{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T02:20:14Z","timestamp":1758248414291,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,23]],"date-time":"2023-11-23T00:00:00Z","timestamp":1700697600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,23]]},"DOI":"10.1145\/3647444.3647853","type":"proceedings-article","created":{"date-parts":[[2024,5,13]],"date-time":"2024-05-13T13:48:36Z","timestamp":1715608116000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Cryptographic algorithm development and application for encryption and decryption"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0005-3466-7342","authenticated-orcid":false,"given":"Rahul Ravindra","family":"Pitale","sequence":"first","affiliation":[{"name":"Computer Engineering, Pimpri Chinchwad College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6289-2193","authenticated-orcid":false,"given":"Kapil Dinkarrao","family":"Tajane","sequence":"additional","affiliation":[{"name":"Computer Engineering, Pimpri Chinchwad College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-6002-2169","authenticated-orcid":false,"given":"Prathamesh Bhagwat","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Computer Department, Pimpri Chinchwad College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0337-6097","authenticated-orcid":false,"given":"Nishita Sharad","family":"Nehate","sequence":"additional","affiliation":[{"name":"Computer Department, Pimpri Chinchwad College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-4576-8860","authenticated-orcid":false,"given":"Apeksha Jagdish","family":"Mulimani","sequence":"additional","affiliation":[{"name":"Computer Department, Pimpri Chinchwad College of Engineering, India"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-1006-919X","authenticated-orcid":false,"given":"Devarsh Sandeep","family":"Lokhande","sequence":"additional","affiliation":[{"name":"Computer Department, Pimpri Chinchwad College of Engineering, India"}]}],"member":"320","published-online":{"date-parts":[[2024,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"1","author":"Alouffi Bader","year":"2021","unstructured":"Alouffi, Bader & Hassnain, Muhammad & Alharbi, Abdullah & Alosaimi, Wael & Alyami, Hashem & Ayaz, Muhammad. (2021). A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies. IEEE Access. PP. 1-1. 10.1109\/ACCESS.2021.3073203.","journal-title":"IEEE Access. PP."},{"key":"e_1_3_2_1_2_1","volume-title":"Cloud computing: Security challenges. 26-31","author":"Bouayad Anas","year":"2012","unstructured":"Bouayad, Anas & Blilat, Asmae & Nour El Houda, Chaoui & El Ghazi, Mohammed. (2012). Cloud computing: Security challenges. 26-31."},{"key":"e_1_3_2_1_3_1","unstructured":"\/CIST.2012.6388058."},{"key":"e_1_3_2_1_4_1","volume-title":"A survey on conventional encryption algorithms of Cryptography. 1-4. 10.1109\/ICTBIG.2016.7892684","author":"Ramesh Yegireddi","year":"2016","unstructured":"Ramesh, Yegireddi & Kumar, R. (2016). A survey on conventional encryption algorithms of Cryptography. 1-4. 10.1109\/ICTBIG.2016.7892684."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_3"},{"key":"e_1_3_2_1_6_1","volume-title":"RTPL (2015) 1-6 \u00a9 STM Journals","author":"Lakshmi","year":"2015","unstructured":"K. Santhi Sri*, P.R.S.M. Lakshmi, Comparative Study on Various Security Algorithms in Cloud Computing, RTPL (2015) 1-6 \u00a9 STM Journals 2015."