# three layer

International Journal of Computer Science and Information Security (IJCSIS),

Vol. 16, No. 10, October 2018

ISSN 1947-

# Three Layers Cryptography Algorithms

Faculty of Information and Communication

Technology,

Universiti Teknikal Malaysia Melaka, Malaysia.

Zakiah Ayop, Nurul Azma, Mohd. Rizuan

Baharon

Center for Advanced Computing Technology (C-

ACT),

Email: zeina_r.saeed@yahoo.com Faculty of Information and Communication

Technology,

Universiti Teknikal Malaysia Melaka, Malaysia.

Email: zakiah@utem.edu.my, azma@utem.edu.my

Security is the major issue in cloud computing usually only one encryption algorithm is used. But using one encryption algorithm is not much efficient.

According to author et.al Zinah Raad

Saeed inorder to provide high level of security three level encryption is done.

Three algorithms are used RSA, AES,

ECC to improve the security in cloud computing. The text data is used for encryption, first data is encrypted by AES algorithm and the Key of AES was encrypted by Elliptic curve cryptography again the encryption is done with RSA algorithm.The combination of these algorithm will provide CIA .

The review of this study deals with some security features Authenticity,

Privacy, Integrity, Key Management.

These features helps to increase the benefits of AES, RSA, ECC and to improve the security level in large storage.

In Encryption

1.

Only text data is taken as input

2.

For encryption first AES is used for securing the text data (D0).

3.

Secret Key for encrypting the data is (S1)

4.

S1 and key of ECC is allowed is done with RSA.

5.

At the end of encryption (Ft) is given along with encoded key.

In Decryption

1.

Decode the encrypted data is shown.

2.

In decryption side the first decrypted with RSA.

3.

Final encrypted text data and encoded key is applied using RSA.

4.

Decrypt with ECC algorithm and

D0.

5.

Again decrypt with AES algorithm by with reverse in 10 rounds to produce the Plaintext (D0)

The evaluation of these algorithm is based on time. The text data with different sizes are taken for implementation. By using three layer algorithm that assurance the security and efficiency of encryption and decryption with large dataset.

### Technique

B.Muthulakshmi1*, M.Venkatesulu2 1*Department of Computer Applications,

Kalasalingam University, Krishnankoil, Tamil Nadu, India. 2 Department of Information

Technology, Kalasalingam University, Krishnankoil, Tamil Nadu, India.

International Journal of Computer Science and Information Security (IJCSIS),

Vol. 16, No. 1, January 2018

Considering about the data security, authentication and privacy is the main issue while sharing the resources in different distributed environment. Normally for protection single encryption is done and