International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 119 | Views: 264

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 7, July 2014 | Popularity: 6.7 / 10


     

Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique

Sajjade Zeba-Shazesh, Aruna K. Gupta


Abstract: Encryption is the process where data or information is turned into cipher text then we coded it, so that it cannot be understood to unauthorized access. Once the message has been encrypted it is not possible for a person to read it though he or she possesses knowledge to decrypt the data by using key. The main objective is to use multirotational technique instead of linear rotational technique by using circular substitution and reversal transposition is to exploited the benefit of both confusion and diffusion, also we study coding and decoding of algorithm to implement successful crypto system by using symmetric poly alphabetic cipher for image cryptography and data compression technique using key length modification. Users authentication procedures will be design for data storage and retrieval. The user text file will be secured using Hybrid Cryptosystem before storing in network and building secure communication channel for text based files transmission and improve performance between client and server by reducing communication time. For this, we propose a method for secure text based files storage and secure text based files retrieval in network by using the Hybrid Cryptosystem. It provides two tier security using Vigenere cipher and reverse circle cipher with symmetric key multi rotational technique.


Keywords: Buffer Size, Cipher text, Data Encryption, Data Decryption, Network Security


Edition: Volume 3 Issue 7, July 2014


Pages: 964 - 968



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Sajjade Zeba-Shazesh, Aruna K. Gupta, "Enforcing Reverse Circle Cipher for Network Security Using Multirotational Technique", International Journal of Science and Research (IJSR), Volume 3 Issue 7, July 2014, pp. 964-968, https://www.ijsr.net/getabstract.php?paperid=20141180, DOI: https://www.doi.org/10.21275/20141180



Similar Articles

Downloads: 8 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 3, March 2024

Pages: 422 - 426

Enhancing Cybersecurity in Cloud - Based Banking - Best Practices and Technologies

Ravi Jagadish

Share this Article

Downloads: 13 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Informative Article, Computer Science & Engineering, United States of America, Volume 13 Issue 10, October 2024

Pages: 830 - 832

Designing Privacy Compliant Relational Databases: Navigating GDPR, CCPA, and Global Privacy Laws

Sarat Chandra Routhu

Share this Article

Downloads: 101

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1579 - 1582

Data Hiding in H.264/AVC Video Encryption with XOR-ed User Information and Data in File Format

Neenu Shereef

Share this Article

Downloads: 103

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015

Pages: 1588 - 1591

Study of Controlling Cloud Data Access Privilege and Attribute Based Data Sharing with Attribute Revocation

Nishitara Shelke, Vidya Dhamdhere

Share this Article

Downloads: 103

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1736 - 1740

Enhanced Retreat of Cloud Storage Data users by Using Improved Data Access Control Scheme for Multi-Authority Cloud Storage

Shafi Shaik, M. Geethalatha

Share this Article
Top