ROBE: An Encryption Protocol for Secure Communication
This article presents the ROBE encryption protocol designed to enhance security in communication. It discusses the framework and implementation details of the protocol, providing insights into its effectiveness in safeguarding data transmission.

IJERT
9 views • Dec 30, 2021

About this video
👇Download Article👇
https://www.ijert.org/robe-encryption-protocol-for-communication
IJERTV10IS040204
ROBE- Encryption Protocol for Communication
Neethu Prem , Albin John
The emergence of Mobile Cloud Computing (MCC) has created a situation where both the data storage and the data processing transpire outside of the mobile device. For storage and sharing of data we use a variety of mobile applications. Unfortunately, the way we store and share such personal data are often unencrypted and insecure. So in this paper, we introduce a secure way to store and share such data using a lightweight, fast, computationally efficient, easy to use protocol suitable for resource constrained devices. ROBE protocol is based on stream cipher and it uses an External Cloud Server for management of cryptographic tokens. We use a strong algorithm with less complexity to secure data. The security of cryptographic tokens is ensured at various levels using Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and deceit methods. In ROBE, all data are shared securely between mobile and the server with mutual identity verification. Also various attacks are computationally in- feasible for our protocol.
https://www.ijert.org/robe-encryption-protocol-for-communication
IJERTV10IS040204
ROBE- Encryption Protocol for Communication
Neethu Prem , Albin John
The emergence of Mobile Cloud Computing (MCC) has created a situation where both the data storage and the data processing transpire outside of the mobile device. For storage and sharing of data we use a variety of mobile applications. Unfortunately, the way we store and share such personal data are often unencrypted and insecure. So in this paper, we introduce a secure way to store and share such data using a lightweight, fast, computationally efficient, easy to use protocol suitable for resource constrained devices. ROBE protocol is based on stream cipher and it uses an External Cloud Server for management of cryptographic tokens. We use a strong algorithm with less complexity to secure data. The security of cryptographic tokens is ensured at various levels using Advanced Encryption Standard (AES), Secure Hash Algorithm (SHA) and deceit methods. In ROBE, all data are shared securely between mobile and the server with mutual identity verification. Also various attacks are computationally in- feasible for our protocol.
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
9
Duration
19:07
Published
Dec 30, 2021
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now