},{"key":"e_1_3_2_1_7_1","first-page":"10","article-title":"Encryption algorithm in cloud computing","volume":"37","author":"Shukla Dhirendra","year":"2020","unstructured":"Shukla, Dhirendra & Trivedi, Vijay & Trivedi, (Dr.) Munesh. (2020). Encryption algorithm in cloud computing. Materials Today: Proceedings. 37. 10.1016\/j.matpr.2020.07.452.","journal-title":"Materials Today: Proceedings."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77360-3_17"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.3390\/sym13061066"},{"key":"e_1_3_2_1_10_1","volume-title":"IJARCCE Data Security using RSA Algorithm in Cloud Computing. 2016","author":"Singh Manjhi","year":"2016","unstructured":"Singh, & Manjhi, Pankaj & Tiwari, R. (2016). IJARCCE Data Security using RSA Algorithm in Cloud Computing. 2016"},{"key":"e_1_3_2_1_11_1","volume-title":"An Advanced Security Analysis by Using Blowfish Algorithm","author":"Rudramalla Vasantha","year":"2017","unstructured":"Rudramalla, Vasantha & Prasad, R. (2017). An Advanced Security Analysis by Using Blowfish Algorithm."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2020.113009"},{"key":"e_1_3_2_1_13_1","unstructured":"\/jis.2020.113009."},{"key":"e_1_3_2_1_14_1","first-page":"975","volume":"94","author":"Soofi Aized","year":"2014","unstructured":"Soofi, Aized & Khan, M & Amin, Fazal-e. (2014). A Review on Data Security in Cloud Computing. International Journal of Computer Applications. 94. 975-8887. 10.5120\/16338-5625.","journal-title":"A Review on Data Security in Cloud Computing. International Journal of Computer Applications."},{"key":"e_1_3_2_1_15_1","volume-title":"Falcao Da Rocha, \u2015An Overview on Homomorphic Encryption Algorithms,\u01c1","author":"Cloud Environment V. F.","year":"2019","unstructured":"A Comparative Study on Homomorphic Encryption Algorithms for Data Security in Cloud Environment ,V. F. Rocha, J. L\u00f3pez, and V. Falcao Da Rocha, \u2015An Overview on Homomorphic Encryption Algorithms,\u01c1 2019."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.29099\/ijair.v4i1.154"},{"key":"e_1_3_2_1_17_1","volume-title":"Data Security in Cloud Computing. 10.1109\/FGCT.2016.7605062","author":"Albugmi Ahmed","year":"2016","unstructured":"Albugmi, Ahmed & Alassafi, Madini & Walters, Robert & Wills, Gary. (2016). Data Security in Cloud Computing. 10.1109\/FGCT.2016.7605062."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/2128\/1\/012021"},{"key":"e_1_3_2_1_19_1","volume-title":"Shakeeba S. Khan , International Journal of Computer Science and Mobile Computing","author":"Miss Shakeeba S","year":"2014","unstructured":"]Miss. Shakeeba S. Khan1 , Miss. Sakshi S. Deshmukh2, Security in Cloud Computing Using Cryptographic Algorithms, Shakeeba S. Khan , International Journal of Computer Science and Mobile Computing, Vol.3 Issue.9, September- 2014"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijsia.2015.9.10.32"},{"key":"e_1_3_2_1_21_1","unstructured":"\/ijsia.2015.9.10.32."},{"key":"e_1_3_2_1_22_1","first-page":"318","article-title":"Implementation of AES Algorithm for information security of web-based application","volume":"7","author":"Simarmata Janner","year":"2018","unstructured":"Simarmata, Janner & Limbong, Tonni & Ginting, M.B.R. & Damanik, R. & Nasution, Muhammad Irwan & Hasugian, Abdul & Mesran, Mohd & Sembiring, A.S. & Hutahaean, H.D. & Taufik, Insan & Hasugian, P.M. & Sihotang, Hengki & Gea, A. & Hutapea, M.I. & Jaya, I.K. & Hasibuan, D. & Situmorang, A. & Naibaho, J.F. & Napitupulu, John & Sinambela, Marzuki. (2018). Implementation of AES Algorithm for information security of web-based application. International Journal of Engineering and Technology(UAE). 7. 