Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique
Journal: International Journal of Science and Research (IJSR) (Vol.3, No. 7)Publication Date: 2014-07-05
Authors : Sajjade Zeba-Shazesh; Aruna K. Gupta;
Page : 964-968
Keywords : Buffer Size; Cipher text; Data Encryption; Data Decryption; Network Security;
Abstract
Encryption is the process where data or information is turned into cipher text then we coded it, so that it cannot be understood to unauthorized access. Once the message has been encrypted it is not possible for a person to read it though he or she possesses knowledge to decrypt the data by using key. The main objective is to use multirotational technique instead of linear rotational technique by using circular substitution and reversal transposition is to exploited the benefit of both confusion and diffusion, also we study coding and decoding of algorithm to implement successful crypto system by using symmetric poly alphabetic cipher for image cryptography and data compression technique using key length modification. Users authentication procedures will be design for data storage and retrieval. The user text file will be secured using Hybrid Cryptosystem before storing in network and building secure communication channel for text based files transmission and improve performance between client and server by reducing communication time. For this, we propose a method for secure text based files storage and secure text based files retrieval in network by using the Hybrid Cryptosystem. It provides two tier security using Vigenere cipher and reverse circle cipher with symmetric key multi rotational technique.
Other Latest Articles
- Characterization of Isolated Polysaccharide and Biochemical Attributes of Red Algae, Grateloupia filicina
- Extraction, Physicochemical Characterization and In Vitro Antioxidative Potential of Chitosan in Shrimp Shell Waste from Beni Saf Sea, Algeria
- Accessibility and Utilization of Comprehensive Sickle Cell Disease Service Centers among Tribes of Nilgiris, Tamil Nadu: A GIS Approach
- Security Issues and Risks in Cloud Computing
- HCR Using K-Means Clustering Algorithm
Last modified: 2021-06-30 21:02:23