Smart Security Algorithm: Ensured Confidentiality and Integrity
N. Jeyanthi1, Gopishetti Venkatesh2, R. Thandeeswaran3, K. Brindha4

1Dr. N. Jeyanthi*, Associate Professor, School of Information Technology and Engineering, VIT University, Vellore (Tamil Nadu), India.
2G. Venkatesh, M.Tech, Software Engineering, VIT University, Vellore (Tamil Nadu), India.
3Dr. R. Thandeeswaran, Associate Professor, Department of Digital Communications, School of Information Technology and Engineering, VIT University, Vellore (Tamil Nadu), India.
4Dr. K. Brindha, Associate Professor, Department of Smart Computing, VIT University, Vellore (Tamil Nadu), India.

Manuscript received on October 12, 2019. | Revised Manuscript received on 22 October, 2019. | Manuscript published on November 10, 2019. | PP: 1994-1998 | Volume-9 Issue-1, November 2019. | Retrieval Number: L30771081219/2019©BEIESP | DOI: 10.35940/ijitee.L3077.119119
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (

Abstract: The main aim of this paper is to provide confidentiality, integrity to the message. It Encrypts the message when it is passing from the sender side to the receiver side. If we take the Caesar cipher it is weak against the brute force attack, dictionary attack but this algorithm is stronger against the brute-force attack and dictionary attack. It has both private and public key encryption which is unlikely for other encryption algorithms like hill cipher, play fair cipher etc. Some Encryption algorithms will prone to be attacked with man-in-the-middle attack but this will be overcome with using hash code concept. This proposal encrypts the message with the novel algorithm at the client side and does the counterpart at the server side. Algorithm implemented using python programming and proves our algorithm is stronger against brute force and dictionary attacks.
Keywords:  Confidentiality, Integrity, Security Attacks, Smart Algorithm.
Scope of the Article: Algorithm Engineering