ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 7)

Publication Date:

Authors : ; ;

Page : 964-968

Keywords : Buffer Size; Cipher text; Data Encryption; Data Decryption; Network Security;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Encryption is the process where data or information is turned into cipher text then we coded it, so that it cannot be understood to unauthorized access. Once the message has been encrypted it is not possible for a person to read it though he or she possesses knowledge to decrypt the data by using key. The main objective is to use multirotational technique instead of linear rotational technique by using circular substitution and reversal transposition is to exploited the benefit of both confusion and diffusion, also we study coding and decoding of algorithm to implement successful crypto system by using symmetric poly alphabetic cipher for image cryptography and data compression technique using key length modification. Users authentication procedures will be design for data storage and retrieval. The user text file will be secured using Hybrid Cryptosystem before storing in network and building secure communication channel for text based files transmission and improve performance between client and server by reducing communication time. For this, we propose a method for secure text based files storage and secure text based files retrieval in network by using the Hybrid Cryptosystem. It provides two tier security using Vigenere cipher and reverse circle cipher with symmetric key multi rotational technique.

Last modified: 2021-06-30 21:02:23