WSES: High Secured Data Encryption and Authentication Using Weaving, Rotation And Flipping
Journal: ICTACT Journal on Communication Technology (IJCT) (Vol.6, No. 4)Publication Date: 2016-12-01
Authors : A. Yesu Raja; S. Arumuga Perumal;
Page : 1200-1207
Keywords : Data Security; XOR; WSES; Encryption; Decryption; Hash; ENTN; Weaving; REM; Flipped Matrix;
Abstract
Data security is the very important part in the network data communication. Avoidance of the information hacking and steeling are very challenging part for network data communication. Now-a-days people are using many encryption and decryption techniques for data security. But all encryption and decryption techniques are having more time occupation or less security for the process. This paper proposed high level security approach to encryption and decryption for data security. Two levels of securities are used in this proposed method. First one is data encryption and the second one is hash value generation. The proposed Weaving based Superior Encryption Standard (WSES) uses a novel weaving based approach. The weaving array generation is done by Elementary Number Theory Notation (ENTN) method. The weaving array has multiple private keys for XOR encryption. After encryption the error value is extracted from the encrypted array and weaving array. This error value is sent to the other side. The novel approach for hash value generation uses the encrypted array. After encryption, the encrypted array is rotated into four degrees and each degree data are converted to vector format and arranged on by one under the vector. Finally a 2D Rotational Encryption Matrix (REM) is obtained. After this process a REM copy is converted to mirror flip and it is need as Flipped Matrix (FM). The FM is concatenated under the REM and converted to vector using the zigzag operation. Finally this process gives two bytes hash value from the vector. This proposed method executes very fast and provide high security. This method is much reliable to small size applications and also used for any type of data security.
Other Latest Articles
- A Novel Hybrid Scheme For Contention Minimization In Optical Burst Switched Network
- Investigation On Hybrid WDM (DWDM+CWDM) Free Space Optical Communication System
- Compact Dual-Band Inverted L Shaped Monopole Antenna For WLAN Applications
- An Exhaustive Survey On Nature Inspired Metaheuristic Algorithms For Energy Optimization In Wireless Sensor Network
- Nash Bargaining Based Bandwidth Allocation In Cognitive Radio For Delay Critical Applications
Last modified: 2016-09-15 15:04:07