10.5120/18213-9162 |
Shivanku Mahna and Sravan Ch. Article: Data Encryption Techniques for USB. International Journal of Computer Applications 104(7):14-17, October 2014. Full text available. BibTeX
@article{key:article, author = {Shivanku Mahna and Sravan Ch}, title = {Article: Data Encryption Techniques for USB}, journal = {International Journal of Computer Applications}, year = {2014}, volume = {104}, number = {7}, pages = {14-17}, month = {October}, note = {Full text available} }
Abstract
Universal Serial Bus (USB) external devices are high speed flash/external drives which can boast data transfer speeds, about as large as 5Gbps. Host controlled USB is the fastest way of transferring material to an external device available today. It is easy, convenient and fast to access these USB devices as compared to other external devices such as CD, DVD, Floppy drive etc. USB is easy to use as they're plug and play devices and do not require any additional installation. The other big advantage of USB is that the data transmission is done at the same speeds, irrespective of the size of the data being copied. Thus USB and USB devices have become most popular interface standard for hardware connection. USB devices however lacks in security as any user can access the USB device and the data associated with it, leaving the data at huge potential risk. Thus to make the system more reliable and fast, we propose methods namely, Mutual Encryption and Key Match in order to provide security to the sensitive information on the device as well as to make the transactions or communication done using USB more encrypted.
References
- Gustavus J. Simmons,1979. "Symmetric and Asymmetric Encryption" in Computing Surveys, Vol. 11, No. 4, December 1979 edition.
- E. V. Vetvitskii, A. V. Plotnikov, D. A. Prilutskii, S. V. Selishchev, "Use of the USB Universal Serial Bus in computer systems", ,Springer online journal, July–August edition, 2000, Volume 34, Issue 4, pp 167-172
- W. Diffie and M. Hellman,1976. "New directions in cryptography", IEEE Transactions on Information Theory, Vol. 22, No. 6, pp. 644-654,1976.
- Chul-Joon Choi, Zeen Kim and Kwangjo Kim "Schnorr Signature Scheme with Restricted Signing Capability and Its Application".
- Mrs. C. Shoba Bindu, Dr P. Chandra Sekhar Reddy and Dr B. Satyanarayana, "Improved Remote User Authentication Scheme Preserving User Anonymity", International Journal of Computer Science and Network Security, VOL. 8 No. 3, March 2008.
- T. A. El Gamal, "A public-key cryptosystem and a signature scheme based on discrete logarithms", IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472, 1985.
- Lu Zhu, Sheng Yu and Xing Zhang, 2008. "Improvement Upon Mutual Password Authentication Scheme", 978-0-7695-3560-9/08 IEEE DOI 10. 1109/ISBIM, 2008.