private. Cryptography has classified the keys being used in the process as Symmetric & Asymmetric. Symmetric key algorithms are most commonly used type where a single key is used for both encryption and decryption [4]. In asymmetric key algorithms different keys are used both for encryption and decryption. This paper highlights on designing & implementing a symmetric key encryption algorithm for securing the online transactions using the concept of Multithreading to optimi- e the time. The work has been implemented using JDK 1.6 as the programming environment. A comparative analysis of DES and the proposed algorithm has been depicted with the help of table and various graphs.
  • Keywords
    bank data processing; computer crime; cryptography; customer satisfaction; data privacy; multi-threading; DES algorithm; JDK 1.6; NPN algorithm; banking sector; cipher text; comparative analysis; confidential data; cost savings; cryptography; customer satisfaction; database maintenance; e-banking services; electronic transaction; encryption; financial sector; hacking; information technology; multithreading; online banking services; online transaction; plain text; productivity; programming environment; robust nonbreachable data encryption technique; secret writing; secure communication channel; symmetric key encryption algorithm; Algorithm design and analysis; Ciphers; Encryption; Java; Multithreading; Cipher Text; Cryptography; DES; Decryption; Encryption; Multithreading; NPN; Plain Text; Symmetric & Asymmetric Cryptography;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Reliability, Infocom Technologies and Optimization (ICRITO) (Trends and Future Directions), 2014 3rd International Conference on
  • Conference_Location
    Noida
  • Print_ISBN
    978-1-4799-6895-4
  • Type

    conf

  • DOI
    10.1109/ICRITO.2014.7014688
  • Filename
    7014688