Downloads: 119 | Views: 264
Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.7 / 10
Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique
Sajjade Zeba-Shazesh, Aruna K. Gupta
Abstract: Encryption is the process where data or information is turned into cipher text then we coded it, so that it cannot be understood to unauthorized access. Once the message has been encrypted it is not possible for a person to read it though he or she possesses knowledge to decrypt the data by using key. The main objective is to use multirotational technique instead of linear rotational technique by using circular substitution and reversal transposition is to exploited the benefit of both confusion and diffusion, also we study coding and decoding of algorithm to implement successful crypto system by using symmetric poly alphabetic cipher for image cryptography and data compression technique using key length modification. Users authentication procedures will be design for data storage and retrieval. The user text file will be secured using Hybrid Cryptosystem before storing in network and building secure communication channel for text based files transmission and improve performance between client and server by reducing communication time. For this, we propose a method for secure text based files storage and secure text based files retrieval in network by using the Hybrid Cryptosystem. It provides two tier security using Vigenere cipher and reverse circle cipher with symmetric key multi rotational technique.
Keywords: Buffer Size, Cipher text, Data Encryption, Data Decryption, Network Security
Edition: Volume 3 Issue 7, July 2014
Pages: 964 - 968
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024
Pages: 422 - 426Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies
Ravi Jagadish
Downloads: 13 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2
Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 10, October 2024
Pages: 830 - 832Designing Privacy Compliant Relational Databases: Navigating GDPR, CCPA, and Global Privacy Laws
Sarat Chandra Routhu
Downloads: 101
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1579 - 1582Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format
Neenu Shereef
Downloads: 103
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 1588 - 1591Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation
Nishitara Shelke, Vidya Dhamdhere
Downloads: 103
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015
Pages: 1736 - 1740Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage
Shafi Shaik, M. Geethalatha