A Research Threshold Efficient Hybrid Encryption Schema for Secure File System
P Penchalaiah1, M Vijay Kumar2, K Ramesh Reddy3

1P Penchalaiah, Narayana Engineering College, Nellore (A.P), India.
2M Vijay Kumar, Rayalaseema University, Kurnool (A.P), India.
3K Ramesh Reddy, Vikrama Simhapuri University, (A.P), India.
Manuscript received on 21 July 2019 | Revised Manuscript received on 03 August 2019 | Manuscript Published on 10 August 2019 | PP: 888-891 | Volume-8 Issue-2S3 July 2019 | Retrieval Number: B11670782S319/2019©BEIESP | DOI: 10.35940/ijrte.B1167.0782S319
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Electronic technologies have radically changed the way of doing business and the way of storing and sharing information. In the technology revolution, security is more affected with the introduction of distributed environment where data requires accessing from remote computers. When Operating Systems (OS) are running on a device with no file encryption, normally file access is controlled through user authentication mechanisms by its own operating system. However, an invader can easily bypass this fence if he gains physical access to the computer. To protect sensitive files/data even if physically accessed the device, the most widely accepted solution to this is to store the files encrypted on the physical media. Windows family of OS uses an EFS, similarly Gnupg is an encryption tool for operating systems such as FreeBSD, Solaris, MacOS to enforce security measure and much more algorithm which are using short length key or keys for encrypting the file-system. Even though these systems are good, still there is a question about confidentiality and privacy because of explosive growth of computing power and cryptanalysis tools and techniques. In this paper a novel approach for encrypting file system using Rbits cipher with PKC is proposed. In brief, Rbits enforce unlimited sub-keying mechanism in encryption process to avoid any sort of cryptanalysis.
Keywords: File-system, Encryption, Rbits, Random bits, Blum Integer.
Scope of the Article: Encryption Methods and Tools