Most Read Research Articles


Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79

Warning: Creating default object from empty value in /var/www/html/sandbox.ijcaonline.org/public_html/modules/mod_mostread/helper.php on line 79
Call for Paper - May 2015 Edition
IJCA solicits original research papers for the May 2015 Edition. Last date of manuscript submission is April 20, 2015. Read More

Data Encryption Techniques for USB

Print
PDF
International Journal of Computer Applications
© 2014 by IJCA Journal
Volume 104 - Number 7
Year of Publication: 2014
Authors:
Shivanku Mahna
Sravan Ch
10.5120/18213-9162

Shivanku Mahna and Sravan Ch. Article: Data Encryption Techniques for USB. International Journal of Computer Applications 104(7):14-17, October 2014. Full text available. BibTeX

@article{key:article,
	author = {Shivanku Mahna and Sravan Ch},
	title = {Article: Data Encryption Techniques for USB},
	journal = {International Journal of Computer Applications},
	year = {2014},
	volume = {104},
	number = {7},
	pages = {14-17},
	month = {October},
	note = {Full text available}
}

Abstract

Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast data transfer speeds, about as large as 5Gbps. Host controlled USB is the fastest way of transferring material to an external device available today. It is easy, convenient and fast to access these USB devices as compared to other external devices such as CD, DVD, Floppy drive etc. USB is easy to use as they're plug and play devices and do not require any additional installation. The other big advantage of USB is that the data transmission is done at the same speeds, irrespective of the size of the data being copied. Thus USB and USB devices have become most popular interface standard for hardware connection. USB devices however lacks in security as any user can access the USB device and the data associated with it, leaving the data at huge potential risk. Thus to make the system more reliable and fast, we propose methods namely, Mutual Encryption and Key Match in order to provide security to the sensitive information on the device as well as to make the transactions or communication done using USB more encrypted.

References

  • Gustavus J. Simmons,1979. "Symmetric and Asymmetric Encryption" in Computing Surveys, Vol. 11, No. 4, December 1979 edition.
  • E. V. Vetvitskii, A. V. Plotnikov, D. A. Prilutskii, S. V. Selishchev, "Use of the USB Universal Serial Bus in computer systems", ,Springer online journal, July–August edition, 2000, Volume 34, Issue 4, pp 167-172
  • W. Diffie and M. Hellman,1976. "New directions in cryptography", IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654,1976.
  • Chul-Joon Choi, Zeen Kim and Kwangjo Kim "Schnorr Signature Scheme with Restricted Signing Capability and Its Application".
  • Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar Reddy and Dr B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity", International Journal of Computer Science and Network Security, VOL. 8 No. 3, March 2008.
  • T. A. El Gamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
  • Lu Zhu, Sheng Yu and Xing Zhang, 2008. "Improvement Upon Mutual Password Authentication Scheme", 978-0-7695-3560-9/08 IEEE DOI 10. 1109/ISBIM, 2008.