318-320.","journal-title":"International Journal of Engineering and Technology(UAE)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.29099\/ijair.v4i1.154"},{"key":"e_1_3_2_1_24_1","unstructured":"Will Ellis Symmetric-key algorithm \u201d https:\/\/en.wikipedia.org\/wiki\/Symmetric-key_algorithm\u201d"},{"key":"e_1_3_2_1_25_1","unstructured":"What is encryption \u201chttps:\/\/privacyaustralia.net\/complete-guide-encryption\/\u201d"},{"key":"e_1_3_2_1_26_1","unstructured":"Savvy Security \u201chttps:\/\/cheapsslsecurity.com\/blog\/what-is-asymmetric-encryption-understand-with-simple-examples\/\u201d"},{"key":"e_1_3_2_1_27_1","unstructured":"Shubham Upadhyay Data Encryption Standard(DES) \u201chttps:\/\/www.geeksforgeeks.org\/data-encryption-standard-des-set-1\/\u201d"},{"key":"e_1_3_2_1_28_1","volume-title":"https:\/\/www.simplilearn.com\/tutorials\/cryptography-tutorial\/aes-encryption","author":"Baivab Kumar Jena","year":"2023","unstructured":"Baivab Kumar Jena,What is AES encryption and how does it work \u201chttps:\/\/www.simplilearn.com\/tutorials\/cryptography-tutorial\/aes-encryption\u201d ,Feb 9, 2023"},{"key":"e_1_3_2_1_29_1","volume-title":"An Experimental Evaluation of Data Confidentiality Measures on the Cloud. Journal of Innovation in Digital Ecosystems. 1. 10.1016\/j.jides.2015.02.001","author":"Aljafer Hussain","year":"2015","unstructured":"Aljafer, Hussain & Malik, Zaki & Alodib, Mohammed & Rezgui, Abdelmounaam. (2015). An Experimental Evaluation of Data Confidentiality Measures on the Cloud. Journal of Innovation in Digital Ecosystems. 1. 10.1016\/j.jides.2015.02.001."},{"key":"e_1_3_2_1_30_1","unstructured":"Advanced Encryption Standard \u201chttps:\/\/www.tutorialspoint.com\/cryptography\/advanced_encryption_standard.htm\u201d"},{"key":"e_1_3_2_1_31_1","volume-title":"A bit-serial implementation of the International Data Encryption Algorithm IDEA. 122 - 131. 10.1109\/FPGA.2000.903399","author":"Leong M.P.","year":"2000","unstructured":"Leong, M.P. & Cheung, O.Y.H. & Tsoi, K.H. & Leong, Philip. (2000). A bit-serial implementation of the International Data Encryption Algorithm IDEA. 122 - 131. 10.1109\/FPGA.2000.903399."},{"key":"e_1_3_2_1_32_1","unstructured":"Difference between RSA Algorithm and DSA\u201dhttps:\/\/www.geeksforgeeks.org\/difference-between-rsa-algorithm-and-dsa\/\u201d"},{"key":"e_1_3_2_1_33_1","volume-title":"AES , RSA and Blowfish.","author":"Patila Priyadarshini","year":"2016","unstructured":"Patila, Priyadarshini and Prashant Narayankarb. \u201cA Comprehensive Evaluation of Cryptographic Algorithms : DES , 3 DES , AES , RSA and Blowfish.\u201d (2016).11"}],"event":{"name":"ICIMMI 2023: International Conference on Information Management & Machine Intelligence","acronym":"ICIMMI 2023","location":"Jaipur India"},"container-title":["Proceedings of the 5th International Conference on Information Management &amp; Machine Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647853","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3647444.3647853","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,18]],"date-time":"2025-09-18T17:27:45Z","timestamp":1758216465000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3647444.3647853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,23]]},"references-count":33,"alternative-id":["10.1145\/3647444.3647853","10.1145\/3647444"],"URL":"https:\/\/doi.org\/10.1145\/3647444.3647853","relation":{},"subject":[],"published":{"date-parts":[[2023,11,23]]},"assertion":[{"value":"2024-05-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}