Journal of Cybersecurity and Information Management

Journal DOI

https://doi.org/10.54216/JCIM

Submit Your Paper

2690-6775ISSN (Online) 2769-7851ISSN (Print)

Volume 14 , Issue 2 , PP: 287-299, 2024 | Cite this article as | XML | Html | PDF | Full Length Article

Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications

K. Jayakumar 1 * , K. Sivakami 2 * , P. Logamurthy 3 , P. Sathiyamurthi 4 , N. Chandrasekaran 5

  • 1 Professor, Department of EEE, J.J. College of Engineering and Technology, Trichy - 620 009, India - (rkjkumar70@gmail.com)
  • 2 Assistant Professor, Department of ECE, Nehru Institute of Engineering and Technology Coimbatore – 641105, India - (ksivakaamii@gmail.com)
  • 3 Assistant Professor, Department of Electronics and Communication Engineering, Nandha Engineering College, Erode, India - (logamurthyp@gmail.com)
  • 4 Associate Professor, Department of Electronics and Communication Engineering, Bannari Amman Institute of Technology, Sathyamangalam-638401, Erode District Tamil Nadu, India - (sathyamurthi.bit@gmail.com)
  • 5 Professor, Department of EEE, PSNA College of Engineering and Technology, Dindigul-624622, Tamil Nadu, India - (chandrasekaran283@gmail.com)
  • Doi: https://doi.org/10.54216/JCIM.140220

    Received: January 20, 2024 Revised: March 29, 2024 Accepted: July 08, 2024
    Abstract

    In the digital age, the safeguarding of information through effective cybersecurity measures is paramount. This paper presents the development of a robust cryptographic model tailored for cybersecurity applications. The background underscores the increasing prevalence of cyber threats and the necessity for advanced encryption techniques to ensure data confidentiality, integrity, and authenticity. The methodology involves the design and implementation of the cryptographic model using state-of-the-art algorithms and protocols. Rigorous testing and evaluation were conducted to assess the model's performance in various cyber environments. The results indicate that the proposed model significantly enhances security, demonstrating high resistance to common cyber-attacks with an average encryption time of 0.5 seconds for a 1MB file and a decryption accuracy rate of 99.9%. The model also achieved a data integrity verification success rate of 99.8% and an overall system efficiency improvement of 45% compared to existing models. The conclusion highlights the model's effectiveness and potential for broad application in securing digital communication, offering a substantial contribution to the field of cybersecurity.

    Keywords :

    Cryptographic Model , Cybersecurity , Data Confidentiality , Data Integrity , Encryption Techniques , Security Threats , Digital Communication , Cryptographic Protocols , Cyber Attacks , Data Protection

    References

    [1]          Sharma, N. (2017). A Review of Information Security using Cryptography Technique. International Journal of Advanced Research in Computer Science8(4).

    [2]          Devi, T. R. (2013, April). Importance of cryptography in network security. In 2013 International conference on communication systems and network technologies (pp. 462-467). IEEE.

    [3]          Thabit, F., Can, O., Aljahdali, A. O., Al-Gaphari, G. H., & Alkhzaimi, H. A. (2023). Cryptography algorithms for enhancing IoT security. Internet of Things, 22, 100759.

    [4]          Abood, O. G., Elsadd, M. A., & Guirguis, S. K. (2017, December). Investigation of cryptography algorithms used for security and privacy protection in smart grid. In 2017 Nineteenth International Middle East Power Systems Conference (MEPCON) (pp. 644-649). IEEE.

    [5]          Skarmeta, A. F., Hernandez-Ramos, J. L., & Moreno, M. V. (2014, March). A decentralized approach for security and privacy challenges in the internet of things. In 2014 IEEE world forum on Internet of Things (WF-IoT) (pp. 67-72). IEEE.

    [6]          Chenthara, S., Ahmed, K., Wang, H., & Whittaker, F. (2019). Security and privacy-preserving challenges of e-health solutions in cloud computing. IEEE access, 7, 74361-74382.

