Loading

CryptO’Roulette A Smart Approach To Modern Encryption
Samarth Pralhad Nehe1, Varun Mishra2, P.G.V Sai Karthik3, Atharva Gulhane4, Navyaa Sharma5

1Varun Mishra, Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India.
2Samarth Nehe*, Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India.
3P.G.V Sai Karthik, Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India. 
4Atharva Gulhane, Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India.
5Navyaa Sharma, Department of Computer Science and Engineering, Vellore Institute of Technology, Vellore. (Tamil Nadu), India. 
Manuscript received on 07 March 2022. | Revised Manuscript received on 21 March 2022. | Manuscript published on 30 April 2022. | PP: 77-80 | Volume-11 Issue-4, April 2022. | Retrieval Number: 100.1/ijeat.B33111211221 | DOI: 10.35940/ijeat.B3311.0411422
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: In a symmetric-key cryptosystem, where the secret key is known to both the sender who encrypts the message (let’s call her Alice) and the receiver who decrypts the message (let’s call him Bob). Since the secret key is very important so it cannot be disclosed to any third party that is why it should not be exchanged through any public form of communication because if through any means these keys get leaked all the encrypted messages in the future will be compromised [1].We know that the advent of technology has increased the risks of data thefts and compromising data integrity. So, to secretly exchange the key both the parties must hold some sort of private meeting, therefore they need to establish some private communication channel. This is a difficult task practically speaking in terms of internet communications. [6] These days, the utilization of the Internet is developing quickly throughout the planet, and security is turning into a significant public concern. Already security was a significant issue for military applications yet presently the application region has been improved as more correspondence happens on the web. Cryptography is a computer science platform intended to give security to senders and receivers to communicate and recover secret data about an uncertain channel through a cycle called Encryption/Decryption. Cryptography guarantees that the message ought to be sent without change and that only authorized individuals can open and peruse the message [10].In this paper, we tried to randomize the encryption process so that the data becomes more secure and less vulnerable to hacker attacks. We will use the top 4 best existing encryption algorithms like AES, Triple DES, Rabbit, etc., and use them to randomly encrypt the different segments of the message. 
Keywords: Encryption, Cybersecurity, Decryption, Hacking, Cyber-attacks.
Scope of the Article: Encryption methods and tools