ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

A Manipulated Cyclic Permutation Data Scrambling Approach for Data Security

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 7)

Publication Date:

Authors : ; ;

Page : 2104-2106

Keywords : Cyclic permutation; data security; encryption; scrambling; matrix;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Data sharing in every organization is a high-level priority asset. These are mostly kept electronically and exchanged via networks. The advances in technology, has made data vulnerable to manipulation and unreliable. Most techniques used to encrypt data have shown that they can be reconstructed using statistical approach with low time complexity. In this paper, a manipulated cyclic permutation system was developed for data encryption. The system performs its function by converting a plain text to cipher text and vice versa using the manipulated cyclic permutation method. The system was tested using 15 messages and showed to be 75 % reliable and resisted the guessing attack proposed by users.

Last modified: 2021-07-01 14:40:32