    [7]          Perumal, Ramani. , Bharathi, Subbiah. A Machine Learning Approach for Automated Detection and Classification of Cracks in Ancient Monuments using Image Processing Techniques. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 214-238. DOI: https://doi.org/10.54216/JCIM.140215.

    [8]          Al-Shareeda, M. A., Anbar, M., Manickam, S., Khalil, A., & Hasbullah, I. H. (2021). Security and privacy schemes in vehicular ad-hoc network with identity-based cryptography approach: A survey. IEEE Access, 9, 121522-121531.

    [9]          Sivasangari, A., Ananthi, A., Deepa, D., Rajesh, G., & Raajini, X. M. (2021). Security and privacy in wireless body sensor networks using lightweight cryptography scheme. In Security and privacy issues in IoT devices and sensor networks (pp. 43-59). Academic press.

    [10]       Van Dijk, M., & Juels, A. (2010). On the impossibility of cryptography alone for {Privacy-Preserving} cloud computing. In 5th USENIX Workshop on Hot Topics in Security (HotSec 10).

    [11]       Ramya, P..., Chandra, Himagiri. Advanced Cyber Attack Detection Using Generative Adversarial Networks and NLP. Journal of Journal of Cybersecurity and Information Management, vol. 14, no. 2, 2024, pp. 161-172. DOI: https://doi.org/10.54216/JCIM.140211.

    [12]       Abdul, W., Ali, Z., Ghouzali, S., & Alsulaiman, M. (2017). Security and privacy for medical images using chaotic visual cryptography. Journal of Medical Imaging and Health Informatics, 7(6), 1296-1301.

    [13]       Abdul, W., Ali, Z., Ghouzali, S., & Alsulaiman, M. (2017). Security and privacy for medical images using chaotic visual cryptography. Journal of Medical Imaging and Health Informatics, 7(6), 1296-1301.

    [14]       Barni, M., Droandi, G., & Lazzeretti, R. (2015). Privacy protection in biometric-based recognition systems: A marriage between cryptography and signal processing. IEEE Signal Processing Magazine, 32(5), 66-76.

    [15]       Sarma, S. E., Weis, S. A., & Engels, D. W. (2002, August). RFID systems and security and privacy implications. In International workshop on cryptographic hardware and embedded systems (pp. 454-469). Berlin, Heidelberg: Springer Berlin Heidelberg.

    [16]       Ahmad, N. (2009). Restrictions on cryptography in India–A case studyof encryption and privacy. Computer Law & Security Review, 25(2), 173-180.

    [17]       Zeng, K., Govindan, K., & Mohapatra, P. (2010). Non-cryptographic authentication and identification in wireless networks [security and privacy in emerging wireless networks]. IEEE Wireless Communications, 17(5), 56-62.

    Cite This Article As :
    , K.. , , K.. , , P.. , , P.. , , N.. Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications. Journal of Cybersecurity and Information Management, vol. , no. , 2024, pp. 287-299. DOI: https://doi.org/10.54216/JCIM.140220
    , K. , K. , P. , P. , N. (2024). Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications. Journal of Cybersecurity and Information Management, (), 287-299. DOI: https://doi.org/10.54216/JCIM.140220
    , K.. , K.. , P.. , P.. , N.. Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications. Journal of Cybersecurity and Information Management , no. (2024): 287-299. DOI: https://doi.org/10.54216/JCIM.140220
    , K. , , K. , , P. , , P. , , N. (2024) . Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications. Journal of Cybersecurity and Information Management , () , 287-299 . DOI: https://doi.org/10.54216/JCIM.140220
    K. , K. , P. , P. , N. [2024]. Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications. Journal of Cybersecurity and Information Management. (): 287-299. DOI: https://doi.org/10.54216/JCIM.140220
    , K. , K. , P. , P. , N. "Development of a Cryptographic Model Using Digits Classification for Cyber Security Applications," Journal of Cybersecurity and Information Management, vol. , no. , pp. 287-299, 2024. DOI: https://doi.org/10.54216/JCIM.140220