One Time Pad Encryption Technique in Cryptography

Authors

  • Alle Bhavana Kumari Sreenidhi Institute of Science and Technology, Yamnampet,Ghatkesar, Hyderabad (T.G), India
  • HalavathBalaji Sreenidhi Institute of Science and Technology, Yamnampet,Ghatkesar, Hyderabad (T.G), India
  • N Ch S N Iyengar Sreenidhi Institute of Science and Technology, Yamnampet,Ghatkesar, Hyderabad (T.G), India

Keywords:

Cloud Computing, Cryptography, One-Time Pad (OTP)

Abstract

Cloud Computing is a term that is used for the provision of host services over the Internet The secure data storage on cloud environments is the primary requirement of such applications, where data are being transferred or transmitted between the servers and their users. The existing paper consists of a text steganography approach for hiding loaded secret English text file in a cover English text file which is less confidential. In this paper we are using one of the most effective technique for secure communicating is cryptography in cloud. Cryptography involves the creation of codes written or generated that allow secrecy of information. To ensure security of data in cloud computing, this paper presents  an encryption technique called One  Time Pad(OTP).The one time pad (OTP) is an uncrack able encryption technique, but it requires the use of a shared key of the same size as, or longer than, the message sent. The proposed system offers information theoretic security, data hiding capacity

References

Rubin, F. (1996). One-time pad cryptography. Cryptologia, 20(4), 359-364.

Upadhyay, G., & Nene, M. J. (2016, May). One time pad generation using quantum superposition states. In 2016 IEEE International Conference on Recent Trends in Electronics, Information & Communication Technology (RTEICT) (pp. 1882-1886). IEEE.

Iqbal, M., Pane, M. S., & Siahaan, A. P. U. (2016). SMS Encryption Using One-Time Pad Cipher. IOSR J. Comput. Eng, 18(6), 54-58.

Widiasari, I. R. (2012). Combining advanced encryption standard (AES) and one time pad (OTP) encryption for data security. International Journal of Computer Applications, 57(20).

Ahmed, S. T., & Basha, S. M. (2022). Information and Communication Theory-Source Coding Techniques-Part II. MileStone Research Publications.

Wang, X., Wang, Y., Zhu, X., & Luo, C. (2020). A novel chaotic algorithm for image encryption utilizing one-time pad based on pixel level and DNA level. Optics and Lasers in Engineering, 125, 105851.

Deepa, B., & Maheswari, V. (2022, January). An enhanced DNA structure for one-time pad together with graph labeling techniques. In AIP Conference Proceedings (Vol. 2385, No. 1, p. 130045). AIP Publishing LLC.

Basha, S. M., Ahmed, S. T., & Naidu, S. K. M. (2022). Artificial Intelligence: Practical Approach (Vol. 1). MileStone Research Publications.

Ragaventhiran, J., Vigneshwaran, P., Kodabagi, M. M., Ahmed, S. T., Ramadoss, P., & Megantoro, P. (2022). AN UNSUPERVISED MALWARE DETECTION SYSTEM FOR WINDOWS BASED SYSTEM CALL SEQUENCES. Malaysian Journal of Computer Science, 79-92.

Kuang, R., & Barbeau, M. (2022). Quantum permutation pad for universal quantum-safe cryptography. Quantum Information Processing, 21(6), 1-22.

Downloads

Published

2023-01-11

How to Cite

Alle Bhavana Kumari, HalavathBalaji, & N Ch S N Iyengar. (2023). One Time Pad Encryption Technique in Cryptography. International Journal of Computational Learning & Intelligence, 2(1), 1–7. Retrieved from https://milestoneresearch.in/JOURNALS/index.php/IJCLI/article/view/52

Issue

Section

RESEARCH ARTICLES